Total vulnerabilities in the database
Internet Explorer 5.5 and 6.0 allows remote attackers to bypass restrictions for executing scripts via an object that processes asynchronous events after the initial security checks have been made.
Software | From | Fixed in |
---|---|---|
microsoft / internet_explorer | 5.5 | 5.5.x |
microsoft / internet_explorer | 6.0 | 6.0.x |