Description
Internet Explorer 5.5 and 6.0 allows remote attackers to cause the File Download dialogue box to misrepresent the name of the file in the dialogue in a way that could fool users into thinking that the file type is safe to download.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by cyber_flash · textremotewindows
https://www.exploit-db.com/exploits/641
exploitdb
WORKING POC
VERIFIED
by StatiC · textremotewindows
https://www.exploit-db.com/exploits/21164
References (5)
Core 5
Core References
Patch, Vendor Advisory mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/245594
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/7636
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1014
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/3597
Vendor Advisory vendor-advisory
x_refsource_ms
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-058
Scores
EPSS
0.2271
EPSS Percentile
95.9%
Details
Status
published
Products (2)
microsoft/internet_explorer
5.5
microsoft/internet_explorer
6.0
Published
Nov 26, 2001
Tracked Since
Feb 18, 2026