The legacy <script> data-island capability for XML in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to read arbitrary XML files, and portions of other files, via a URL whose “src” attribute redirects to a local file.
marc.info/?l=bugtraq&m=103011639524314&w=2
www.iss.net/security_center/static/9936.php
www.securityfocus.com/bid/5560
docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-047
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1026
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1148
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1207
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A608
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A776