296,760
Total vulnerabilities in the database
Internet Explorer 6.0 allows remote attackers to execute arbitrary code by modifying the Content-Disposition and Content-Type header fields in a way that causes Internet Explorer to believe that the file is safe to open without prompting the user, aka the "File Execution Vulnerability."
| Software | From | Fixed in |
|---|---|---|
| microsoft / internet_explorer | 5.5 | 5.5.x |
| microsoft / internet_explorer | 6.0 | 6.0.x |