Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft ie 5.0.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0817
Internet Explorer 5.01 through 6 SP1 allows remote malicious users to bypass zone restrictions and read arbitrary files via an XML object.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
NA
CVE-2003-0823
Internet Explorer 6 SP1 and previous versions allows remote malicious users to direct drag and drop behaviors and other mouse click actions to other windows by calling the window.moveBy method, aka HijackClick, a different vulnerability than CVE-2003-1027.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
NA
CVE-2002-1186
Internet Explorer 5.01 up to and including 6.0 does not properly perform security checks on certain encoded characters within a URL, which allows a remote malicious user to steal potentially sensitive information from a user by redirecting the user to another site that has that i...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
NA
CVE-2003-0531
Internet Explorer 5.01 SP3 up to and including 6.0 SP1 allows remote malicious users to access and execute script in the My Computer domain using the browser cache via crafted Content-Type and Content-Disposition headers, aka the "Browser Cache Script Execution in My Compute...
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Internet Explorer 5.5
NA
CVE-2002-1185
Internet Explorer 5.01 up to and including 6.0 does not properly check certain parameters of a PNG file when opening it, which allows remote malicious users to cause a denial of service (crash) by triggering a heap-based buffer overflow using invalid length codes during decompres...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.0.1
Microsoft Ie 6.0
NA
CVE-2004-2090
Microsoft Internet Explorer 5.0.1 up to and including 6.0 allows remote malicious users to determine the existence of arbitrary files via the VBScript LoadPicture method, which returns an error code if the file does not exist.
Microsoft Internet Explorer 5.0.1
Microsoft Ie 6.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2004-0479
Internet Explorer 6 allows remote malicious users to cause a denial of service (crash) via Javascript that creates a new popup window and disables the imagetoolbar functionality with a META tag, which triggers a null dereference.
Microsoft Ie 6
1 EDB exploit
NA
CVE-2005-2308
The JPEG decoder in Microsoft Internet Explorer allows remote malicious users to cause a denial of service (CPU consumption or crash) and possibly execute arbitrary code via certain crafted JPEG images, as demonstrated using (1) mov_fencepost.jpg, (2) cmp_fencepost.jpg, (3) oom_d...
Microsoft Ie 6.0
1 EDB exploit
NA
CVE-2004-1166
CRLF injection vulnerability in Microsoft Internet Explorer 6.0.2800.1106 and previous versions allows remote malicious users to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline ("%0a") before the FTP command, which causes the command...
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
1 EDB exploit
NA
CVE-2003-1026
Internet Explorer 5.01 through 6 SP1 allows remote malicious users to bypass zone restrictions via a javascript protocol URL in a sub-frame, which is added to the history list and executed in the top window's zone when the history.back (back) function is called, as demonstra...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »