A problem in Microsoft Internet Explorer allows the leakage of certain information. Due to the improper handling of the object tag, it is possible for a remote user to gain potentially sensitive information. The object tag may under some circumstances permit a remote user to discover the name of the temporary internet files folder. This could be used to gain access to information such as user names or cookies. It may also be easier for attackers to execute downloaded programs on target systems with the path of the folder.
A problem in Microsoft Internet Explorer allows the leakage of certain information. Due to the improper handling of the object tag, it is possible for a remote user to gain potentially sensitive information. The object tag may under some circumstances permit a remote user to discover the name of the temporary internet files folder. This could be used to gain access to information such as user names or cookies. It may also be easier for attackers to execute downloaded programs on target systems with the path of the folder.