Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 6 vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2015-0053
Microsoft Internet Explorer 6 through 8 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0045...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
383
VMScore
CVE-2009-0072
Microsoft Internet Explorer 6.0 up to and including 8.0 beta2 allows remote malicious users to cause a denial of service (application crash) via an onload=screen[""] attribute value in a BODY element.
Microsoft Internet Explorer 6
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
935
VMScore
CVE-2013-3205
Microsoft Internet Explorer 6 through 8 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 6
1 EDB exploit
383
VMScore
CVE-2013-3909
Microsoft Internet Explorer 6 through 8 allows remote malicious users to read content from a different (1) domain or (2) zone via crafted characters in Cascading Style Sheets (CSS) token sequences, aka "Internet Explorer Information Disclosure Vulnerability."
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6
935
VMScore
CVE-2014-2773
Microsoft Internet Explorer 6 through 8 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2768...
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6
Microsoft Internet Explorer 8
1 EDB exploit
231
VMScore
CVE-2012-6502
Microsoft Internet Explorer prior to 10 allows remote malicious users to obtain sensitive information about the existence of files, and read certain data from files, via a UNC share pathname in the SRC attribute of a SCRIPT element, as demonstrated by reading a name-value pair fr...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 9
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7.0.5730
935
VMScore
CVE-2013-2551
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "In...
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
1 EDB exploit
4 Articles
828
VMScore
CVE-2014-4082
Microsoft Internet Explorer 6 through 10 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
828
VMScore
CVE-2013-1308
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerabil...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
828
VMScore
CVE-2013-0021
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability."
Microsoft Internet Explorer 10
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6
Microsoft Internet Explorer 9
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
CVE-2024-34558
CVE-2024-32674
CVE-2024-34351
XPath injection
CVE-2023-45866
CVE-2024-25528
CVE-2024-25517
path traversal
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »