Description
The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks by injecting data at two different positions within an HTML document, related to STYLE elements and the CSS expression property, aka a "double injection."
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Rafel Ivgi · textremotewindows
https://www.exploit-db.com/exploits/32654
References (4)
Core 4
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/32780
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/4724
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/47277
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/499124/100/0/threaded
Scores
EPSS
0.3227
EPSS Percentile
96.9%
Details
CWE
CWE-79
Status
published
Products (1)
microsoft/internet_explorer
8 beta2
Published
Dec 12, 2008
Tracked Since
Feb 18, 2026