Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.0.1 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2002-1185
Internet Explorer 5.01 up to and including 6.0 does not properly check certain parameters of a PNG file when opening it, which allows remote malicious users to cause a denial of service (crash) by triggering a heap-based buffer overflow using invalid length codes during decompres...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.0.1
Microsoft Ie 6.0
5
CVSSv2
CVE-2002-1186
Internet Explorer 5.01 up to and including 6.0 does not properly perform security checks on certain encoded characters within a URL, which allows a remote malicious user to steal potentially sensitive information from a user by redirecting the user to another site that has that i...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
5
CVSSv2
CVE-2002-0461
Internet Explorer 5.01 through 6 allows remote malicious users to cause a denial of service (application crash) via Javascript in a web page that calls location.replace on itself, causing a loop.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.0.1
1 EDB exploit
5
CVSSv2
CVE-2002-0500
Internet Explorer 5.0 up to and including 6.0 allows remote malicious users to determine the existence of files on the client via an IMG tag with a dynsrc property that references the target file, which sets certain elements of the image object such as file size.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
5
CVSSv2
CVE-2002-0052
Internet Explorer 6.0 and previous versions does not properly handle VBScript in certain domain security checks, which allows remote malicious users to read arbitrary files.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6.0
4.3
CVSSv2
CVE-2002-2435
The Cascading Style Sheets (CSS) implementation in Microsoft Internet Explorer 8.0 and previous versions does not properly handle the :visited pseudo-class, which allows remote malicious users to obtain sensitive information about visited web pages via a crafted HTML document, a ...
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 7.0.5730
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 6.00.3663.0000
Microsoft Internet Explorer 6.00.2600.0000
Microsoft Internet Explorer 5.00.3105.0106
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.00.2614.3500
Microsoft Internet Explorer 5.00.2314.1003
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.50.4807.2300
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.00.3700.1000
Microsoft Internet Explorer 5.50.3825.1300
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.71.544
Microsoft Internet Explorer 4.71.1008.3
Microsoft Internet Explorer 3.1
4.3
CVSSv2
CVE-2011-2382
Microsoft Internet Explorer 8 and previous versions, and Internet Explorer 9 beta, does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote malicious users to read cookie files via vectors involving an IFRAME element with a SRC attribute cont...
Microsoft Internet Explorer
Microsoft Internet Explorer 5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 5.01
Microsoft Ie 9
Microsoft Internet Explorer 7
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 3.0.1
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.1
Microsoft Internet Explorer 3.2
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 4.5
Microsoft Internet Explorer 4.40.308
Microsoft Internet Explorer 4.40.520
Microsoft Internet Explorer 4.70.1155
Microsoft Internet Explorer 4.70.1158
Microsoft Internet Explorer 4.70.1215
4.3
CVSSv2
CVE-2007-5158
The focus handling for the onkeydown event in Microsoft Internet Explorer 6.0 allows remote malicious users to change field focus and copy keystrokes via a certain use of a JavaScript htmlFor attribute, as demonstrated by changing focus from a textarea to a file upload field, a r...
Microsoft Internet Explorer 6.0
1 EDB exploit
4.3
CVSSv2
CVE-2007-4848
Microsoft Internet Explorer 4.0 through 7 allows remote malicious users to determine the existence of local files that have associated images via a res:// URI in the src property of a JavaScript Image object, as demonstrated by the URI for a bitmap image resource within a (1) .ex...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Ie 5.0 Ta3
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 4.5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Ie 5.x
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Ie 4.x
Microsoft Internet Explorer 5
Microsoft Ie 5.0
Microsoft Internet Explorer 5.1
2.6
CVSSv2
CVE-2001-1450
Microsoft Internet Explorer 5.0 up to and including 6.0 allows malicious users to cause a denial of service (browser crash) via a crafted FTP URL such as "/.#./".
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »