Vulnerability could enable an attacker to spoof trusted Internet content. Users could believe they are accessing trusted Internet content when in reality they are accessing malicious Internet content, for example a malicious Web site. However, an attacker would first have to persuade a user to visit the attackers site to attempt to exploit this vulnerability.
Requirements:
Windows NT/2000/XP
Comments not found