The rendering engine in Internet Explorer determines the MIME type independently of the type that is specified by the server, which allows remote servers to automatically execute script which is placed in a file whose MIME type does not normally support scripting, such as text (.txt), JPEG (.jpg), etc.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/200109 | Patch Vendor Advisory |
http://www.securityfocus.com/archive/1/200291 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/3116 | Exploit Vendor Advisory |
http://www.securityfocus.com/archive/1/200109 | Patch Vendor Advisory |
http://www.securityfocus.com/archive/1/200291 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/3116 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/archive/1/200109 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/200291 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/3116 - Exploit, Vendor Advisory |
Information
Published : 2001-10-30 05:00
Updated : 2024-11-20 23:35
NVD link : CVE-2001-0712
Mitre link : CVE-2001-0712
CVE.ORG link : CVE-2001-0712
JSON object : View
Products Affected
microsoft
- internet_explorer
CWE