Vulnerabilities > Microsoft > Internet Explorer > 6.0

DATE CVE VULNERABILITY TITLE RISK
2002-03-25 CVE-2002-0101 Unspecified vulnerability in Microsoft Internet Explorer 5.5/6.0
Microsoft Internet Explorer 6.0 and earlier allows local users to cause a denial of service via an infinite loop for modeless dialogs showModelessDialog, which causes CPU usage while the focus for the dialog is not released.
network
low complexity
microsoft
5.0
2002-03-08 CVE-2002-0057 Unspecified vulnerability in Microsoft products
XMLHTTP control in Microsoft XML Core Services 2.6 and later does not properly handle IE Security Zone settings, which allows remote attackers to read arbitrary files by specifying a local file as an XML Data Source.
network
low complexity
microsoft
5.0
2002-03-08 CVE-2002-0052 Unspecified vulnerability in Microsoft Internet Explorer
Internet Explorer 6.0 and earlier does not properly handle VBScript in certain domain security checks, which allows remote attackers to read arbitrary files.
network
low complexity
microsoft
5.0
2002-03-08 CVE-2002-0027 Unspecified vulnerability in Microsoft Internet Explorer 5.5/6.0
Internet Explorer 5.5 and 6.0 allows remote attackers to read certain files and spoof the URL in the address bar by using the Document.open function to pass information between two frames from different domains, a new variant of the "Frame Domain Verification" vulnerability described in MS:MS01-058/CAN-2001-0874.
network
low complexity
microsoft
7.5
2002-03-08 CVE-2002-0026 Unspecified vulnerability in Microsoft Internet Explorer 5.5/6.0
Internet Explorer 5.5 and 6.0 allows remote attackers to bypass restrictions for executing scripts via an object that processes asynchronous events after the initial security checks have been made.
network
low complexity
microsoft
7.5
2002-03-08 CVE-2002-0025 Unspecified vulnerability in Microsoft Internet Explorer 5.01/5.5/6.0
Internet Explorer 5.01, 5.5 and 6.0 does not properly handle the Content-Type HTML header field, which allows remote attackers to modify which application is used to process a document.
network
low complexity
microsoft
5.0
2002-03-08 CVE-2002-0024 Unspecified vulnerability in Microsoft Internet Explorer 5.01/5.5/6.0
File Download box in Internet Explorer 5.01, 5.5 and 6.0 allows an attacker to use the Content-Disposition and Content-Type HTML header fields to modify how the name of the file is displayed, which could trick a user into believing that a file is safe to download.
network
low complexity
microsoft
7.5
2002-03-08 CVE-2002-0023 Unspecified vulnerability in Microsoft Internet Explorer 5.01/5.5/6.0
Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to read arbitrary files via malformed requests to the GetObject function, which bypass some of GetObject's security checks.
network
low complexity
microsoft
5.0
2002-03-08 CVE-2002-0022 Unspecified vulnerability in Microsoft Internet Explorer 5.5/6.0
Buffer overflow in the implementation of an HTML directive in mshtml.dll in Internet Explorer 5.5 and 6.0 allows remote attackers to execute arbitrary code via a web page that specifies embedded ActiveX controls in a way that causes 2 Unicode strings to be concatenated.
network
low complexity
microsoft
7.5
2002-01-13 CVE-2002-0077 Unspecified vulnerability in Microsoft Internet Explorer 5.0.1/5.5/6.0
Microsoft Internet Explorer 5.01, 5.5 and 6.0 treats objects invoked on an HTML page with the codebase property as part of Local Computer zone, which allows remote attackers to invoke executables present on the local system through objects such as the popup object, aka the "Local Executable Invocation via Object tag" vulnerability.
network
low complexity
microsoft
7.5