Loading...
Loading...
Microsoft Internet Explorer 8.0 Beta 2 relies on the XDomainRequestAllowed HTTP header to authorize data exchange between domains, which allows remote attackers to bypass the product's XSS Filter protection mechanism, and conduct XSS and cross-domain attacks, by injecting this header after a CRLF sequence, related to "XDomainRequest Allowed Injection (XAI)." NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
December 12, 2008
April 23, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2008-5555
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.