Internet Explorer 6.0 allows remote attackers to execute arbitrary code by modifying the Content-Disposition and Content-Type header fields in a way that causes Internet Explorer to believe that the file is safe to open without prompting the user, aka the File Execution Vulnerability.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Internet_explorer | Microsoft | 5.5 (including) | 5.5 (including) |
Internet_explorer | Microsoft | 6.0 (including) | 6.0 (including) |