Total vulnerabilities in the database
Internet Explorer 5.5 and 6.0 allows remote attackers to read and modify user cookies via Javascript, aka the "Second Cookie Handling Vulnerability."
Software | From | Fixed in |
---|---|---|
microsoft / internet_explorer | 5.5 | 5.5.x |
microsoft / internet_explorer | 6.0 | 6.0.x |