Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2015-7705
The rate limiting feature in NTP 4.x prior to 4.2.8p4 and 4.3.x prior to 4.3.77 allows remote malicious users to have unspecified impact via a large number of crafted requests.
Ntp Ntp
Ntp Ntp 4.2.8
Netapp Oncommand Performance Manager -
Netapp Oncommand Unified Manager -
Netapp Clustered Data Ontap -
Netapp Data Ontap -
Citrix Xenserver 6.0.2
Citrix Xenserver 6.2.0
Citrix Xenserver 6.5
Citrix Xenserver 7.0
Siemens Tim 4r-ie Firmware
Siemens Tim 4r-ie Dnp3 Firmware
7.5
CVSSv2
CVE-2006-5884
Multiple unspecified vulnerabilities in DirectAnimation ActiveX controls for Microsoft Internet Explorer 5.01 through 6 have unknown impact and remote attack vectors, possibly related to (1) Danim.dll and (2) Lmrt.dll, a different set of vulnerabilities than CVE-2006-4446 and CVE...
Microsoft Internet Explorer 5.5
Microsoft Ie 6
Microsoft Internet Explorer 5.1
7.5
CVSSv2
CVE-2006-1188
Microsoft Internet Explorer 5.01 through 6 allows remote malicious users to execute arbitrary code via HTML elements with a certain crafted tag, which leads to memory corruption.
Microsoft Internet Explorer 5.5
Microsoft Ie 6.0
Microsoft Ie 6
Canon Network Camera Server Vb101
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.1
Microsoft Ie 5.1
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 6.0.2800
Microsoft Internet Explorer 6
Microsoft Ie 5.2.3
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2900.2180
1 EDB exploit
7.5
CVSSv2
CVE-2003-0344
Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious users to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page.
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
3 EDB exploits
7.5
CVSSv2
CVE-2002-0371
Buffer overflow in gopher client for Microsoft Internet Explorer 5.1 up to and including 6.0, Proxy Server 2.0, or ISA Server 2000 allows remote malicious users to execute arbitrary code via a gopher:// URL that redirects the user to a real or simulated gopher server that sends a...
Microsoft Internet Explorer 6.0
Microsoft Isa Server 2000
Microsoft Internet Explorer 5.0.1
Microsoft Proxy Server 2.0
Microsoft Internet Explorer 5.5
University Of Minnesota Gopher
1 EDB exploit
7.5
CVSSv2
CVE-2002-0153
Internet Explorer 5.1 for Macintosh allows remote malicious users to bypass security checks and invoke local AppleScripts within a specific HTML element, aka the "Local Applescript Invocation" vulnerability.
Microsoft Ie 4.0
Microsoft Ie 3.0
Microsoft Ie 5.1
Microsoft Ie 4.5
Microsoft Ie 5.0
Microsoft Ie 3.1
Microsoft Ie 4.0.1
1 EDB exploit
7.5
CVSSv2
CVE-2002-0075
Cross-site scripting vulnerability for Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote malicious users to execute arbitrary script as other web users via the error message used in a URL redirect (""302 Object Moved") message.
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0
7.5
CVSSv2
CVE-2002-0152
Buffer overflow in various Microsoft applications for Macintosh allows remote malicious users to cause a denial of service (crash) or execute arbitrary code by invoking the file:// directive with a large number of / characters, which affects Internet Explorer 5.1, Outlook Express...
Microsoft Excel X
Microsoft Ie 5.1
Microsoft Outlook Express 5.0
Microsoft Powerpoint 2001
Microsoft Office V.x
Microsoft Outlook Express 5.0.1
Microsoft Office 2001
Microsoft Powerpoint 98
Microsoft Powerpoint V.x
Microsoft Entourage 2001
Microsoft Entourage V. X
Microsoft Excel 2001
Microsoft Outlook Express 5.0.2
Microsoft Outlook Express 5.0.3
7.5
CVSSv2
CVE-2001-0002
Internet Explorer 5.5 and previous versions allows remote malicious users to obtain the physical location of cached content and open the content in the Local Computer Zone, then use compiled HTML help (.chm) files to execute arbitrary programs.
Microsoft Windows Script Host 5.1
Microsoft Windows Script Host 5.5
Microsoft Internet Explorer
Microsoft Internet Explorer 5.01
1 Github repository
6.8
CVSSv2
CVE-2007-5347
Microsoft Internet Explorer 5.01 through 7 allows remote malicious users to execute arbitrary code via "unexpected method calls to HTML objects," aka "DHTML Object Memory Corruption Vulnerability."
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Ie 6.0
Microsoft Internet Explorer 7.0
Microsoft Ie 5.x
Microsoft Internet Explorer 6
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.2.3
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 7
Microsoft Internet Explorer 5
Microsoft Internet Explorer 6.0.2800
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 7.0.5730.11
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »