Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2007-3341
Unspecified vulnerability in the FTP implementation in Microsoft Internet Explorer allows remote malicious users to "see a valid memory address" via unspecified vectors, a different issue than CVE-2007-0217.
Microsoft Internet Explorer 5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 7.0
10
CVSSv2
CVE-2007-2938
Buffer overflow in the BaseRunner ActiveX control in the Ademco ATNBaseLoader100 Module (ATNBaseLoader100.dll) 5.4.0.6, when Internet Explorer 6 is used, allows remote malicious users to execute arbitrary code via a long argument to the (1) Send485CMD method, and possibly the (2)...
Microsoft Internet Explorer 6
Honeywell Ademco Atnbaseloader100 Module 5.4.0.6
1 EDB exploit
10
CVSSv2
CVE-2000-0061
Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote malicious users to execute Javascript in a different security context while the document is loading.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
1 EDB exploit
10
CVSSv2
CVE-1999-0702
Internet Explorer 5.0 and 5.01 allows remote malicious users to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability.
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
1 EDB exploit
9.3
CVSSv2
CVE-2013-0074
Microsoft Silverlight 5, and 5 Developer Runtime, prior to 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote malicious users to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference V...
Microsoft Silverlight
Microsoft Silverlight 5.0.60401.0
Microsoft Silverlight 5.0.60818.0
2 EDB exploits
1 Github repository
3 Articles
9.3
CVSSv2
CVE-2010-0806
Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote malicious users to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in ...
Microsoft Internet Explorer 7
Microsoft Windows 2003 Server
Microsoft Windows Server 2003
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Windows Server 2008
Microsoft Windows Server 2008 -
Microsoft Windows Vista
Microsoft Internet Explorer 6
Microsoft Windows 2000
2 EDB exploits
12 Articles
9.3
CVSSv2
CVE-2009-1547
Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, and 7 allows remote malicious users to execute arbitrary code via a crafted data stream header that triggers memory corruption, aka "Data Stream Header Corruption Vulnerability."
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6
Microsoft Windows 2000
Microsoft Windows Server 2003
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Internet Explorer 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 -
Microsoft Windows Vista
Microsoft Windows Vista -
Microsoft Internet Explorer 8
Microsoft Windows 7 -
2 EDB exploits
9.3
CVSSv2
CVE-2007-3902
Use-after-free vulnerability in the CRecalcProperty function in mshtml.dll in Microsoft Internet Explorer 5.01 through 7 allows remote malicious users to execute arbitrary code by calling the setExpression method and then modifying the outerHTML property of an HTML element, one v...
Microsoft Internet Explorer 5
Microsoft Ie 6.0
Microsoft Internet Explorer 6
Microsoft Internet Explorer 5.01
Microsoft Ie 5.x
Microsoft Internet Explorer 7
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.2.3
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0.2800
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.0.5730.11
9.3
CVSSv2
CVE-2007-0018
Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote malicious users to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the products include (1) NCTsoft NC...
Mcfunsoft Audio Studio 6.6.3 Build 479
J Hepple Products Fx Movie Joiner And Splitter 6.2.8
Movavi Suite 3.5
Movavi Dvd To Ipod 1.0
Cheetahburner Cheetah Dvd Burner 1.79
Mcfunsoft Ipod Music Converter 5.1
Mystik Media Products Blaze Media Pro 7.0
Xrlly Software Arial Audio Converter 2.3.40
Code-it Softare Wave Mp3 Editor 10.1
Softdiv Softare Videozilla 2.5
Code-it Softare Abasic Editor 10.1
Dandans Digital Media Products Music Editing Master 5.2
Magicvideosoftare Magic Music Editor 5.2.2
Mcfunsoft Recording To Ipod Solution 5.1
Softdiv Softare Dexster 3.0
Nctsoft Products Nctaudioeditor 2.7.1
Dandans Digital Media Products Easy Audio Editor 7.4
Cdburnerxp Cdburnerxp Pro 3.0.116
Dandans Digital Media Products Full Audio Converter 4.2
Magicvideosoftare Magic Audio Converter 8.2.6 Build 719
J Hepple Products Fx Audio Editor 4.7.11
Virtual Cd Virtual Cd 7.1.0.2
3 EDB exploits
9.3
CVSSv2
CVE-2006-1303
Multiple unspecified vulnerabilities in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and previous versions allow remote malicious users to execute arbitrary code by instantiating certain COM objects from Wmm2fxa.dll as ActiveX controls including (1) DXImageTransform.Microsoft.M...
Microsoft Ie 5.0.1
Microsoft Ie 6.0
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »