Internet Explorer 6.0 allows remote attackers to execute arbitrary code by modifying the Content-Disposition and Content-Type header fields in a way that causes Internet Explorer to believe that the file is safe to open without prompting the user, aka the "File Execution Vulnerability."
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2001-12-14 05:00
Updated : 2024-02-28 10:24
NVD link : CVE-2001-0727
Mitre link : CVE-2001-0727
CVE.ORG link : CVE-2001-0727
JSON object : View
Products Affected
microsoft
- internet_explorer
CWE