A vulnerability exists in Internet Explorer which may allow malicious content to be executed in the context of the Local Intranet or Trusted Sites zone. This occurs because Internet Explorer has problems in its handling of the About: pluggable protocol. Internet Explorer assumes that About: URLs are trusted. In this way, it is possible for a restricted site to spoof it's Web Content Zone by using an About: URL to deliver its content. However, this may also be used by a remote website to perform actions in the security context of a Trusted Site or My Computer. It has been reported that it is possible for a remote website to execute arbitrary script code or open files as a result of this vulnerability.
A vulnerability exists in Internet Explorer which may allow malicious content to be executed in the context of the Local Intranet or Trusted Sites zone. This occurs because Internet Explorer has problems in its handling of the About: pluggable protocol. Internet Explorer assumes that About: URLs are trusted. In this way, it is possible for a restricted site to spoof it's Web Content Zone by using an About: URL to deliver its content. However, this may also be used by a remote website to perform actions in the security context of a Trusted Site or My Computer. It has been reported that it is possible for a remote website to execute arbitrary script code or open files as a result of this vulnerability.