{ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3227", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Interpretation conflict between Internet Explorer and other web browsers such as Mozilla, Opera, and Firefox might allow remote attackers to modify the visual presentation of web pages and possibly bypass protection mechanisms such as content filters via ASCII characters with the 8th bit set, which could be stripped by Internet Explorer to render legible text, but not when using other browsers. NOTE: there has been significant discussion about this issue, and as of 20060625, it is not clear where the responsibility for this issue lies, although it might be due to vagueness within the associated standards. NOTE: this might only be exploitable with certain encodings." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20060621 Re: Bypassing of web filters by using ASCII", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/438051/100/0/threaded" }, { "name": "ie-ascii-encoded-web-filter-bypass(27288)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27288" }, { "name": "20060623 Re: Bypassing of web filters by using ASCII", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/438163/100/0/threaded" }, { "name": "20060626 Re: Bypassing of web filters by using ASCII", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/438358/100/0/threaded" }, { "name": "20060622 Re: Bypassing of web filters by using ASCII", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/438066/100/0/threaded" }, { "name": "20060621 Bypassing of web filters by using ASCII", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/437948/100/0/threaded" }, { "name": "http://ha.ckers.org/blog/20060621/us-ascii-xss-part-2", "refsource": "MISC", "url": "http://ha.ckers.org/blog/20060621/us-ascii-xss-part-2" }, { "name": "20060621 Re: Bypassing of web filters by using ASCII", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/438049/100/0/threaded" }, { "name": "http://ha.ckers.org/blog/20060621/malformed-ascii-bypasses-filters/", "refsource": "MISC", "url": "http://ha.ckers.org/blog/20060621/malformed-ascii-bypasses-filters/" }, { "name": "20060623 RE: Bypassing of web filters by using ASCII", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/438154/100/0/threaded" }, { "name": "20060626 RE: Bypassing of web filters by using ASCII", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/438359/100/0/threaded" }, { "name": "28376", "refsource": "OSVDB", "url": "http://www.osvdb.org/28376" } ] } }