Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.01 vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2007-3041
Unspecified vulnerability in the pdwizard.ocx ActiveX object for Internet Explorer 5.01, 6 SP1, and 7 allows remote malicious users to execute arbitrary code via unknown vectors related to Microsoft Visual Basic 6 objects and memory corruption, aka "ActiveX Object Memory Cor...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
445
VMScore
CVE-2004-1376
Directory traversal vulnerability in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious FTP servers to overwrite arbitrary files via .. (dot dot) sequences in filenames returned from a LIST command.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
445
VMScore
CVE-2002-1564
Internet Explorer 5.5 and 6.0 allows remote malicious users to steal potentially sensitive information from cookies via a cookie that contains script which is executed when a page is loaded, aka the "Script within Cookies Reading Cookies" vulnerability.
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
231
VMScore
CVE-2001-0092
A function in Internet Explorer 5.0 up to and including 5.5 does not properly verify the domain of a frame within a browser window, which allows a remote malicious user to read client files, aka a new variant of the "Frame Domain Verification" vulnerability.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
505
VMScore
CVE-2002-0023
Internet Explorer 5.01, 5.5 and 6.0 allows remote malicious users to read arbitrary files via malformed requests to the GetObject function, which bypass some of GetObject's security checks.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
1 EDB exploit
445
VMScore
CVE-2002-0025
Internet Explorer 5.01, 5.5 and 6.0 does not properly handle the Content-Type HTML header field, which allows remote malicious users to modify which application is used to process a document.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
755
VMScore
CVE-2005-0554
Buffer overflow in the URL processor of Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a URL with a long hostname, aka "URL Parsing Memory Corruption Vulnerability."
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
1 EDB exploit
515
VMScore
CVE-2003-0447
The Custom HTTP Errors capability in Internet Explorer 5.01, 5.5 and 6.0 allows remote malicious users to execute script in the Local Zone via an argument to shdocvw.dll that causes a "javascript:" link to be generated.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
505
VMScore
CVE-2002-0648
The legacy <script> data-island capability for XML in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious users to read arbitrary XML files, and portions of other files, via a URL whose "src" attribute redirects to a local file.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.5
1 EDB exploit
231
VMScore
CVE-2000-0767
The ActiveX control for invoking a scriptlet in Internet Explorer 4.x and 5.x renders arbitrary file types instead of HTML, which allows an malicious user to read arbitrary files, aka the "Scriptlet Rendering" vulnerability.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4644
unprivileged
CVE-2024-3494
CVE-2024-22460
CVE-2024-26026
CVE-2024-23473
firewall
CVE-2024-28889
XML external entity
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »