oval
via4
|
accepted | 2014-02-24T04:03:15.131-05:00 | class | vulnerability | contributors | name | Andrew Buttner | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and execute Javascript by setting the window's "href" to the malicious Javascript, then calling execCommand("Refresh") to refresh the page, aka BodyRefreshLoadsJPU or the "ExecCommand Cross Domain" vulnerability. | family | windows | id | oval:org.mitre.oval:def:335 | status | accepted | submitted | 2003-11-12T12:00:00.000-04:00 | title | IE v5.01,SP2 ExecCommand Cross Domain Zone Restriction Bypass | version | 67 |
accepted | 2014-02-24T04:03:15.395-05:00 | class | vulnerability | contributors | name | Andrew Buttner | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and execute Javascript by setting the window's "href" to the malicious Javascript, then calling execCommand("Refresh") to refresh the page, aka BodyRefreshLoadsJPU or the "ExecCommand Cross Domain" vulnerability. | family | windows | id | oval:org.mitre.oval:def:341 | status | accepted | submitted | 2003-11-12T12:00:00.000-04:00 | title | IE v5.01,SP3 ExecCommand Cross Domain Zone Restriction Bypass | version | 67 |
accepted | 2014-02-24T04:03:15.460-05:00 | class | vulnerability | contributors | name | Andrew Buttner | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and execute Javascript by setting the window's "href" to the malicious Javascript, then calling execCommand("Refresh") to refresh the page, aka BodyRefreshLoadsJPU or the "ExecCommand Cross Domain" vulnerability. | family | windows | id | oval:org.mitre.oval:def:342 | status | accepted | submitted | 2003-11-12T12:00:00.000-04:00 | title | IE v5.01,SP4 ExecCommand Cross Domain Zone Restriction Bypass | version | 67 |
accepted | 2014-02-24T04:03:15.531-05:00 | class | vulnerability | contributors | name | Andrew Buttner | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and execute Javascript by setting the window's "href" to the malicious Javascript, then calling execCommand("Refresh") to refresh the page, aka BodyRefreshLoadsJPU or the "ExecCommand Cross Domain" vulnerability. | family | windows | id | oval:org.mitre.oval:def:343 | status | accepted | submitted | 2003-11-12T12:00:00.000-04:00 | title | IE v5.5,SP2 ExecCommand Cross Domain Zone Restriction Bypass | version | 66 |
accepted | 2014-02-24T04:03:15.587-05:00 | class | vulnerability | contributors | name | Andrew Buttner | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and execute Javascript by setting the window's "href" to the malicious Javascript, then calling execCommand("Refresh") to refresh the page, aka BodyRefreshLoadsJPU or the "ExecCommand Cross Domain" vulnerability. | family | windows | id | oval:org.mitre.oval:def:344 | status | accepted | submitted | 2003-11-12T12:00:00.000-04:00 | title | IE v6.0,SP1 ExecCommand Cross Domain Zone Restriction Bypass | version | 67 |
accepted | 2014-02-24T04:03:15.657-05:00 | class | vulnerability | contributors | name | Andrew Buttner | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Harvey Rubinovitz | organization | The MITRE Corporation |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and execute Javascript by setting the window's "href" to the malicious Javascript, then calling execCommand("Refresh") to refresh the page, aka BodyRefreshLoadsJPU or the "ExecCommand Cross Domain" vulnerability. | family | windows | id | oval:org.mitre.oval:def:349 | status | accepted | submitted | 2003-11-12T12:00:00.000-04:00 | title | IE v6.0,SP1 (Server 2003) ExecCommand Cross Domain Zone Restriction Bypass | version | 68 |
accepted | 2014-02-24T04:03:17.425-05:00 | class | vulnerability | contributors | name | Tiffany Bergeron | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Christine Walzer | organization | The MITRE Corporation |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and execute Javascript by setting the window's "href" to the malicious Javascript, then calling execCommand("Refresh") to refresh the page, aka BodyRefreshLoadsJPU or the "ExecCommand Cross Domain" vulnerability. | family | windows | id | oval:org.mitre.oval:def:392 | status | accepted | submitted | 2003-11-12T05:00:00.000-04:00 | title | IE v6.0 (XP) ExecCommand Cross Domain Zone Restriction Bypass | version | 67 |
|