Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2015-7871
Crypto-NAK packets in ntpd in NTP 4.2.x prior to 4.2.8p4, and 4.3.x prior to 4.3.77 allows remote malicious users to bypass authentication.
Ntp Ntp 4.2.5
Ntp Ntp
Ntp Ntp 4.2.8
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Netapp Oncommand Balance -
Netapp Oncommand Performance Manager -
Netapp Oncommand Unified Manager -
Netapp Clustered Data Ontap -
Netapp Data Ontap -
7.5
CVSSv2
CVE-2006-5884
Multiple unspecified vulnerabilities in DirectAnimation ActiveX controls for Microsoft Internet Explorer 5.01 through 6 have unknown impact and remote attack vectors, possibly related to (1) Danim.dll and (2) Lmrt.dll, a different set of vulnerabilities than CVE-2006-4446 and CVE...
Microsoft Internet Explorer 5.5
Microsoft Ie 6
Microsoft Internet Explorer 5.1
7.5
CVSSv2
CVE-2006-1188
Microsoft Internet Explorer 5.01 through 6 allows remote malicious users to execute arbitrary code via HTML elements with a certain crafted tag, which leads to memory corruption.
Microsoft Internet Explorer 5.5
Microsoft Ie 6.0
Microsoft Ie 6
Canon Network Camera Server Vb101
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.1
Microsoft Ie 5.1
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 6.0.2800
Microsoft Internet Explorer 6
Microsoft Ie 5.2.3
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2900.2180
1 EDB exploit
7.5
CVSSv2
CVE-2003-0344
Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious users to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page.
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
3 EDB exploits
7.5
CVSSv2
CVE-2002-0371
Buffer overflow in gopher client for Microsoft Internet Explorer 5.1 up to and including 6.0, Proxy Server 2.0, or ISA Server 2000 allows remote malicious users to execute arbitrary code via a gopher:// URL that redirects the user to a real or simulated gopher server that sends a...
Microsoft Internet Explorer 6.0
Microsoft Isa Server 2000
Microsoft Internet Explorer 5.0.1
Microsoft Proxy Server 2.0
Microsoft Internet Explorer 5.5
University Of Minnesota Gopher
1 EDB exploit
7.5
CVSSv2
CVE-2002-0153
Internet Explorer 5.1 for Macintosh allows remote malicious users to bypass security checks and invoke local AppleScripts within a specific HTML element, aka the "Local Applescript Invocation" vulnerability.
Microsoft Ie 4.0
Microsoft Ie 3.0
Microsoft Ie 5.1
Microsoft Ie 4.5
Microsoft Ie 5.0
Microsoft Ie 3.1
Microsoft Ie 4.0.1
1 EDB exploit
7.5
CVSSv2
CVE-2002-0152
Buffer overflow in various Microsoft applications for Macintosh allows remote malicious users to cause a denial of service (crash) or execute arbitrary code by invoking the file:// directive with a large number of / characters, which affects Internet Explorer 5.1, Outlook Express...
Microsoft Excel X
Microsoft Ie 5.1
Microsoft Outlook Express 5.0
Microsoft Powerpoint 2001
Microsoft Office V.x
Microsoft Outlook Express 5.0.1
Microsoft Office 2001
Microsoft Powerpoint 98
Microsoft Powerpoint V.x
Microsoft Entourage 2001
Microsoft Entourage V. X
Microsoft Excel 2001
Microsoft Outlook Express 5.0.2
Microsoft Outlook Express 5.0.3
7.5
CVSSv2
CVE-2002-0075
Cross-site scripting vulnerability for Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote malicious users to execute arbitrary script as other web users via the error message used in a URL redirect (""302 Object Moved") message.
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0
7.5
CVSSv2
CVE-2001-0002
Internet Explorer 5.5 and previous versions allows remote malicious users to obtain the physical location of cached content and open the content in the Local Computer Zone, then use compiled HTML help (.chm) files to execute arbitrary programs.
Microsoft Windows Script Host 5.1
Microsoft Windows Script Host 5.5
Microsoft Internet Explorer
Microsoft Internet Explorer 5.01
1 Github repository
6.8
CVSSv2
CVE-2007-5344
Microsoft Internet Explorer 5.01 through 7 allows remote malicious users to execute arbitrary code via a crafted website using Javascript that creates, modifies, deletes, and accesses document objects using the tags property, which triggers heap corruption, related to uninitializ...
Microsoft Internet Explorer 5
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0.2800
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Ie 5.x
Microsoft Internet Explorer 6
Microsoft Ie 6.0
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.2.3
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 7
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »