1) Modern versions of Internet Explorer have vulnerabilities that allow bypassing the same-origin policy and disclosing cross-origin information through VBScript error messages or the Tabular Data Control ActiveX object.
2) An attacker can trigger VBScript errors that include sensitive JSON data or access a text file bound to a TDC object to exfiltrate secrets.
3) Countermeasures include adding X-Content-Type-Options headers, restricting XMLHttpRequests by a custom header, and not allowing external data to be placed at the top of response content.