Internet Explorer 6.0 allows remote attackers to execute arbitrary code by modifying the Content-Disposition and Content-Type header fields in a way that causes Internet Explorer to believe that the file is safe to open without prompting the user, aka the "File Execution Vulnerability."
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation20 reference(s) from NVD