Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2006-3281Improper Input Validation in Microsoft Internet Explorer

Severity
5.1MEDIUMNVD
EPSS
62.7%
top 1.61%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 28
Latest updateMay 1

Description

Microsoft Internet Explorer 6.0 does not properly handle Drag and Drop events, which allows remote user-assisted attackers to execute arbitrary code via a link to an SMB file share with a filename that contains encoded ..\ (%2e%2e%5c) sequences and whose extension contains the CLSID Key identifier for HTML Applications (HTA), aka "Folder GUID Code Execution Vulnerability." NOTE: directory traversal sequences were used in the original exploit, although their role is not clear.

CVSS vector

AV:N/AC:H/C:P/I:P/A:PExploitability: 4.9 | Impact: 6.4

Affected Packages1 packages

🔴Vulnerability Details

1
GHSA
GHSA-6hxc-5477-3vmj: Microsoft Internet Explorer 62022-05-01

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows XP/2000/2003 - Explorer Drag and Drop Remote Code Execution2006-07-27
CVE-2006-3281 — Improper Input Validation in Microsoft | cvebase