Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft ie 5 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2003-1559
Microsoft Internet Explorer 5.22, and other 5 through 6 SP1 versions, sends Referer headers containing https:// URLs in requests for http:// URLs, which allows remote malicious users to obtain potentially sensitive information by reading Referer log data.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6
Microsoft Ie 5.22
5
CVSSv2
CVE-2001-1410
Internet Explorer 6 and previous versions allows remote malicious users to create chromeless windows using the Javascript window.createPopup method, which could allow malicious users to simulate a victim's display and conduct unauthorized activities or steal sensitive data v...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
5
CVSSv2
CVE-2002-1714
Microsoft Internet Explorer 5.0 up to and including 6.0 allows remote malicious users to cause a denial of service (crash) via an object of type "text/html" with the DATA field that identifies the HTML document that contains the object, which may cause infinite recursio...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
1 EDB exploit
5
CVSSv2
CVE-2000-0036
Outlook Express 5 for Macintosh downloads attachments to HTML mail without prompting the user, aka the "HTML Mail Attachment" vulnerability.
Microsoft Outlook Express 5.0
Microsoft Ie 4.5
5
CVSSv2
CVE-1999-0858
Internet Explorer 5 allows a remote malicious user to modify the IE client's proxy configuration via a malicious Web Proxy Auto-Discovery (WPAD) server.
Microsoft Internet Explorer 5.0
5
CVSSv2
CVE-1999-0891
The "download behavior" in Internet Explorer 5 allows remote malicious users to read arbitrary files via a server-side redirect.
Microsoft Internet Explorer 5.0
1 EDB exploit
4.3
CVSSv2
CVE-2002-2435
The Cascading Style Sheets (CSS) implementation in Microsoft Internet Explorer 8.0 and previous versions does not properly handle the :visited pseudo-class, which allows remote malicious users to obtain sensitive information about visited web pages via a crafted HTML document, a ...
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 7.0.5730
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 6.00.3663.0000
Microsoft Internet Explorer 6.00.2600.0000
Microsoft Internet Explorer 5.00.3105.0106
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.00.2614.3500
Microsoft Internet Explorer 5.00.2314.1003
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.50.4807.2300
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.00.3700.1000
Microsoft Internet Explorer 5.50.3825.1300
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.71.544
Microsoft Internet Explorer 4.71.1008.3
Microsoft Internet Explorer 3.1
4.3
CVSSv2
CVE-2011-2383
Microsoft Internet Explorer 9 and previous versions does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote malicious users to read cookie files via vectors involving an IFRAME element with a SRC attribute containing an http: URL that redire...
Microsoft Internet Explorer 8
Microsoft Internet Explorer 5
Microsoft Ie 9
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer
4.3
CVSSv2
CVE-2011-2382
Microsoft Internet Explorer 8 and previous versions, and Internet Explorer 9 beta, does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote malicious users to read cookie files via vectors involving an IFRAME element with a SRC attribute cont...
Microsoft Internet Explorer
Microsoft Internet Explorer 5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 5.01
Microsoft Ie 9
Microsoft Internet Explorer 7
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 3.0.1
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.1
Microsoft Internet Explorer 3.2
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 4.5
Microsoft Internet Explorer 4.40.308
Microsoft Internet Explorer 4.40.520
Microsoft Internet Explorer 4.70.1155
Microsoft Internet Explorer 4.70.1158
Microsoft Internet Explorer 4.70.1215
4.3
CVSSv2
CVE-2007-4848
Microsoft Internet Explorer 4.0 through 7 allows remote malicious users to determine the existence of local files that have associated images via a res:// URI in the src property of a JavaScript Image object, as demonstrated by the URI for a bitmap image resource within a (1) .ex...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Ie 5.0 Ta3
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 4.5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Ie 5.x
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Ie 4.x
Microsoft Internet Explorer 5
Microsoft Ie 5.0
Microsoft Internet Explorer 5.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »