Common vulnerabilities and Exposures (CVE)

Skip to main content

Required CVE Record Information

Description

Internet Explorer 6.0 allows remote attackers to execute arbitrary code by modifying the Content-Disposition and Content-Type header fields in a way that causes Internet Explorer to believe that the file is safe to open without prompting the user, aka the "File Execution Vulnerability."

Updated:

This container includes required additional information provided by the CVE Program for this vulnerability.