Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.5 vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv2
CVE-2015-7854
Buffer overflow in the password management functionality in NTP 4.2.x prior to 4.2.8p4, and 4.3.x prior to 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.
Ntp Ntp
Ntp Ntp 4.2.8
Netapp Oncommand Balance -
Netapp Oncommand Performance Manager -
Netapp Oncommand Unified Manager -
Netapp Clustered Data Ontap -
Netapp Data Ontap -
6.5
CVSSv2
CVE-2015-7849
Use-after-free vulnerability in ntpd in NTP 4.2.x prior to 4.2.8p4, and 4.3.x prior to 4.3.77 allows remote authenticated users to possibly execute arbitrary code or cause a denial of service (crash) via crafted packets.
Ntp Ntp
Ntp Ntp 4.2.8
Netapp Oncommand Balance -
Netapp Oncommand Performance Manager -
Netapp Oncommand Unified Manager -
Netapp Clustered Data Ontap -
Netapp Data Ontap -
6.4
CVSSv2
CVE-2004-0845
Internet Explorer 5.01, 5.5, and 6 does not properly cache SSL content, which allows remote malicious users to obtain information or spoof content via a web site with the same host name as the target web site, whose content is cached and reused when the user visits the target web...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Ie 6
6.4
CVSSv2
CVE-2002-2311
Microsoft Internet Explorer 6.0 and possibly others allows remote malicious users to upload arbitrary file contents when users press a key corresponding to the JavaScript (1) event.ctrlKey or (2) event.shiftKey onkeydown event contained in a webpage. NOTE: it was reported that th...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Opera Software Opera Web Browser 6.0.1
Microsoft Internet Explorer 5.0.1
6.4
CVSSv2
CVE-2002-1188
Internet Explorer 5.01 up to and including 6.0 allows remote malicious users to identify the path to the Temporary Internet Files folder and obtain user information such as cookies via certain uses of the OBJECT tag, which are not subjected to the proper security checks, aka &quo...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6.0
6.4
CVSSv2
CVE-2002-0976
Internet Explorer 4.0 and later allows remote malicious users to read arbitrary files via a web page that accesses a legacy XML Datasource applet (com.ms.xml.dso.XMLDSO.class) and modifies the base URL to point to the local system, which is trusted by the applet.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
1 EDB exploit
6.4
CVSSv2
CVE-2001-0722
Internet Explorer 5.5 and 6.0 allows remote malicious users to read and modify user cookies via Javascript in an about: URL, aka the "First Cookie Handling Vulnerability."
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
6.4
CVSSv2
CVE-2001-0723
Internet Explorer 5.5 and 6.0 allows remote malicious users to read and modify user cookies via Javascript, aka the "Second Cookie Handling Vulnerability."
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
5.8
CVSSv2
CVE-2009-2057
Microsoft Internet Explorer prior to 8 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle malicious users to execute arbitrary web script by modifying this CONNECT ...
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.70.1155
Microsoft Internet Explorer 4.70.1215
Microsoft Internet Explorer 4.72.2106.8
Microsoft Internet Explorer 4.72.3612.1713
Microsoft Internet Explorer 5.0.1
Microsoft Ie 5.0
Microsoft Internet Explorer 5.00.2919.6307
Microsoft Internet Explorer 5.00.2920.0000
Microsoft Internet Explorer 5.00.3502.1000
Microsoft Internet Explorer 5.01
Microsoft Ie 5.22
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.50.4522.1800
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0.2900
Microsoft Ie 6.0
Microsoft Internet Explorer 6.00.3790.0000
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.00.6000.16386
Microsoft Internet Explorer 3.0.1
5.8
CVSSv2
CVE-2009-2069
Microsoft Internet Explorer prior to 8 displays a cached certificate for a (1) 4xx or (2) 5xx CONNECT response page returned by a proxy server, which allows man-in-the-middle malicious users to spoof an arbitrary https site by letting a browser obtain a valid certificate from thi...
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.0.1
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.70.1215
Microsoft Internet Explorer 4.70.1300
Microsoft Internet Explorer 5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.00.0518.10
Microsoft Internet Explorer 5.00.0910.1309
Microsoft Internet Explorer 5.00.2920.0000
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.00.2462.0000
Microsoft Internet Explorer 6.00.2479.0006
Microsoft Internet Explorer 7
Microsoft Internet Explorer 7.00.6000.16386
Microsoft Internet Explorer 7.00.6000.16441
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »