First published: Fri May 03 2002(Updated: )
Internet Explorer 5.x and 6 interprets an object as an HTML document even when its MIME Content-Type is text/plain, which could allow remote attackers to execute arbitrary script in documents that the user does not expect, possibly through web applications that use a text/plain type to prevent cross-site scripting attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =5.01 | |
Internet Explorer | =5.5-sp2 | |
Internet Explorer | =5.0 | |
Internet Explorer | =5.0.1-sp2 | |
Internet Explorer | =5.0.1-sp1 | |
Internet Explorer | =5.5 | |
Internet Explorer | =5.5-sp1 | |
Internet Explorer | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0269 has a known severity rating which indicates a significant risk of arbitrary script execution in affected versions of Internet Explorer.
To mitigate CVE-2002-0269, users are recommended to upgrade to a patched version of Internet Explorer or disable script execution functionality.
CVE-2002-0269 affects Internet Explorer versions 5.0, 5.01, 5.5, and 6.0.
CVE-2002-0269 can be exploited by remote attackers to execute malicious scripts in unexpected HTML documents.
Users can check their Internet Explorer version and assess if it falls within the affected versions listed in CVE-2002-0269.