"value":"The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 does not properly handle some HTTP headers that appear after a CRLF sequence in a URI, which allows remote attackers to bypass the XSS protection mechanism and conduct XSS or redirection attacks, as demonstrated by the (1) Location and (2) Set-Cookie HTTP headers. NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to \"address every conceivable XSS attack scenario.\""
},
{
"lang":"es",
"value":"El filtro XSS (ejecuci\u00f3n de secuencias de comandos en sitios cruzados) en Microsoft Internet Explorer 8.0 Beta 2 no gestiona de manera apropiada algunas cabeceras HTTP que aparecen despu\u00e9s de una secuencia CRLF en una URI, lo que permite a atacantes remotos saltar el mecanismo de protecci\u00f3n XSS y generar ataques XSS o de redirecci\u00f3n, como se ha demostrado por las cabeceras HTTP (1) Location y (2) Set-Cookie. NOTA: El fabricante mantiene que el filtro XSS de manera intencionada no intenta \"abordar todas las hip\u00f3tesis de ataque XSS\"."