Internet Explorer 6.0 allows remote attackers to execute arbitrary code by modifying the Content-Disposition and Content-Type header fields in a way that causes Internet Explorer to believe that the file is safe to open without prompting the user, aka the "File Execution Vulnerability."
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2001-12-13 21:00
Updated : 2021-07-23 05:55
NVD link : CVE-2001-0727
Mitre link : CVE-2001-0727
JSON object : View
CWE
Products Affected
microsoft
- internet_explorer