Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.5 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2004-0549
The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote malicious users to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute...
Microsoft Internet Explorer
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
1 Article
7.5
CVSSv2
CVE-2005-0555
Buffer overflow in the Content Advisor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote malicious users to execute arbitrary code via a crafted Content Advisor file, aka "Content Advisor Memory Corruption Vulnerability."
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
7.5
CVSSv2
CVE-2004-0566
Integer overflow in imgbmp.cxx for Windows 2000 allows remote malicious users to execute arbitrary code via a BMP image with a large bfOffBits value.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
5
CVSSv2
CVE-2002-0648
The legacy <script> data-island capability for XML in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious users to read arbitrary XML files, and portions of other files, via a URL whose "src" attribute redirects to a local file.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
5
CVSSv2
CVE-2002-0023
Internet Explorer 5.01, 5.5 and 6.0 allows remote malicious users to read arbitrary files via malformed requests to the GetObject function, which bypass some of GetObject's security checks.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
7.5
CVSSv2
CVE-2002-0024
File Download box in Internet Explorer 5.01, 5.5 and 6.0 allows an malicious user to use the Content-Disposition and Content-Type HTML header fields to modify how the name of the file is displayed, which could trick a user into believing that a file is safe to download.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
5
CVSSv2
CVE-2002-0025
Internet Explorer 5.01, 5.5 and 6.0 does not properly handle the Content-Type HTML header field, which allows remote malicious users to modify which application is used to process a document.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
7.5
CVSSv2
CVE-2002-0077
Microsoft Internet Explorer 5.01, 5.5 and 6.0 treats objects invoked on an HTML page with the codebase property as part of Local Computer zone, which allows remote malicious users to invoke executables present on the local system through objects such as the popup object, aka the ...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6.0
7.5
CVSSv2
CVE-2002-0078
The zone determination function in Microsoft Internet Explorer 5.5 and 6.0 allows remote malicious users to run scripts in the Local Computer zone by embedding the script in a cookie, aka the "Cookie-based Script Execution" vulnerability.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6.0
1 Github repository
10
CVSSv2
CVE-2004-0978
Heap-based buffer overflow in the Hrtbeat.ocx (Heartbeat) ActiveX control for Internet Explorer 5.01 through 6, when users who visit online gaming sites that are associated with MSN, allows remote malicious users to execute arbitrary code via the SetupData parameter.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »