An unspecified function in the JavaScript implementation in Microsoft Internet Explorer creates and exposes a "temporary footprint" when there is a current login to a web site, which makes it easier for remote attackers to trick a user into acting upon a spoofed pop-up message, aka an "in-session phishing attack." NOTE: as of 20090116, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T11:13:13.167Z
Reserved: 2009-01-20T00:00:00
Link: CVE-2008-5912
No data.
Status : Deferred
Published: 2009-01-20T16:30:00.343
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-5912
No data.
OpenCVE Enrichment
No data.
Weaknesses