Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.5 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2004-0549
The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote malicious users to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute...
Microsoft Internet Explorer
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
1 EDB exploit
1 Article
7.5
CVSSv2
CVE-2002-0722
Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious users to misrepresent the source of a file in the File Download dialogue box to trick users into thinking that the file type is safe to download, aka "File Origin Spoofing."
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
7.5
CVSSv2
CVE-2002-0832
Internet Explorer 5, 5.6, and 6 allows remote malicious users to bypass cookie privacy settings and store information across browser sessions via the userData (storeuserData) feature.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
7.5
CVSSv2
CVE-2005-0554
Buffer overflow in the URL processor of Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a URL with a long hostname, aka "URL Parsing Memory Corruption Vulnerability."
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
1 EDB exploit
5
CVSSv2
CVE-2002-0023
Internet Explorer 5.01, 5.5 and 6.0 allows remote malicious users to read arbitrary files via malformed requests to the GetObject function, which bypass some of GetObject's security checks.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
1 EDB exploit
7.5
CVSSv2
CVE-2002-0024
File Download box in Internet Explorer 5.01, 5.5 and 6.0 allows an malicious user to use the Content-Disposition and Content-Type HTML header fields to modify how the name of the file is displayed, which could trick a user into believing that a file is safe to download.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
5
CVSSv2
CVE-2002-0025
Internet Explorer 5.01, 5.5 and 6.0 does not properly handle the Content-Type HTML header field, which allows remote malicious users to modify which application is used to process a document.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
7.5
CVSSv2
CVE-2002-0077
Microsoft Internet Explorer 5.01, 5.5 and 6.0 treats objects invoked on an HTML page with the codebase property as part of Local Computer zone, which allows remote malicious users to invoke executables present on the local system through objects such as the popup object, aka the ...
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
7.5
CVSSv2
CVE-2002-0078
The zone determination function in Microsoft Internet Explorer 5.5 and 6.0 allows remote malicious users to run scripts in the Local Computer zone by embedding the script in a cookie, aka the "Cookie-based Script Execution" vulnerability.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 Github repository
7.5
CVSSv2
CVE-2002-0647
Buffer overflow in a legacy ActiveX control used to display specially formatted text in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious users to execute arbitrary code, aka "Buffer Overrun in Legacy Text Formatting ActiveX Control".
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »