First published: Tue Apr 11 2006(Updated: )
Microsoft Internet Explorer 5.01 through 6 allows remote attackers to conduct phishing attacks by spoofing the address bar and other parts of the trust UI via unknown methods that allow "window content to persist" after the user has navigated to another site, aka the "Address Bar Spoofing Vulnerability." NOTE: this is a different vulnerability than CVE-2006-1626.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Internet Explorer | =6-windows_2000_sp4 | |
Canon Network Camera Server VB101 | ||
Microsoft Internet Explorer | =6-windows_server_2003_sp1_itanium_systems | |
Internet Explorer | =6-sp1 | |
Microsoft Internet Explorer | =6 | |
Microsoft Internet Explorer | =6-windows_server_2003_sp1 | |
Microsoft Internet Explorer | =6-sp1 | |
Microsoft Internet Explorer | =5.01-windows_2000_sp4 | |
Microsoft Internet Explorer | =6-windows_xp_sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1192 has a medium severity rating due to its potential to facilitate phishing attacks.
To fix CVE-2006-1192, you should upgrade to a supported version of Internet Explorer or apply Microsoft security patches available for the affected versions.
CVE-2006-1192 affects Microsoft Internet Explorer versions 5.01 through 6, along with specific Canon network camera server devices.
CVE-2006-1192 enables attackers to conduct phishing attacks by spoofing the address bar and trust UI elements.
CVE-2006-1192 is a client-side vulnerability affecting web browsers, specifically Internet Explorer.