Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-0981
Internet Explorer 5.01 and previous versions allows a remote malicious user to create a reference to a client window and use a server-side redirect to access local files via that window, aka "Server-side Page Reference Redirect."
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer
1 EDB exploit
NA
CVE-2001-0089
Internet Explorer 5.0 up to and including 5.5 allows remote malicious users to read arbitrary files from the client via the INPUT TYPE element in an HTML form, aka the "File Upload via Form" vulnerability.
Microsoft Internet Explorer
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
1 EDB exploit
NA
CVE-2000-0503
The IFRAME of the WebBrowser control in Internet Explorer 5.01 allows a remote malicious user to violate the cross frame security policy via the NavigateComplete2 event.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.01
NA
CVE-2002-0500
Internet Explorer 5.0 up to and including 6.0 allows remote malicious users to determine the existence of files on the client via an IMG tag with a dynsrc property that references the target file, which sets certain elements of the image object such as file size.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
NA
CVE-2000-0465
Internet Explorer 4.x and 5.x does not properly verify the domain of a frame within a browser window, which allows a remote malicious user to read client files via the frame, aka the "Frame Domain Verification" vulnerability.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 4.0
1 EDB exploit
NA
CVE-2000-0464
Internet Explorer 4.x and 5.x allows remote malicious users to execute arbitrary commands via a buffer overflow in the ActiveX parameter parsing capability, aka the "Malformed Component Attribute" vulnerability.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
NA
CVE-2000-0156
Internet Explorer 4.x and 5.x allows remote web servers to access files on the client that are outside of its security domain, aka the "Image Source Redirect" vulnerability.
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.01
1 EDB exploit
NA
CVE-2002-2031
Internet Explorer 5.0, 5.0.1 and 5.5 with JavaScript execution enabled allows remote malicious users to determine the existence of arbitrary files via a script tag with a src parameter that references a non-JavaScript file, then using the onError event handler to monitor the resu...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
2 EDB exploits
NA
CVE-2002-1671
Microsoft Internet Explorer 5.0, 5.01, and 5.5 allows remote malicious users to monitor the contents of the clipboard via the getData method of the clipboardData object.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
NA
CVE-2006-5162
wininet.dll in Microsoft Internet Explorer 6.0 SP2 and previous versions allows remote malicious users to cause a denial of service (unhandled exception and crash) via a long Content-Type header, which triggers a stack overflow.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
administrator privileges
CVE-2024-1579
hardcoded
CVE-2023-20198
CVE-2024-33587
CVE-2024-33449
CVE-2024-4308
HTML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »