Description
Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to bypass security zone restrictions and execute arbitrary programs via a web document with a large number of duplicate file:// or other requests that point to the program and open multiple file download dialogs, which eventually cause Internet Explorer to execute the program, as demonstrated using a large number of FRAME or IFRAME tags, aka the "File Download Dialog Vulnerability."
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Marek Bialoglowy · textremotewindows
https://www.exploit-db.com/exploits/22575
References (9)
Core 9
Core References
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A948
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/12019
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=105249399103214&w=2
US Government Resource third-party-advisory
x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/251788
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/8807
Mailing List mailing-list
x_refsource_ntbugtraq
http://marc.info/?l=ntbugtraq&m=105294162726096&w=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/7539
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=105294081325040&w=2
Vendor Advisory vendor-advisory
x_refsource_ms
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-020
Scores
EPSS
0.1916
EPSS Percentile
95.4%
Details
Status
published
Products (1)
microsoft/internet_explorer
6.0.2800
Published
Jun 09, 2003
Tracked Since
Feb 18, 2026