Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft ie 5.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-0153
Internet Explorer 5.1 for Macintosh allows remote malicious users to bypass security checks and invoke local AppleScripts within a specific HTML element, aka the "Local Applescript Invocation" vulnerability.
Microsoft Ie 4.0
Microsoft Ie 3.0
Microsoft Ie 5.1
Microsoft Ie 4.5
Microsoft Ie 5.0
Microsoft Ie 3.1
Microsoft Ie 4.0.1
1 EDB exploit
5
CVSSv2
CVE-2005-2087
Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Ie 5.2.3
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.1
Microsoft Ie 5.1
Microsoft Ie 6
1 EDB exploit
10
CVSSv2
CVE-2006-1186
Microsoft Internet Explorer 5.01 through 6 allows remote malicious users to execute arbitrary code via by instantiating the (1) Mdt2gddr.dll, (2) Mdt2dd.dll, and (3) Mdt2gddo.dll COM objects as ActiveX controls, which leads to memory corruption.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.1
Microsoft Ie 5.0.1
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Ie 6
Microsoft Ie 5.01
1 EDB exploit
7.5
CVSSv2
CVE-2006-1188
Microsoft Internet Explorer 5.01 through 6 allows remote malicious users to execute arbitrary code via HTML elements with a certain crafted tag, which leads to memory corruption.
Microsoft Internet Explorer 5.5
Microsoft Ie 6.0
Microsoft Ie 6
Canon Network Camera Server Vb101
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.1
Microsoft Ie 5.1
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 6.0.2800
Microsoft Internet Explorer 6
Microsoft Ie 5.2.3
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2900.2180
1 EDB exploit
5.1
CVSSv2
CVE-2006-4687
Microsoft Internet Explorer 5.01 through 6 allows remote malicious users to execute arbitrary code via crafted layout combinations involving DIV tags and HTML CSS float properties that trigger memory corruption, aka "HTML Rendering Memory Corruption Vulnerability."
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.5
Microsoft Ie 6
7.5
CVSSv2
CVE-2006-5884
Multiple unspecified vulnerabilities in DirectAnimation ActiveX controls for Microsoft Internet Explorer 5.01 through 6 have unknown impact and remote attack vectors, possibly related to (1) Danim.dll and (2) Lmrt.dll, a different set of vulnerabilities than CVE-2006-4446 and CVE...
Microsoft Internet Explorer 5.5
Microsoft Ie 6
Microsoft Internet Explorer 5.1
5
CVSSv2
CVE-2009-2576
Microsoft Internet Explorer 6.0.2900.2180 and previous versions allows remote malicious users to cause a denial of service (CPU and memory consumption) via a long Unicode string argument to the write method, a related issue to CVE-2009-2479. NOTE: it was later reported that 7.0.6...
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.0.1
Microsoft Ie 3.1
Microsoft Internet Explorer 3.2
Microsoft Internet Explorer 4.0.1
Microsoft Ie 4.0
Microsoft Ie 4.0a
Microsoft Internet Explorer 4.1
Microsoft Ie 4.5
Microsoft Internet Explorer 4.72.3110.8
Microsoft Internet Explorer 4.72.3612.1713
Microsoft Ie 5.0.1
Microsoft Ie 5.0
Microsoft Internet Explorer 5.00.2014.0216
Microsoft Internet Explorer 5.00.2516.1900
Microsoft Internet Explorer 5.00.3502.1000
Microsoft Internet Explorer 5.00.3700.1000
Microsoft Ie 6
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 5.50.4807.2300
Microsoft Internet Explorer 5.50.4522.1800
Microsoft Internet Explorer 5.5
5
CVSSv2
CVE-2001-1489
Microsoft Internet Explorer 6 allows remote malicious users to cause a denial of service (CPU consumption and memory leak) via a web page with a large number of images.
Microsoft Ie 6
1 EDB exploit
4.3
CVSSv2
CVE-2007-4848
Microsoft Internet Explorer 4.0 through 7 allows remote malicious users to determine the existence of local files that have associated images via a res:// URI in the src property of a JavaScript Image object, as demonstrated by the URI for a bitmap image resource within a (1) .ex...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Ie 5.0 Ta3
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 4.5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Ie 5.x
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Ie 4.x
Microsoft Internet Explorer 5
Microsoft Ie 5.0
Microsoft Internet Explorer 5.1
6.8
CVSSv2
CVE-2007-5347
Microsoft Internet Explorer 5.01 through 7 allows remote malicious users to execute arbitrary code via "unexpected method calls to HTML objects," aka "DHTML Object Memory Corruption Vulnerability."
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Ie 6.0
Microsoft Internet Explorer 7.0
Microsoft Ie 5.x
Microsoft Internet Explorer 6
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.2.3
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 7
Microsoft Internet Explorer 5
Microsoft Internet Explorer 6.0.2800
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 7.0.5730.11
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-38002
CVE-2006-4304
CVE-2024-4336
CVE-2024-33437
CVE-2024-4340
CVE-2024-27956
privilege
insecure direct object reference
XSS
item search icon">CVE-2024-25938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »