Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 6.0 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2003-0823
Internet Explorer 6 SP1 and previous versions allows remote malicious users to direct drag and drop behaviors and other mouse click actions to other windows by calling the window.moveBy method, aka HijackClick, a different vulnerability than CVE-2003-1027.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
5
CVSSv2
CVE-2002-1186
Internet Explorer 5.01 up to and including 6.0 does not properly perform security checks on certain encoded characters within a URL, which allows a remote malicious user to steal potentially sensitive information from a user by redirecting the user to another site that has that i...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
7.5
CVSSv2
CVE-2003-0531
Internet Explorer 5.01 SP3 up to and including 6.0 SP1 allows remote malicious users to access and execute script in the My Computer domain using the browser cache via crafted Content-Type and Content-Disposition headers, aka the "Browser Cache Script Execution in My Compute...
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Internet Explorer 5.5
2.6
CVSSv2
CVE-2004-2219
Microsoft Internet Explorer 6 allows remote malicious users to spoof the address bar to facilitate phishing attacks via Javascript that uses an invalid URI, modifies the Location field, then uses history.back to navigate to the previous domain, aka NullyFake.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Internet Explorer 5.01
5.1
CVSSv2
CVE-2005-3240
Race condition in Microsoft Internet Explorer allows user-assisted malicious users to overwrite arbitrary files and possibly execute code by tricking a user into performing a drag-and-drop action from certain objects, such as file objects within a folder view, then predicting the...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
5
CVSSv2
CVE-2002-1185
Internet Explorer 5.01 up to and including 6.0 does not properly check certain parameters of a PNG file when opening it, which allows remote malicious users to cause a denial of service (crash) by triggering a heap-based buffer overflow using invalid length codes during decompres...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.0.1
Microsoft Ie 6.0
5
CVSSv2
CVE-2002-1714
Microsoft Internet Explorer 5.0 up to and including 6.0 allows remote malicious users to cause a denial of service (crash) via an object of type "text/html" with the DATA field that identifies the HTML document that contains the object, which may cause infinite recursio...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
1 EDB exploit
5
CVSSv2
CVE-2004-2090
Microsoft Internet Explorer 5.0.1 up to and including 6.0 allows remote malicious users to determine the existence of arbitrary files via the VBScript LoadPicture method, which returns an error code if the file does not exist.
Microsoft Internet Explorer 5.0.1
Microsoft Ie 6.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
6.8
CVSSv2
CVE-2007-5347
Microsoft Internet Explorer 5.01 through 7 allows remote malicious users to execute arbitrary code via "unexpected method calls to HTML objects," aka "DHTML Object Memory Corruption Vulnerability."
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Ie 6.0
Microsoft Internet Explorer 7.0
Microsoft Ie 5.x
Microsoft Internet Explorer 6
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.2.3
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 7
Microsoft Internet Explorer 5
Microsoft Internet Explorer 6.0.2800
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 7.0.5730.11
6.8
CVSSv2
CVE-2007-5344
Microsoft Internet Explorer 5.01 through 7 allows remote malicious users to execute arbitrary code via a crafted website using Javascript that creates, modifies, deletes, and accesses document objects using the tags property, which triggers heap corruption, related to uninitializ...
Microsoft Internet Explorer 5
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0.2800
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Ie 5.x
Microsoft Internet Explorer 6
Microsoft Ie 6.0
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.2.3
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 7
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4946
CVE-2024-30309
CVE-2024-4761
CVE-2024-30051
type confusion
memory leak
CVE-2024-30293
reflected XSS
CVE-2024-3126
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »