Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 characters, and the (2) javascript: handler for scheme names with 10 or more characters, which might allow remote attackers to bypass certain XSS protection schemes. NOTE: other researchers dispute the significance of this issue, stating "this only works when typed in the address bar.
References
Configurations
History
21 Nov 2024, 00:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://groups.google.com/group/php-ids/browse_thread/thread/3ec15f69d6b3dba0 - Exploit | |
References | () http://ha.ckers.org/blog/20070702/ie60-protocol-guessing/ - Exploit | |
References | () http://osvdb.org/45813 - | |
References | () http://sla.ckers.org/forum/read.php?2%2C13209%2C13218 - | |
References | () http://www.0x000000.com/?i=375 - Exploit |
07 Nov 2023, 02:00
Type | Values Removed | Values Added |
---|---|---|
Summary | Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 characters, and the (2) javascript: handler for scheme names with 10 or more characters, which might allow remote attackers to bypass certain XSS protection schemes. NOTE: other researchers dispute the significance of this issue, stating "this only works when typed in the address bar. | |
References |
|
|
Information
Published : 2007-07-05 20:30
Updated : 2024-11-21 00:33
NVD link : CVE-2007-3576
Mitre link : CVE-2007-3576
CVE.ORG link : CVE-2007-3576
JSON object : View
Products Affected
microsoft
- internet_explorer
CWE