Crossite scripting via Find dialog, location/refresh, NavigateAndFind, file:javascript:, click to drug-n-drop spoofing, src URL spoofing, BaseRef spoofing, etc.
CPE | Name | Operator | Version |
---|---|---|---|
internet explorer | eq | 6.0 | |
internet explorer | eq | 5.5 |
vulners.com/securityvulns/securityvulns:doc:5089
vulners.com/securityvulns/securityvulns:doc:5090
vulners.com/securityvulns/securityvulns:doc:5091
vulners.com/securityvulns/securityvulns:doc:5092
vulners.com/securityvulns/securityvulns:doc:5093
vulners.com/securityvulns/securityvulns:doc:5094
vulners.com/securityvulns/securityvulns:doc:5095
vulners.com/securityvulns/securityvulns:doc:5096
vulners.com/securityvulns/securityvulns:doc:5097
vulners.com/securityvulns/securityvulns:doc:5098
vulners.com/securityvulns/securityvulns:doc:5099
vulners.com/securityvulns/securityvulns:doc:5100
vulners.com/securityvulns/securityvulns:doc:5101
vulners.com/securityvulns/securityvulns:doc:5102
vulners.com/securityvulns/securityvulns:doc:5130
vulners.com/securityvulns/securityvulns:doc:5200
vulners.com/securityvulns/securityvulns:doc:5222
vulners.com/securityvulns/securityvulns:doc:5359
vulners.com/securityvulns/securityvulns:doc:5452
vulners.com/securityvulns/securityvulns:doc:5453
vulners.com/securityvulns/securityvulns:doc:5454
vulners.com/securityvulns/securityvulns:doc:5455
vulners.com/securityvulns/securityvulns:doc:5456
vulners.com/securityvulns/securityvulns:doc:5457
vulners.com/securityvulns/securityvulns:doc:5458
vulners.com/securityvulns/securityvulns:doc:5459
vulners.com/securityvulns/securityvulns:doc:5520