Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft ie 6 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-0612
Multiple ActiveX controls in Microsoft Windows 2000, XP, 2003, and Vista allows remote malicious users to cause a denial of service (Internet Explorer crash) by accessing the bgColor, fgColor, linkColor, alinkColor, vlinkColor, or defaultCharset properties in the (1) giffile, (2)...
Microsoft Ie 6.0
Microsoft Ie 5.0 Ta3
Microsoft Ie 7.0
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 7.0
1 EDB exploit
NA
CVE-2007-0024
Integer overflow in the Vector Markup Language (VML) implementation (vgx.dll) in Microsoft Internet Explorer 5.01, 6, and 7 on Windows 2000 SP4, XP SP2, Server 2003, and Server 2003 SP1 allows remote malicious users to execute arbitrary code via a crafted web page that contains u...
Microsoft Internet Explorer 5.01
Microsoft Ie 6.0
Microsoft Internet Explorer 7.0
2 EDB exploits
NA
CVE-2006-5577
Microsoft Internet Explorer 6 and previous versions allows remote malicious users to obtain sensitive information via unspecified uses of the OBJECT HTML tag, which discloses the absolute path of the corresponding TIF folder, aka "TIF Folder Information Disclosure Vulnerabil...
Microsoft Ie
NA
CVE-2006-5578
Microsoft Internet Explorer 6 and previous versions allows remote malicious users to read Temporary Internet Files (TIF) and obtain sensitive information via unspecified vectors involving certain drag and drop operations, aka "TIF Folder Information Disclosure Vulnerability,...
Microsoft Ie
NA
CVE-2006-5884
Multiple unspecified vulnerabilities in DirectAnimation ActiveX controls for Microsoft Internet Explorer 5.01 through 6 have unknown impact and remote attack vectors, possibly related to (1) Danim.dll and (2) Lmrt.dll, a different set of vulnerabilities than CVE-2006-4446 and CVE...
Microsoft Ie 6
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.1
NA
CVE-2006-4687
Microsoft Internet Explorer 5.01 through 6 allows remote malicious users to execute arbitrary code via crafted layout combinations involving DIV tags and HTML CSS float properties that trigger memory corruption, aka "HTML Rendering Memory Corruption Vulnerability."
Microsoft Ie 6
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.1
NA
CVE-2006-4888
Microsoft Internet Explorer 6 and previous versions allows remote malicious users to cause a denial of service (application hang) via a CSS-formatted HTML INPUT element within a DIV element that has a larger size than the INPUT.
Microsoft Ie
NA
CVE-2006-3873
Heap-based buffer overflow in URLMON.DLL in Microsoft Internet Explorer 6 SP1 on Windows 2000 and XP SP1, with versions the MS06-042 patch prior to 20060912, allows remote malicious users to cause a denial of service (crash) or execute arbitrary code via a long URL in a GZIP-enco...
Microsoft Ie 6.0
Microsoft Windows 2003 Server 64-bit
Microsoft Windows 2003 Server Itanium
Microsoft Windows 2003 Server Sp1
Microsoft Windows Xp
Microsoft Windows 2003 Server R2
Microsoft Windows 2000
NA
CVE-2006-4560
Internet Explorer 6 on Windows XP SP2 allows remote malicious users to execute arbitrary JavaScript in the context of the browser's session with an arbitrary intranet web server, by hosting script on an Internet web server that can be made inaccessible by the attacker and th...
Microsoft Ie 6
NA
CVE-2006-4301
Microsoft Internet Explorer 6.0 SP1 allows remote malicious users to cause a denial of service (crash) via a long Color attribute in multiple DirectX Media Image DirectX Transforms ActiveX COM Objects from (a) dxtmsft.dll and (b) dxtmsft3.dll, including (1) DXImageTransform.Micro...
Microsoft Ie 6.0
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »