Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft ie 6 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2014-1770
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote malicious users to execute arbitrary code via crafted JavaScript code that interacts improperly with a CollectGarbage function call on a CMarkup object allocated by the CMarkup::CreateInitialMa...
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
1 EDB exploit
1 Article
5
CVSSv2
CVE-2014-0160
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 prior to 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote malicious users to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrat...
Openssl Openssl
Filezilla-project Filezilla Server
Siemens Application Processing Engine Firmware 2.0
Siemens Cp 1543-1 Firmware 1.1
Siemens Simatic S7-1500 Firmware 1.5
Siemens Simatic S7-1500t Firmware 1.5
Siemens Elan-8.2
Siemens Wincc Open Architecture 3.12
Intellian V100 Firmware 1.20
Intellian V100 Firmware 1.21
Intellian V100 Firmware 1.24
Intellian V60 Firmware 1.15
Intellian V60 Firmware 1.25
Mitel Micollab 6.0
Mitel Micollab 7.0
Mitel Micollab 7.1
Mitel Micollab 7.2
Mitel Micollab 7.3.0.104
Mitel Micollab 7.3
Mitel Mivoice 1.1.3.3
Mitel Mivoice 1.2.0.11
Mitel Mivoice 1.3.2.2
4 EDB exploits
2 Nmap scripts
308 Github repositories
4 Articles
9.3
CVSSv2
CVE-2013-3897
Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange ...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 10
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 11
1 EDB exploit
2 Articles
9.3
CVSSv2
CVE-2013-3893
Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote malicious users to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of ...
Microsoft Internet Explorer 11
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
1 EDB exploit
6 Github repositories
8 Articles
9.3
CVSSv2
CVE-2013-1347
Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote malicious users to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.
Microsoft Internet Explorer 8
1 EDB exploit
3 Github repositories
3 Articles
9.3
CVSSv2
CVE-2012-4792
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
2 EDB exploits
1 Github repository
3 Articles
5.8
CVSSv2
CVE-2012-1545
Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, allows remote malicious users to bypass Protected Mode or cause a denial of service (memory corruption) by leveraging access to a Low integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanS...
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Internet Explorer 6.00.3790.1830
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 7.0.5730
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.00.3718.0000
Microsoft Internet Explorer 6.00.2900.2180
Microsoft Internet Explorer 7.00.6000.16441
Microsoft Internet Explorer 8.0.6001
Microsoft Internet Explorer 9
Microsoft Internet Explorer 6.00.2600.0000
Microsoft Internet Explorer 6.00.2800.1106
Microsoft Internet Explorer 6.00.2462.0000
Microsoft Internet Explorer 6.00.2479.0006
Microsoft Internet Explorer 7.00.5730.1100
Microsoft Ie 10
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 6.0.2800
5
CVSSv2
CVE-2010-5071
The JavaScript implementation in Microsoft Internet Explorer 8.0 and previous versions does not properly restrict the set of values contained in the object returned by the getComputedStyle method, which allows remote malicious users to obtain sensitive information about visited w...
Microsoft Internet Explorer 7.00.5730.1100
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 6.00.3790.1830
Microsoft Internet Explorer 6.00.2800.1106
Microsoft Internet Explorer 6.00.2479.0006
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.00.2919.6307
Microsoft Internet Explorer 5.00.2314.1003
Microsoft Internet Explorer 5.00.2014.0216
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.50.3825.1300
Microsoft Internet Explorer 4.72.3612.1713
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.71.1008.3
Microsoft Internet Explorer 4.72.2106.8
Microsoft Internet Explorer 4.40.308
Microsoft Internet Explorer 3.0.2
4.3
CVSSv2
CVE-2002-2435
The Cascading Style Sheets (CSS) implementation in Microsoft Internet Explorer 8.0 and previous versions does not properly handle the :visited pseudo-class, which allows remote malicious users to obtain sensitive information about visited web pages via a crafted HTML document, a ...
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 7.0.5730
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 6.00.3663.0000
Microsoft Internet Explorer 6.00.2600.0000
Microsoft Internet Explorer 5.00.3105.0106
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.00.2614.3500
Microsoft Internet Explorer 5.00.2314.1003
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.50.4807.2300
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.00.3700.1000
Microsoft Internet Explorer 5.50.3825.1300
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.71.544
Microsoft Internet Explorer 4.71.1008.3
Microsoft Internet Explorer 3.1
4.3
CVSSv2
CVE-2011-2382
Microsoft Internet Explorer 8 and previous versions, and Internet Explorer 9 beta, does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote malicious users to read cookie files via vectors involving an IFRAME element with a SRC attribute cont...
Microsoft Internet Explorer
Microsoft Internet Explorer 5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 5.01
Microsoft Ie 9
Microsoft Internet Explorer 7
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 3.0.1
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.1
Microsoft Internet Explorer 3.2
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 4.5
Microsoft Internet Explorer 4.40.308
Microsoft Internet Explorer 4.40.520
Microsoft Internet Explorer 4.70.1155
Microsoft Internet Explorer 4.70.1158
Microsoft Internet Explorer 4.70.1215
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »