CVE-2002-0193

Microsoft Internet Explorer 5.01-6.0 - RCE

Title source: llm
STIX 2.1

Description

Microsoft Internet Explorer 5.01 and 6.0 allow remote attackers to execute arbitrary code via malformed Content-Disposition and Content-Type header fields that cause the application for the spoofed file type to pass the file back to the operating system for handling rather than raise an error message, aka the first variant of the "Content Disposition" vulnerability.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Jani Laatikainen · textremotewindows
https://www.exploit-db.com/exploits/21452

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/4752
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A99
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A27
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/9085

Scores

EPSS 0.3972
EPSS Percentile 97.4%

Details

Status published
Products (2)
microsoft/internet_explorer 5.0.1 (3 CPE variants)
microsoft/internet_explorer 6.0
Published May 29, 2002
Tracked Since Feb 18, 2026