Internet Explorer 5.5 and 6.0 allows remote malicious users to bypass restrictions for executing scripts via an object that processes asynchronous events after the initial security checks have been made.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft internet explorer 5.5 |
||
microsoft internet explorer 6.0 |