CVE-2007-3576

N/A Unknown
Published: July 05, 2007 Modified: April 23, 2026
View on NVD

Description

Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 characters, and the (2) javascript: handler for scheme names with 10 or more characters, which might allow remote attackers to bypass certain XSS protection schemes. NOTE: other researchers dispute the significance of this issue, stating "this only works when typed in the address bar.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/45813
Source: cve@mitre.org
http://www.0x000000.com/?i=375
Source: cve@mitre.org
Exploit
http://groups.google.com/group/php-ids/browse_thread/thread/3ec15f69d6b3dba0
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://ha.ckers.org/blog/20070702/ie60-protocol-guessing/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://osvdb.org/45813
Source: af854a3a-2127-422b-91ae-364da2661108
http://sla.ckers.org/forum/read.php?2%2C13209%2C13218
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.0x000000.com/?i=375
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit

10 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
27.6%
96th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

microsoft