Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.01 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-1186
Microsoft Internet Explorer 5.01 through 6 allows remote malicious users to execute arbitrary code via by instantiating the (1) Mdt2gddr.dll, (2) Mdt2dd.dll, and (3) Mdt2gddo.dll COM objects as ActiveX controls, which leads to memory corruption.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.1
Microsoft Ie 5.0.1
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Ie 6
Microsoft Ie 5.01
1 EDB exploit
NA
CVE-2001-0089
Internet Explorer 5.0 up to and including 5.5 allows remote malicious users to read arbitrary files from the client via the INPUT TYPE element in an HTML form, aka the "File Upload via Form" vulnerability.
Microsoft Internet Explorer
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
1 EDB exploit
NA
CVE-2001-0154
HTML e-mail feature in Internet Explorer 5.5 and previous versions allows malicious users to execute attachments by setting an unusual MIME type for the attachment, which Internet Explorer does not process correctly.
Microsoft Internet Explorer
Microsoft Internet Explorer 5.01
NA
CVE-2001-0246
Internet Explorer 5.5 and previous versions does not properly verify the domain of a frame within a browser window, which allows remote web site operators to read certain files on the client by sending information from a local frame to a frame in a different domain, aka a variant...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer
NA
CVE-2001-0338
Internet Explorer 5.5 and previous versions does not properly validate digital certificates when Certificate Revocation List (CRL) checking is enabled, which could allow remote malicious users to spoof trusted web sites, aka the "Server certificate validation vulnerability.&...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer
NA
CVE-2006-2384
Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and previous versions allows remote malicious users to conduct spoofing and phishing attacks by using a modal browser window in a way that preserves the original address bar and trusted UI of a trusted site, even after the browser ha...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer
NA
CVE-2004-0549
The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote malicious users to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute...
Microsoft Internet Explorer
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
1 EDB exploit
1 Article
NA
CVE-2002-0025
Internet Explorer 5.01, 5.5 and 6.0 does not properly handle the Content-Type HTML header field, which allows remote malicious users to modify which application is used to process a document.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
NA
CVE-2005-0555
Buffer overflow in the Content Advisor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote malicious users to execute arbitrary code via a crafted Content Advisor file, aka "Content Advisor Memory Corruption Vulnerability."
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
1 EDB exploit
NA
CVE-2005-0554
Buffer overflow in the URL processor of Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a URL with a long hostname, aka "URL Parsing Memory Corruption Vulnerability."
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »