Vulnerabilities > Microsoft > Internet Explorer > 6.0.2600

DATE CVE VULNERABILITY TITLE RISK
2006-04-11 CVE-2006-1188 Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via HTML elements with a certain crafted tag, which leads to memory corruption.
network
low complexity
microsoft canon
7.5
2005-12-31 CVE-2005-4844 Unspecified vulnerability in Microsoft Internet Explorer
The CLSID_ApprenticeICW control allows remote attackers to cause a denial of service (Internet Explorer crash) by creating a COM object of the class associated with the control's CLSID, which is not intended for use within Internet Explorer.
network
microsoft
7.1
2005-12-31 CVE-2005-4827 Internet Explorer 6.0, and possibly other versions, allows remote attackers to bypass the same origin security policy and make requests outside of the intended domain by calling open on an XMLHttpRequest object (Microsoft.XMLHTTP) and using tab, newline, and carriage return characters within the first argument (method name), which is supported by some proxy servers that convert tabs to spaces.
network
low complexity
microsoft canon
7.5
2004-12-31 CVE-2004-2307 Unspecified vulnerability in Microsoft Internet Explorer and Windows XP
Microsoft Internet Explorer 6.0.2600 on Windows XP allows remote attackers to cause a denial of service (browser crash) via a shell: URI with double backslashes (\\) in an HTML tag such as IFRAME or A.
network
low complexity
microsoft
5.0
2004-12-31 CVE-2004-2011 Unspecified vulnerability in Microsoft Internet Explorer 6.0.2600
msxml3.dll in Internet Explorer 6.0.2600.0 allows remote attackers to cause a denial of service (crash) via a single & (ampersand) in a <Ref href> link, which triggers a parsing error, possibly due to missing portions of the URI.
network
high complexity
microsoft
2.6
2002-12-31 CVE-2002-2125 Unspecified vulnerability in Microsoft IE and Internet Explorer
Internet Explorer 6.0 does not warn users when an expired certificate authority (CA) certificate is submitted to the user and a newer CA certificate is in the user's local repository, which could allow remote attackers to decrypt web sessions via a man-in-the-middle (MITM) attack.
network
low complexity
microsoft
6.4