Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-1999-0858
Internet Explorer 5 allows a remote malicious user to modify the IE client's proxy configuration via a malicious Web Proxy Auto-Discovery (WPAD) server.
Microsoft Internet Explorer 5.0
7.5
CVSSv2
CVE-2005-0053
Internet Explorer 5.01, 5.5, and 6 allows remote malicious users to execute arbitrary code via drag and drop events, aka the "Drag-and-Drop Vulnerability."
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Windows 2000
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows Me
Microsoft Windows 98
Microsoft Windows 98se
Microsoft Windows 2003 Server R2
1 EDB exploit
7.5
CVSSv2
CVE-1999-0989
Buffer overflow in Internet Explorer 5 directshow filter (MSDXM.OCX) allows remote malicious users to execute commands via the vnd.ms.radio protocol.
Microsoft Ie 5.0
Microsoft Ie 5
1 EDB exploit
10
CVSSv2
CVE-2007-2938
Buffer overflow in the BaseRunner ActiveX control in the Ademco ATNBaseLoader100 Module (ATNBaseLoader100.dll) 5.4.0.6, when Internet Explorer 6 is used, allows remote malicious users to execute arbitrary code via a long argument to the (1) Send485CMD method, and possibly the (2)...
Honeywell Ademco Atnbaseloader100 Module 5.4.0.6
Microsoft Internet Explorer 6
1 EDB exploit
2.6
CVSSv2
CVE-2000-0519
Internet Explorer 4.x and 5.x does not properly re-validate an SSL certificate if the user establishes a new SSL session with the same server during the same Internet Explorer session, aka one of two different "SSL Certificate Validation" vulnerabilities.
Microsoft Ie 4.0.1
Microsoft Ie 5.0
Microsoft Ie 4.0
Microsoft Ie 5.0.1
Microsoft Internet Explorer 4.0
5.1
CVSSv2
CVE-2000-0329
A Microsoft ActiveX control allows a remote malicious user to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the "Active Setup Control" vulnerability.
Microsoft Ie 4.1
Microsoft Outlook 98
Microsoft Outlook Express 4.27.3110.1
Microsoft Internet Explorer 4.0
Microsoft Ie 4.0.1
Microsoft Ie 5.0
Microsoft Outlook Express 4.72.2106.4
Microsoft Outlook Express 4.72.3120.0
Microsoft Outlook Express 4.72.3612.1700
Microsoft Outlook Express 5.0
Microsoft Ie 4.0
Microsoft Ie 5
Microsoft Outlook 2000
1 EDB exploit
7.2
CVSSv2
CVE-1999-0839
Windows NT Task Scheduler installed with Internet Explorer 5 allows a user to gain privileges by modifying the job after it has been scheduled.
Microsoft Ie 5.0
Microsoft Ie 5
10
CVSSv2
CVE-2007-3341
Unspecified vulnerability in the FTP implementation in Microsoft Internet Explorer allows remote malicious users to "see a valid memory address" via unspecified vectors, a different issue than CVE-2007-0217.
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 5
5.1
CVSSv2
CVE-2000-1061
Microsoft Virtual Machine (VM) in Internet Explorer 4.x and 5.x allows an unsigned applet to create and use ActiveX controls, which allows a remote malicious user to bypass Internet Explorer's security settings and execute arbitrary commands via a malicious web page or email...
Microsoft Ie 4.x
Microsoft Ie 5.x
1 EDB exploit
7.5
CVSSv2
CVE-2002-0153
Internet Explorer 5.1 for Macintosh allows remote malicious users to bypass security checks and invoke local AppleScripts within a specific HTML element, aka the "Local Applescript Invocation" vulnerability.
Microsoft Ie 4.0
Microsoft Ie 3.0
Microsoft Ie 5.1
Microsoft Ie 4.5
Microsoft Ie 5.0
Microsoft Ie 3.1
Microsoft Ie 4.0.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »