<s>
Cross-zone	B-Protocol
scripting	I-Protocol
is	O
a	O
browser	B-Protocol
exploit	I-Protocol
taking	O
advantage	O
of	O
a	O
vulnerability	O
within	O
a	O
zone-based	O
security	O
solution	O
.	O
</s>
<s>
The	O
first	O
step	O
is	O
to	O
use	O
a	O
cross-zone	B-Protocol
scripting	I-Protocol
vulnerability	O
to	O
get	O
scripts	O
executed	O
within	O
a	O
privileged	O
zone	O
.	O
</s>
<s>
To	O
complete	O
the	O
attack	O
,	O
then	O
perform	O
malicious	O
actions	O
on	O
the	O
computer	O
using	O
insecure	O
ActiveX	B-Application
components	I-Application
.	O
</s>
<s>
There	O
are	O
four	O
well	O
known	O
zones	O
in	O
Internet	B-Application
Explorer	I-Application
:	O
</s>
<s>
run	O
unsafe	O
and	O
unsigned	O
ActiveX	B-Application
objects	I-Application
)	O
.	O
</s>
<s>
These	O
zones	O
are	O
explained	O
in	O
detail	O
by	O
"	O
How	O
to	O
use	O
security	O
zones	O
in	O
Internet	B-Application
Explorer	I-Application
"	O
.	O
</s>
<s>
Historically	O
this	O
zone	O
has	O
been	O
extremely	O
insecure	O
,	O
but	O
in	O
recent	O
versions	O
Internet	B-Application
Explorer	I-Application
(	O
for	O
Windows	O
XP	O
)	O
steps	O
have	O
been	O
taken	O
to	O
reduce	O
risks	O
associated	O
with	O
zone	O
.	O
</s>
<s>
Most	O
cross-zone	B-Protocol
scripting	I-Protocol
attacks	O
are	O
designed	O
to	O
jump	O
from	O
Internet	O
zone	O
to	O
a	O
privileged	O
zone	O
.	O
</s>
<s>
A	O
well-known	O
example	O
is	O
the	O
bug	O
in	O
Internet	B-Application
Explorer	I-Application
6	I-Application
.	O
</s>
