Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft ie 5.01 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-2219
Microsoft Internet Explorer 6 allows remote malicious users to spoof the address bar to facilitate phishing attacks via Javascript that uses an invalid URI, modifies the Location field, then uses history.back to navigate to the previous domain, aka NullyFake.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Internet Explorer 5.01
NA
CVE-2003-1105
Unknown vulnerability in Internet Explorer 5.01 SP3 up to and including 6.0 SP1 allows remote malicious users to cause a denial of service (browser or Outlook Express crash) via HTML with certain input tags that are not properly rendered.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
NA
CVE-2003-0701
Buffer overflow in Internet Explorer 6 SP1 for certain languages that support double-byte encodings (e.g., Japanese) allows remote malicious users to execute arbitrary code via the Type property of an Object tag, a variant of CVE-2003-0344.
Microsoft Internet Explorer 5.01
Microsoft Ie 6.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2005-0553
Race condition in the memory management routines in the DHTML object processor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote malicious users to execute arbitrary code via a malicious web page or HTML e-mail, aka "DHTML Object Memory Corruption Vulnerability&q...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Internet Explorer 5.5
1 EDB exploit
NA
CVE-2009-2064
Microsoft Internet Explorer 8, and possibly other versions, detects http content in https web pages only when the top-level frame uses https, which allows man-in-the-middle malicious users to execute arbitrary web script, in an https site's context, by modifying an http page...
Microsoft Internet Explorer 6
Microsoft Pocket Ie 1.1
Microsoft Pocket Ie 2.0
Microsoft Internet Explorer 8
Microsoft Internet Explorer 8.0b
Microsoft Pocket Ie 3.0
Microsoft Pocket Ie 4.0
Microsoft Internet Explorer 5
Microsoft Internet Explorer 5.01
Microsoft Pocket Ie 1.0
Microsoft Internet Explorer
Microsoft Internet Explorer 7
Microsoft Internet Explorer 7.0.5730
Microsoft Pocket Ie 2002
Microsoft Pocket Ie 2003
NA
CVE-2009-2576
Microsoft Internet Explorer 6.0.2900.2180 and previous versions allows remote malicious users to cause a denial of service (CPU and memory consumption) via a long Unicode string argument to the write method, a related issue to CVE-2009-2479. NOTE: it was later reported that 7.0.6...
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.0.1
Microsoft Ie 3.1
Microsoft Internet Explorer 3.2
Microsoft Internet Explorer 4.0.1
Microsoft Ie 4.0
Microsoft Ie 4.0a
Microsoft Internet Explorer 4.1
Microsoft Ie 4.5
Microsoft Internet Explorer 4.72.3110.8
Microsoft Internet Explorer 4.72.3612.1713
Microsoft Ie 5.0.1
Microsoft Ie 5.0
Microsoft Internet Explorer 5.00.2014.0216
Microsoft Internet Explorer 5.00.2516.1900
Microsoft Internet Explorer 5.00.3502.1000
Microsoft Internet Explorer 5.00.3700.1000
Microsoft Ie 6
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 5.50.4807.2300
Microsoft Internet Explorer 5.50.4522.1800
Microsoft Internet Explorer 5.5
NA
CVE-2004-1155
Internet Explorer 5.01 through 6 allows remote malicious users to spoof arbitrary web sites by injecting content from one window into another window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "w...
Microsoft Ie 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0.1
Microsoft Ie 5.2.3
Microsoft Ie 6.0
Microsoft Ie 7.0
Microsoft Internet Explorer 6.0
NA
CVE-2006-1303
Multiple unspecified vulnerabilities in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and previous versions allow remote malicious users to execute arbitrary code by instantiating certain COM objects from Wmm2fxa.dll as ActiveX controls including (1) DXImageTransform.Microsoft.M...
Microsoft Ie 5.0.1
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
NA
CVE-2007-4848
Microsoft Internet Explorer 4.0 through 7 allows remote malicious users to determine the existence of local files that have associated images via a res:// URI in the src property of a JavaScript Image object, as demonstrated by the URI for a bitmap image resource within a (1) .ex...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Ie 5.0 Ta3
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 4.5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Ie 5.x
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Ie 4.x
Microsoft Internet Explorer 5
Microsoft Ie 5.0
Microsoft Internet Explorer 5.1
NA
CVE-2006-1188
Microsoft Internet Explorer 5.01 through 6 allows remote malicious users to execute arbitrary code via HTML elements with a certain crafted tag, which leads to memory corruption.
Microsoft Internet Explorer 5.5
Microsoft Ie 6.0
Microsoft Ie 6
Canon Network Camera Server Vb101
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.1
Microsoft Ie 5.1
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 6.0.2800
Microsoft Internet Explorer 6
Microsoft Ie 5.2.3
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2900.2180
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »