Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 6.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-0976
Internet Explorer 4.0 and later allows remote malicious users to read arbitrary files via a web page that accesses a legacy XML Datasource applet (com.ms.xml.dso.XMLDSO.class) and modifies the base URL to point to the local system, which is trusted by the applet.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2002-0191
Microsoft Internet Explorer 5.01, 5.5 and 6.0 allows remote malicious users to view arbitrary files that contain the "{" character via script containing the cssText property of the stylesheet object, aka "Local Information Disclosure through HTML Object" vulne...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2002-1564
Internet Explorer 5.5 and 6.0 allows remote malicious users to steal potentially sensitive information from cookies via a cookie that contains script which is executed when a page is loaded, aka the "Script within Cookies Reading Cookies" vulnerability.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
NA
CVE-2002-0647
Buffer overflow in a legacy ActiveX control used to display specially formatted text in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious users to execute arbitrary code, aka "Buffer Overrun in Legacy Text Formatting ActiveX Control".
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2002-0648
The legacy <script> data-island capability for XML in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious users to read arbitrary XML files, and portions of other files, via a URL whose "src" attribute redirects to a local file.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2002-0722
Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious users to misrepresent the source of a file in the File Download dialogue box to trick users into thinking that the file type is safe to download, aka "File Origin Spoofing."
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
NA
CVE-2002-0832
Internet Explorer 5, 5.6, and 6 allows remote malicious users to bypass cookie privacy settings and store information across browser sessions via the userData (storeuserData) feature.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
NA
CVE-2002-0189
Cross-site scripting vulnerability in Internet Explorer 6.0 allows remote malicious users to execute scripts in the Local Computer zone via a URL that exploits a local HTML resource file, aka the "Cross-Site Scripting in Local HTML Resource" vulnerability.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2007-0945
Microsoft Internet Explorer 6 SP1 on Windows 2000 SP4; 6 and 7 on Windows XP SP2, or Windows Server 2003 SP1 or SP2; and 7 on Windows Vista allows remote malicious users to execute arbitrary code via certain property methods that may trigger memory corruption, aka "Property ...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 7.0
NA
CVE-2005-0554
Buffer overflow in the URL processor of Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a URL with a long hostname, aka "URL Parsing Memory Corruption Vulnerability."
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5841
file upload
man-in-the-middle
arbitrary
CVE-2024-27801
CVE-2024-28020
CVE-2024-30080
CVE-2024-30069
CVE-2024-5843
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »