Malicious Web sites can use the flaw to spoof content from a trusted Web site.
Internet security research group Secunia issued a warning Wednesday about a security vulnerability it says it has discovered within Microsoft's Internet Explorer Web browser. The flaw, which Secunia has ranked as "moderately critical," is found within Internet Explorer versions 5.01, 5.5, and 6, Secunia says in an advisory.
Internet Explorer doesn't block malicious Web sites from inserting "arbitrary content" in an arbitrary frame in a browser window, the Danish security firm says. Secunia says the malicious content will appear as if it originated from a trusted site, which is an attack commonly known as spoofing.
Secunia says it has verified the flaw in "a fully patched Internet Explorer 6 running on Microsoft Windows XP" and that other versions of Internet Explorer could also be affected by this vulnerability.
Secunia's only advice is that Internet Explorer users not visit untrusted Web sites or select a different browser.
Microsoft was not immediately available for comment.
IT's Reputation: What the Data SaysInformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business really views IT's performance in delivering services - and, more important, powering innovation. Our results suggest IT leaders should worry less about whether they're getting enough resources and more about the relationships they have with business unit peers.
What The Business Really Thinks Of IT: 3 Hard TruthsThey say perception is reality. If so, many in-house IT departments have reason to worry. InformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business views IT's performance in delivering services - and, more important, powering innovation. The news isn't great.
InformationWeek Must Reads Oct. 21, 2014InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.