Race condition in Microsoft Internet Explorer 6 SP1; 6 and 7 for Windows XP SP2 and SP3; 6 and 7 for Server 2003 SP2; 7 for Vista Gold, SP1, and SP2; and 7 for Server 2008 SP2 allows remote attackers to execute arbitrary code or perform other actions upon a page transition, with the permissions of the old page and the content of the new page, as demonstrated by setInterval functions that set location.href within a try/catch expression, aka the “bait & switch vulnerability” or “Race Condition Cross-Domain Information Disclosure Vulnerability.”
archives.neohapsis.com/archives/fulldisclosure/2007-06/0026.html
lcamtuf.coredump.cx/ierace/
osvdb.org/38497
osvdb.org/54944
secunia.com/advisories/25564
securityreason.com/securityalert/2781
securitytracker.com/id?1018192
www.kb.cert.org/vuls/id/471361
www.securityfocus.com/archive/1/470446/100/0/threaded
www.securityfocus.com/bid/24283
www.us-cert.gov/cas/techalerts/TA09-160A.html
www.vupen.com/english/advisories/2007/2064
www.vupen.com/english/advisories/2009/1538
docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019
exchange.xforce.ibmcloud.com/vulnerabilities/34696
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6041