The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks by injecting data at two different positions within an HTML document, related to STYLE elements and the CSS expression property, aka a "double injection."
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/32780 | vdb entry exploit |
http://securityreason.com/securityalert/4724 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47277 | vdb entry |
http://www.securityfocus.com/archive/1/499124/100/0/threaded | mailing list |