Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.0 vulnerabilities and exploits
(subscribe to this query)
5.1
CVSSv2
CVE-1999-0981
Internet Explorer 5.01 and previous versions allows a remote malicious user to create a reference to a client window and use a server-side redirect to access local files via that window, aka "Server-side Page Reference Redirect."
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer
1 EDB exploit
2.6
CVSSv2
CVE-2001-0089
Internet Explorer 5.0 up to and including 5.5 allows remote malicious users to read arbitrary files from the client via the INPUT TYPE element in an HTML form, aka the "File Upload via Form" vulnerability.
Microsoft Internet Explorer
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
1 EDB exploit
5
CVSSv2
CVE-2002-1671
Microsoft Internet Explorer 5.0, 5.01, and 5.5 allows remote malicious users to monitor the contents of the clipboard via the getData method of the clipboardData object.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
5
CVSSv2
CVE-2002-0500
Internet Explorer 5.0 up to and including 6.0 allows remote malicious users to determine the existence of files on the client via an IMG tag with a dynsrc property that references the target file, which sets certain elements of the image object such as file size.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
2.6
CVSSv2
CVE-2001-1450
Microsoft Internet Explorer 5.0 up to and including 6.0 allows malicious users to cause a denial of service (browser crash) via a crafted FTP URL such as "/.#./".
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
7.6
CVSSv2
CVE-2000-0464
Internet Explorer 4.x and 5.x allows remote malicious users to execute arbitrary commands via a buffer overflow in the ActiveX parameter parsing capability, aka the "Malformed Component Attribute" vulnerability.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
5.1
CVSSv2
CVE-2000-0465
Internet Explorer 4.x and 5.x does not properly verify the domain of a frame within a browser window, which allows a remote malicious user to read client files via the frame, aka the "Frame Domain Verification" vulnerability.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 4.0
1 EDB exploit
2.6
CVSSv2
CVE-2000-0503
The IFRAME of the WebBrowser control in Internet Explorer 5.01 allows a remote malicious user to violate the cross frame security policy via the NavigateComplete2 event.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.01
5
CVSSv2
CVE-2002-2031
Internet Explorer 5.0, 5.0.1 and 5.5 with JavaScript execution enabled allows remote malicious users to determine the existence of arbitrary files via a script tag with a src parameter that references a non-JavaScript file, then using the onError event handler to monitor the resu...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
2 EDB exploits
2.6
CVSSv2
CVE-2000-0767
The ActiveX control for invoking a scriptlet in Internet Explorer 4.x and 5.x renders arbitrary file types instead of HTML, which allows an malicious user to read arbitrary files, aka the "Scriptlet Rendering" vulnerability.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »