Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.01 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-1186
Microsoft Internet Explorer 5.01 through 6 allows remote malicious users to execute arbitrary code via by instantiating the (1) Mdt2gddr.dll, (2) Mdt2dd.dll, and (3) Mdt2gddo.dll COM objects as ActiveX controls, which leads to memory corruption.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.1
Microsoft Ie 5.0.1
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Ie 6
Microsoft Ie 5.01
1 EDB exploit
NA
CVE-2001-0089
Internet Explorer 5.0 up to and including 5.5 allows remote malicious users to read arbitrary files from the client via the INPUT TYPE element in an HTML form, aka the "File Upload via Form" vulnerability.
Microsoft Internet Explorer
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
1 EDB exploit
NA
CVE-2006-2384
Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and previous versions allows remote malicious users to conduct spoofing and phishing attacks by using a modal browser window in a way that preserves the original address bar and trusted UI of a trusted site, even after the browser ha...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer
NA
CVE-2001-0154
HTML e-mail feature in Internet Explorer 5.5 and previous versions allows malicious users to execute attachments by setting an unusual MIME type for the attachment, which Internet Explorer does not process correctly.
Microsoft Internet Explorer
Microsoft Internet Explorer 5.01
NA
CVE-2001-0338
Internet Explorer 5.5 and previous versions does not properly validate digital certificates when Certificate Revocation List (CRL) checking is enabled, which could allow remote malicious users to spoof trusted web sites, aka the "Server certificate validation vulnerability.&...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer
NA
CVE-2001-0246
Internet Explorer 5.5 and previous versions does not properly verify the domain of a frame within a browser window, which allows remote web site operators to read certain files on the client by sending information from a local frame to a frame in a different domain, aka a variant...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer
NA
CVE-2004-0549
The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote malicious users to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute...
Microsoft Internet Explorer
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
1 EDB exploit
1 Article
NA
CVE-2001-0092
A function in Internet Explorer 5.0 up to and including 5.5 does not properly verify the domain of a frame within a browser window, which allows a remote malicious user to read client files, aka a new variant of the "Frame Domain Verification" vulnerability.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
NA
CVE-2008-2258
Microsoft Internet Explorer 5.01, 6, and 7 accesses uninitialized memory in certain conditions, which allows remote malicious users to cause a denial of service (crash) and execute arbitrary code via vectors related to a document object "appended in a specific order" wi...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 5.01
NA
CVE-2002-0023
Internet Explorer 5.01, 5.5 and 6.0 allows remote malicious users to read arbitrary files via malformed requests to the GetObject function, which bypass some of GetObject's security checks.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »