Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft ie 5.0 vulnerabilities and exploits
(subscribe to this query)
5.1
CVSSv2
CVE-2004-2383
Microsoft Internet Explorer 5.0 up to and including 6.0 allows remote malicious users to bypass cross-frame scripting restrictions and capture keyboard events from other domains via an HTML document with Javascript that is outside a frameset that includes the target domain, then ...
Microsoft Ie 6.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
5.1
CVSSv2
CVE-2005-1988
Unknown vulnerability in Internet Explorer 5.0, 5.5, and 6.0 allows remote malicious users to execute arbitrary code via a web site or an HTML e-mail containing a crafted JPEG image that causes memory corruption, aka "JPEG Image Rendering Memory Corruption Vulnerability"...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Ie 6
2 EDB exploits
5.1
CVSSv2
CVE-2005-1990
Internet Explorer 5.0, 5.5, and 6.0 allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, including (1) devenum.dll, ...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Ie 6
1 EDB exploit
2.6
CVSSv2
CVE-1999-0827
By default, Internet Explorer 5.0 and other versions enables the "Navigate sub-frames across different domains" option, which allows frame spoofing.
Netscape Navigator
Microsoft Ie 4.0
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.1
Microsoft Internet Explorer 3.2
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 4.5
Microsoft Internet Explorer 5.0
2.6
CVSSv2
CVE-2000-0028
Internet Explorer 5.0 and 5.01 allows remote malicious users to bypass the cross frame security policy and read files via the external.NavigateAndFind function.
Microsoft Ie 4.0
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.1
Microsoft Internet Explorer 3.2
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 4.5
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.0
1 EDB exploit
7.5
CVSSv2
CVE-2002-0152
Buffer overflow in various Microsoft applications for Macintosh allows remote malicious users to cause a denial of service (crash) or execute arbitrary code by invoking the file:// directive with a large number of / characters, which affects Internet Explorer 5.1, Outlook Express...
Microsoft Excel X
Microsoft Ie 5.1
Microsoft Outlook Express 5.0
Microsoft Powerpoint 2001
Microsoft Office V.x
Microsoft Outlook Express 5.0.1
Microsoft Office 2001
Microsoft Powerpoint 98
Microsoft Powerpoint V.x
Microsoft Entourage 2001
Microsoft Entourage V. X
Microsoft Excel 2001
Microsoft Outlook Express 5.0.2
Microsoft Outlook Express 5.0.3
5
CVSSv2
CVE-2004-0526
Unknown versions of Internet Explorer and Outlook allow remote malicious users to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, w...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Ie 6.0
Microsoft Outlook 2000
Microsoft Outlook 2002
Microsoft Outlook 2003
Microsoft Outlook Express 4.72.3612
Microsoft Outlook Express 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Outlook Express 4.27.3110
Microsoft Outlook Express 4.72.2106
Microsoft Outlook Express 4.72.3120.0
Microsoft Outlook 97
Microsoft Outlook 98
Microsoft Outlook Express 5.0.1
Microsoft Outlook Express 5.5
Microsoft Outlook Express 4.0
Microsoft Outlook Express 4.01
Microsoft Outlook Express 6.0
1 EDB exploit
5.1
CVSSv2
CVE-1999-1575
The Kodak/Wang (1) Image Edit (imgedit.ocx), (2) Image Annotation (imgedit.ocx), (3) Image Scan (imgscan.ocx), (4) Thumbnail Image (imgthumb.ocx), (5) Image Admin (imgadmin.ocx), (6) HHOpen (hhopen.ocx), (7) Registration Wizard (regwizc.dll), and (8) IE Active Setup (setupctl.dll...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 4.0.1
3 EDB exploits
5
CVSSv2
CVE-1999-0858
Internet Explorer 5 allows a remote malicious user to modify the IE client's proxy configuration via a malicious Web Proxy Auto-Discovery (WPAD) server.
Microsoft Internet Explorer 5.0
7.5
CVSSv2
CVE-2002-0189
Cross-site scripting vulnerability in Internet Explorer 6.0 allows remote malicious users to execute scripts in the Local Computer zone via a URL that exploits a local HTML resource file, aka the "Cross-Site Scripting in Local HTML Resource" vulnerability.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »