Max CVSS | 4.3 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2008-5556 | 4.3 |
The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 does not recognize attack patterns designed to operate against web pages that are encoded with utf-7, which allows remote attackers to bypass the XSS protection mechanism and conduct XSS attack
|
07-08-2024 - 11:15 | 12-12-2008 - 18:30 | |
CVE-2008-5552 | 4.3 |
The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks via a CRLF sequence in conjunction with a crafted Content-Type header, as demonstrated by a header with a
|
11-10-2018 - 20:56 | 12-12-2008 - 18:30 | |
CVE-2008-5555 | 4.3 |
Microsoft Internet Explorer 8.0 Beta 2 relies on the XDomainRequestAllowed HTTP header to authorize data exchange between domains, which allows remote attackers to bypass the product's XSS Filter protection mechanism, and conduct XSS and cross-domain
|
11-10-2018 - 20:56 | 12-12-2008 - 18:30 | |
CVE-2008-5554 | 4.3 |
The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 does not properly handle some HTTP headers that appear after a CRLF sequence in a URI, which allows remote attackers to bypass the XSS protection mechanism and conduct XSS or redirection attack
|
11-10-2018 - 20:56 | 12-12-2008 - 18:30 | |
CVE-2008-5551 | 4.3 |
The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks by injecting data at two different positions within an HTML document, related to STYLE elements and the CS
|
11-10-2018 - 20:56 | 12-12-2008 - 18:30 | |
CVE-2008-5553 | 4.3 |
The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 disables itself upon encountering a certain X-XSS-Protection HTTP header, which allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks by injecting this header a
|
11-10-2018 - 20:56 | 12-12-2008 - 18:30 |