Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-0190
Microsoft Internet Explorer 5.01, 5.5 and 6.0 allows remote malicious users to execute arbitrary code under fewer security restrictions via a malformed web page that requires NetBIOS connectivity, aka "Zone Spoofing through Malformed Web Page" vulnerability.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
NA
CVE-2004-1376
Directory traversal vulnerability in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious FTP servers to overwrite arbitrary files via .. (dot dot) sequences in filenames returned from a LIST command.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
NA
CVE-2004-0566
Integer overflow in imgbmp.cxx for Windows 2000 allows remote malicious users to execute arbitrary code via a BMP image with a large bfOffBits value.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0
NA
CVE-2005-0554
Buffer overflow in the URL processor of Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a URL with a long hostname, aka "URL Parsing Memory Corruption Vulnerability."
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
1 EDB exploit
NA
CVE-2002-0500
Internet Explorer 5.0 up to and including 6.0 allows remote malicious users to determine the existence of files on the client via an IMG tag with a dynsrc property that references the target file, which sets certain elements of the image object such as file size.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
NA
CVE-2002-0052
Internet Explorer 6.0 and previous versions does not properly handle VBScript in certain domain security checks, which allows remote malicious users to read arbitrary files.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6.0
NA
CVE-2002-1187
Cross-site scripting vulnerability (XSS) in Internet Explorer 5.01 up to and including 6.0 allows remote malicious users to read and execute files on the local system via web pages using the <frame> or <iframe> element and javascript, aka "Frames Cross Site Scrip...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2001-0091
The ActiveX control for invoking a scriptlet in Internet Explorer 5.0 up to and including 5.5 renders arbitrary file types instead of HTML, which allows an malicious user to read arbitrary files, aka a variant of the "Scriptlet Rendering" vulnerability.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
NA
CVE-2002-1671
Microsoft Internet Explorer 5.0, 5.01, and 5.5 allows remote malicious users to monitor the contents of the clipboard via the getData method of the clipboardData object.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
NA
CVE-2002-2031
Internet Explorer 5.0, 5.0.1 and 5.5 with JavaScript execution enabled allows remote malicious users to determine the existence of arbitrary files via a script tag with a src parameter that references a non-JavaScript file, then using the onError event handler to monitor the resu...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »