Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using the document.getElementByID Javascript function to access crafted Cascading Style Sheet (CSS) elements, and possibly other unspecified vectors involving certain layout positioning combinations in an HTML file.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/119180 | Patch US Government Resource |
http://www.securityfocus.com/bid/19312 | Patch |
http://www.us-cert.gov/cas/techalerts/TA06-220A.html | Patch Third Party Advisory US Government Resource |
http://www.zerodayinitiative.com/advisories/ZDI-06-027.html | |
http://secunia.com/advisories/21396 | Vendor Advisory |
http://securitytracker.com/id?1016663 | |
http://www.osvdb.org/27855 | |
http://www.vupen.com/english/advisories/2006/3212 | Vendor Advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A433 | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 | |
http://www.securityfocus.com/archive/1/442579/100/0/threaded |
Configurations
Configuration 1 (hide)
|
Information
Published : 2006-08-08 16:04
Updated : 2021-07-23 05:55
NVD link : CVE-2006-3450
Mitre link : CVE-2006-3450
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
microsoft
- internet_explorer
- ie