Vulnerability Details : CVE-2006-3450
Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using the document.getElementByID Javascript function to access crafted Cascading Style Sheet (CSS) elements, and possibly other unspecified vectors involving certain layout positioning combinations in an HTML file.
Vulnerability category: Input validationExecute code
Products affected by CVE-2006-3450
- cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-3450
88.90%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-3450
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2006-3450
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-3450
-
http://www.vupen.com/english/advisories/2006/3212
Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A433
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042
-
http://www.kb.cert.org/vuls/id/119180
Patch;US Government Resource
-
http://securitytracker.com/id?1016663
-
http://www.securityfocus.com/bid/19312
Patch
-
http://www.zerodayinitiative.com/advisories/ZDI-06-027.html
-
http://www.us-cert.gov/cas/techalerts/TA06-220A.html
Patch;Third Party Advisory;US Government Resource
-
http://www.securityfocus.com/archive/1/442579/100/0/threaded
Jump to