Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft ie 6 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2003-1048
Double free vulnerability in mshtml.dll for certain versions of Internet Explorer 6.x allows remote malicious users to cause a denial of service (application crash) via a malformed GIF image.
Microsoft Outlook 2000
Microsoft Internet Explorer 5.01
Microsoft Windows Xp -
Microsoft Windows Server 2003 -
Microsoft Windows 98 -
Microsoft Internet Explorer 5.5
Microsoft Windows Me -
Microsoft Windows 98se -
Microsoft Windows Nt 4.0
Microsoft Internet Explorer 6.0
10
CVSSv2
CVE-2004-0420
The Windows Shell application in Windows 98, Windows ME, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows remote malicious users to execute arbitrary code by spoofing the type of a file via a CLSID specifier in the filename, as demonstrated using Internet ...
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Ie 6.0
10
CVSSv2
CVE-2004-0380
The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote malicious users to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references th...
Microsoft Outlook Express 5.5
Microsoft Outlook Express 6.0
3 EDB exploits
10
CVSSv2
CVE-2003-1027
Internet Explorer 5.01 through 6 SP1 allows remote malicious users to direct drag and drop behaviors and other mouse click actions to other windows by using method caching (SaveRef) to access the window.moveBy method, which is otherwise inaccessible, as demonstrated by HijackClic...
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0
Microsoft Ie 6.0
Microsoft Internet Explorer 6.0
10
CVSSv2
CVE-2003-0347
Heap-based buffer overflow in VBE.DLL and VBE6.DLL of Microsoft Visual Basic for Applications (VBA) SDK 5.0 up to and including 6.3 allows remote malicious users to execute arbitrary code via a document with a long ID parameter.
Microsoft Office 2000
Microsoft Office Xp
Microsoft Visual Basic 6.2
Microsoft Visio 2002
Microsoft Visual Basic 5.0
Microsoft Project 2000
Microsoft Project 2002
Microsoft Visual Basic 6.3
1 EDB exploit
9.3
CVSSv2
CVE-2014-1770
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote malicious users to execute arbitrary code via crafted JavaScript code that interacts improperly with a CollectGarbage function call on a CMarkup object allocated by the CMarkup::CreateInitialMa...
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
1 EDB exploit
1 Article
9.3
CVSSv2
CVE-2013-3897
Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange ...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 10
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 11
1 EDB exploit
2 Articles
9.3
CVSSv2
CVE-2013-3893
Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote malicious users to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of ...
Microsoft Internet Explorer 11
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
1 EDB exploit
6 Github repositories
8 Articles
9.3
CVSSv2
CVE-2013-1347
Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote malicious users to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.
Microsoft Internet Explorer 8
1 EDB exploit
3 Github repositories
3 Articles
9.3
CVSSv2
CVE-2012-4792
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
2 EDB exploits
1 Github repository
3 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »