Total vulnerabilities in the database
Internet Explorer 6.0 allows remote attackers to execute arbitrary code by modifying the Content-Disposition and Content-Type header fields in a way that causes Internet Explorer to believe that the file is safe to open without prompting the user, aka the "File Execution Vulnerability."
Software | From | Fixed in |
---|---|---|
microsoft / internet_explorer | 5.5 | 5.5.x |
microsoft / internet_explorer | 6.0 | 6.0.x |