Microsoft Internet Explorer 5.01 and 6.0 allow remote attackers to execute arbitrary code via malformed Content-Disposition and Content-Type header fields that cause the application for the spoofed file type to pass the file back to the operating system for handling rather than raise an error message, aka the second variant of the "Content Disposition" vulnerability.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2002-05/0126.html - | |
References | () http://www.iss.net/security_center/static/9086.php - Vendor Advisory | |
References | () http://www.lac.co.jp/security/english/snsadv_e/48_e.html - | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-023 - |
Information
Published : 2002-05-29 04:00
Updated : 2024-11-20 23:38
NVD link : CVE-2002-0188
Mitre link : CVE-2002-0188
CVE.ORG link : CVE-2002-0188
JSON object : View
Products Affected
microsoft
- internet_explorer
CWE