Log in to comment.
An attacker could exploit the vulnerability by sending the targeted user a specially crafted file whose MIME type is altered to make it appear as a harmless file.
Lots of mimetype attacks and are common breeding ground for script kiddies
Lots of mimetype attacks and are common breeding ground for script kiddies