Zero-day Vulnerability Database
Zero-day vulnerabilities discovered: 1
Improper input validation
The vulnerability allows a remote attacker to perform phishing attacks.
The vulnerability exists due to improper input validation when processing Internet shortcuts, referenced by IMG or other inline elements. A remote attacker can create a specially crafted web page, trick the victim into visiting it and perform a phishing attack.
Note: the vulnerability was being actively exploited.
Improper input validation
The vulnerability allows a remote attacker to perform phishing attacks.
The vulnerability exists due to improper input validation when processing Internet shortcuts, referenced by IMG or other inline elements. A remote attacker can create a specially crafted web page, trick the victim into visiting it and perform a phishing attack.
Note: the vulnerability was being actively exploited.