A vulnerability in Microsoft’s XML HTTP request handling can be exploited via an ActiveX control through a Web browser — specifically Internet Explorer — according to IBM’s Internet Security Systems, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results