The HTML rendering engine in Microsoft Internet Explorer 6.0 allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML in corrupted images and other files such as .GIF, JPG, and WAV, which is rendered as HTML when the user clicks on the link, even though the web server response and file extension indicate that it should be treated as a different file type.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=113017003617987&w=2 | |
http://securityreason.com/securityalert/18 | |
http://www.computec.ch/download.php?view.683 | Exploit |
http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=1746 | Exploit Vendor Advisory |
http://www.securiteam.com/windowsntfocus/6F00B00EBY.html | Vendor Advisory |
Configurations
History
23 Jul 2021, 12:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:* |
Information
Published : 2005-10-26 10:02
Updated : 2024-02-04 16:52
NVD link : CVE-2005-3312
Mitre link : CVE-2005-3312
CVE.ORG link : CVE-2005-3312
JSON object : View
Products Affected
microsoft
- internet_explorer
CWE