Total vulnerabilities in the database
Internet Explorer 5.0 allows window spoofing, allowing a remote attacker to spoof a legitimate web site and capture information from the client.
Software | From | Fixed in |
---|---|---|
microsoft / internet_explorer | 5.0 | 5.0.x |