Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2007-3341
Unspecified vulnerability in the FTP implementation in Microsoft Internet Explorer allows remote malicious users to "see a valid memory address" via unspecified vectors, a different issue than CVE-2007-0217.
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 5
10
CVSSv2
CVE-2007-2938
Buffer overflow in the BaseRunner ActiveX control in the Ademco ATNBaseLoader100 Module (ATNBaseLoader100.dll) 5.4.0.6, when Internet Explorer 6 is used, allows remote malicious users to execute arbitrary code via a long argument to the (1) Send485CMD method, and possibly the (2)...
Honeywell Ademco Atnbaseloader100 Module 5.4.0.6
Microsoft Internet Explorer 6
1 EDB exploit
10
CVSSv2
CVE-2000-0061
Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote malicious users to execute Javascript in a different security context while the document is loading.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.01
1 EDB exploit
10
CVSSv2
CVE-1999-0702
Internet Explorer 5.0 and 5.01 allows remote malicious users to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability.
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
1 EDB exploit
9.3
CVSSv2
CVE-2013-0074
Microsoft Silverlight 5, and 5 Developer Runtime, prior to 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote malicious users to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference V...
Microsoft Silverlight
Microsoft Silverlight 5.0.60401.0
Microsoft Silverlight 5.0.60818.0
2 EDB exploits
1 Github repository
3 Articles
9.3
CVSSv2
CVE-2010-0806
Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote malicious users to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in ...
Microsoft Internet Explorer 7
Microsoft Windows 2003 Server
Microsoft Windows Server 2003
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Windows Server 2008
Microsoft Windows Server 2008 -
Microsoft Windows Vista
Microsoft Internet Explorer 6
Microsoft Windows 2000
2 EDB exploits
12 Articles
9.3
CVSSv2
CVE-2009-1547
Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, and 7 allows remote malicious users to execute arbitrary code via a crafted data stream header that triggers memory corruption, aka "Data Stream Header Corruption Vulnerability."
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6
Microsoft Windows 2000
Microsoft Windows Server 2003
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Internet Explorer 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 -
Microsoft Windows Vista
Microsoft Windows Vista -
Microsoft Internet Explorer 8
Microsoft Windows 7 -
2 EDB exploits
9.3
CVSSv2
CVE-2007-3902
Use-after-free vulnerability in the CRecalcProperty function in mshtml.dll in Microsoft Internet Explorer 5.01 through 7 allows remote malicious users to execute arbitrary code by calling the setExpression method and then modifying the outerHTML property of an HTML element, one v...
Microsoft Internet Explorer 5
Microsoft Internet Explorer 5.2.3
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 6.0.2800
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 5.01
Microsoft Ie 5.x
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Ie 6.0
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 7
9.3
CVSSv2
CVE-2007-0018
Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote malicious users to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the products include (1) NCTsoft NC...
Altdo Mp3 Record And Edit Audio Master 1.2
Americanshareware Mp3 Wav Converter 3.1.8
Code-it Softare Wave Mp3 Editor 10.1
Dandans Digital Media Products Easy Audio Editor 7.4
Dandans Digital Media Products Full Audio Converter 4.2
Iaudiosoft.com Absolute Sound Recorder 3.4.5
Iaudiosoft.com Absolute Video To Audio Converter 2.7.9
J Hepple Products Fx Movie Joiner And Splitter 6.2.8
J Hepple Products Fx Movie Splitter 6.4.7
Mcfunsoft Audio Editor 6.3.3 Build 489
Mcfunsoft Audio Recorder For Free 6.1
Movavi Convertmovie 4.4
Cdburnerxp Cdburnerxp Pro 3.0.116
Cheetahburner Cheetah Cd Burner 3.56
Digital Borneo Audio Mixer And Editor 1.1.0
Easy Ringtone Maker Easy Ringtone Maker 2.0.5
J Hepple Products Fx Audio Editor 4.7.11
J Hepple Products Fx Audio Tools 7.3.4
Joshua Mediasoft Audio Convertor Plus 2.2
Joshua Mediasoft Video Converter Plus 3.01
Mcfunsoft Ipod Music Converter 5.1
Mcfunsoft Recording To Ipod Solution 5.1
3 EDB exploits
9.3
CVSSv2
CVE-2006-1303
Multiple unspecified vulnerabilities in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and previous versions allow remote malicious users to execute arbitrary code by instantiating certain COM objects from Wmm2fxa.dll as ActiveX controls including (1) DXImageTransform.Microsoft.M...
Microsoft Ie 5.0.1
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site request forgery
CVE-2024-34351
CVE-2024-1076
CVE-2024-25522
CVE-2024-34547
CVE-2024-4644
unauthorized
remote
CVE-2024-4671
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »