Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0712
The rendering engine in Internet Explorer determines the MIME type independently of the type that is specified by the server, which allows remote servers to automatically execute script which is placed in a file whose MIME type does not normally support scripting, such as text (....
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
NA
CVE-2002-0461
Internet Explorer 5.01 through 6 allows remote malicious users to cause a denial of service (application crash) via Javascript in a web page that calls location.replace on itself, causing a loop.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.0.1
1 EDB exploit
NA
CVE-2002-1564
Internet Explorer 5.5 and 6.0 allows remote malicious users to steal potentially sensitive information from cookies via a cookie that contains script which is executed when a page is loaded, aka the "Script within Cookies Reading Cookies" vulnerability.
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
NA
CVE-2004-0566
Integer overflow in imgbmp.cxx for Windows 2000 allows remote malicious users to execute arbitrary code via a BMP image with a large bfOffBits value.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0
NA
CVE-2006-5162
wininet.dll in Microsoft Internet Explorer 6.0 SP2 and previous versions allows remote malicious users to cause a denial of service (unhandled exception and crash) via a long Content-Type header, which triggers a stack overflow.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2002-1671
Microsoft Internet Explorer 5.0, 5.01, and 5.5 allows remote malicious users to monitor the contents of the clipboard via the getData method of the clipboardData object.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
NA
CVE-2002-2031
Internet Explorer 5.0, 5.0.1 and 5.5 with JavaScript execution enabled allows remote malicious users to determine the existence of arbitrary files via a script tag with a src parameter that references a non-JavaScript file, then using the onError event handler to monitor the resu...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
2 EDB exploits
NA
CVE-2002-0052
Internet Explorer 6.0 and previous versions does not properly handle VBScript in certain domain security checks, which allows remote malicious users to read arbitrary files.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6.0
NA
CVE-2006-1189
Buffer overflow in URLMON.DLL in Microsoft Internet Explorer 5.01 through 6 allows remote malicious users to execute arbitrary code via a crafted URL with an International Domain Name (IDN) using double-byte character sets (DBCS), aka the "Double Byte Character Parsing Memor...
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.01
1 EDB exploit
NA
CVE-2006-1190
Microsoft Internet Explorer 5.01 through 6 does not always return the correct IOleClientSite information when dynamically creating an embedded object, which could cause Internet Explorer to run the object in the wrong security context or zone, and allow remote malicious users to ...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »