Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.01 vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2008-2257
Microsoft Internet Explorer 5.01, 6, and 7 accesses uninitialized memory in certain conditions, which allows remote malicious users to cause a denial of service (crash) and execute arbitrary code via vectors related to a document object "appended in a specific order," a...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 7
828
VMScore
CVE-2008-2258
Microsoft Internet Explorer 5.01, 6, and 7 accesses uninitialized memory in certain conditions, which allows remote malicious users to cause a denial of service (crash) and execute arbitrary code via vectors related to a document object "appended in a specific order" wi...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 5.01
828
VMScore
CVE-2008-2256
Microsoft Internet Explorer 5.01, 6, and 7 does not properly handle objects that have been incorrectly initialized or deleted, which allows remote malicious users to cause a denial of service (crash) and execute arbitrary code via unknown vectors, aka "Uninitialized Memory C...
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6
Microsoft Internet Explorer 5.01
668
VMScore
CVE-2002-0024
File Download box in Internet Explorer 5.01, 5.5 and 6.0 allows an malicious user to use the Content-Disposition and Content-Type HTML header fields to modify how the name of the file is displayed, which could trick a user into believing that a file is safe to download.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
445
VMScore
CVE-2002-0025
Internet Explorer 5.01, 5.5 and 6.0 does not properly handle the Content-Type HTML header field, which allows remote malicious users to modify which application is used to process a document.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
668
VMScore
CVE-2002-0190
Microsoft Internet Explorer 5.01, 5.5 and 6.0 allows remote malicious users to execute arbitrary code under fewer security restrictions via a malformed web page that requires NetBIOS connectivity, aka "Zone Spoofing through Malformed Web Page" vulnerability.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
505
VMScore
CVE-2002-0191
Microsoft Internet Explorer 5.01, 5.5 and 6.0 allows remote malicious users to view arbitrary files that contain the "{" character via script containing the cssText property of the stylesheet object, aka "Local Information Disclosure through HTML Object" vulne...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6.0
1 EDB exploit
935
VMScore
CVE-2007-1749
Integer underflow in the CDownloadSink class code in the Vector Markup Language (VML) component (VGX.DLL), as used in Internet Explorer 5.01, 6, and 7 allows remote malicious users to execute arbitrary code via compressed content with an invalid buffer size, which triggers a heap...
Microsoft Internet Explorer 7
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6
1 EDB exploit
755
VMScore
CVE-2005-0555
Buffer overflow in the Content Advisor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote malicious users to execute arbitrary code via a crafted Content Advisor file, aka "Content Advisor Memory Corruption Vulnerability."
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.01
1 EDB exploit
231
VMScore
CVE-2000-0767
The ActiveX control for invoking a scriptlet in Internet Explorer 4.x and 5.x renders arbitrary file types instead of HTML, which allows an malicious user to read arbitrary files, aka the "Scriptlet Rendering" vulnerability.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »