tag:blogger.com,1999:blog-2001595886969899899.post7006047166116846680..comments2024-03-18T12:23:11.633-07:00Comments on Ivan Fratric's Security Blog: Internet Explorer Select Element Remote Code ExecutionIvan Fratrichttp://www.blogger.com/profile/03011648433786848352noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-2001595886969899899.post-72671470445957105292016-12-31T03:27:19.379-08:002016-12-31T03:27:19.379-08:00Could this be utilized to obtain any information f...Could this be utilized to obtain any information from the source site? Example: logins, passwords, MySQL configuration, OpenID configuration, etc? I'm curious if simply downloading and installing the corrected software is a total solution or whether or not anyone is advising WP users to reconfigure their logins/passwords, etc.<br /><br /><br /><a href="https://www.checkmarx.com/technology/vulnerability-coverage/" rel="nofollow">cross site scripting</a>ICS Cyber Securityhttps://www.blogger.com/profile/12656113840161990349noreply@blogger.com