Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.1 vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2006-1186
Microsoft Internet Explorer 5.01 through 6 allows remote malicious users to execute arbitrary code via by instantiating the (1) Mdt2gddr.dll, (2) Mdt2dd.dll, and (3) Mdt2gddo.dll COM objects as ActiveX controls, which leads to memory corruption.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.1
Microsoft Ie 5.0.1
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Ie 6
Microsoft Ie 5.01
1 EDB exploit
1000
VMScore
CVE-2006-1189
Buffer overflow in URLMON.DLL in Microsoft Internet Explorer 5.01 through 6 allows remote malicious users to execute arbitrary code via a crafted URL with an International Domain Name (IDN) using double-byte character sets (DBCS), aka the "Double Byte Character Parsing Memor...
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.01
1 EDB exploit
1000
VMScore
CVE-2006-1190
Microsoft Internet Explorer 5.01 through 6 does not always return the correct IOleClientSite information when dynamically creating an embedded object, which could cause Internet Explorer to run the object in the wrong security context or zone, and allow remote malicious users to ...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
956
VMScore
CVE-2012-1876
Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote malicious users to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
5 EDB exploits
3 Github repositories
1 Article
945
VMScore
CVE-2007-0018
Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote malicious users to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the products include (1) NCTsoft NC...
Altdo Mp3 Record And Edit Audio Master 1.2
Americanshareware Mp3 Wav Converter 3.1.8
Code-it Softare Wave Mp3 Editor 10.1
Dandans Digital Media Products Easy Audio Editor 7.4
Dandans Digital Media Products Full Audio Converter 4.2
Iaudiosoft.com Absolute Sound Recorder 3.4.5
Iaudiosoft.com Absolute Video To Audio Converter 2.7.9
J Hepple Products Fx Movie Joiner And Splitter 6.2.8
J Hepple Products Fx Movie Splitter 6.4.7
Mcfunsoft Audio Editor 6.3.3 Build 489
Mcfunsoft Audio Recorder For Free 6.1
Movavi Convertmovie 4.4
Cdburnerxp Cdburnerxp Pro 3.0.116
Cheetahburner Cheetah Cd Burner 3.56
Digital Borneo Audio Mixer And Editor 1.1.0
Easy Ringtone Maker Easy Ringtone Maker 2.0.5
J Hepple Products Fx Audio Editor 4.7.11
J Hepple Products Fx Audio Tools 7.3.4
Joshua Mediasoft Audio Convertor Plus 2.2
Joshua Mediasoft Video Converter Plus 3.01
Mcfunsoft Ipod Music Converter 5.1
Mcfunsoft Recording To Ipod Solution 5.1
3 EDB exploits
828
VMScore
CVE-2009-1920
The JScript scripting engine 5.1, 5.6, 5.7, and 5.8 in JScript.dll in Microsoft Windows, as used in Internet Explorer, does not properly load decoded scripts into memory before execution, which allows remote malicious users to execute arbitrary code via a crafted web site that tr...
Microsoft Windows Xp -
Microsoft Windows Server 2008 -
Microsoft Windows Vista
Microsoft Windows Vista -
Microsoft Windows 2000 -
Microsoft Windows Xp
Microsoft Windows Server 2003
Microsoft Windows Server 2008
828
VMScore
CVE-2007-3902
Use-after-free vulnerability in the CRecalcProperty function in mshtml.dll in Microsoft Internet Explorer 5.01 through 7 allows remote malicious users to execute arbitrary code by calling the setExpression method and then modifying the outerHTML property of an HTML element, one v...
Microsoft Internet Explorer 5
Microsoft Internet Explorer 5.2.3
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 6.0.2800
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 5.01
Microsoft Ie 5.x
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Ie 6.0
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 7
790
VMScore
CVE-2015-7871
Crypto-NAK packets in ntpd in NTP 4.2.x prior to 4.2.8p4, and 4.3.x prior to 4.3.77 allows remote malicious users to bypass authentication.
Ntp Ntp 4.2.5
Ntp Ntp
Ntp Ntp 4.2.8
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Netapp Oncommand Balance -
Netapp Oncommand Performance Manager -
Netapp Oncommand Unified Manager -
Netapp Clustered Data Ontap -
Netapp Data Ontap -
770
VMScore
CVE-2010-0483
vbscript.dll in VBScript 5.1, 5.6, 5.7, and 5.8 in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, when Internet Explorer is used, allows user-assisted remote malicious users to execute arbitrary code by referencing a (1) local pathname, (2) UNC share pathname, o...
Microsoft Windows 2000
Microsoft Windows Xp
Microsoft Windows 2003 Server
Microsoft Windows Xp -
Microsoft Windows Server 2003
2 EDB exploits
765
VMScore
CVE-2003-0344
Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious users to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page.
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
3 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »