Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0664
Internet Explorer 5.5 and 5.01 allows remote malicious users to bypass security restrictions via malformed URLs that contain dotless IP addresses, which causes Internet Explorer to process the page in the Intranet Zone, which may have fewer security restrictions, aka the "Zo...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
1 EDB exploit
NA
CVE-1999-0669
The Eyedog ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote malicious user to execute arbitrary commands as demonstrated by Bubbleboy.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 4.0
1 EDB exploit
NA
CVE-1999-1578
Buffer overflow in Registration Wizard ActiveX control (regwizc.dll, InvokeRegWizard) 3.0.0.0 for Internet Explorer 4.01 and 5 allows remote malicious users to execute arbitrary commands.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 4.0.1
1 EDB exploit
NA
CVE-2003-1328
The showHelp() function in Microsoft Internet Explorer 5.01, 5.5, and 6.0 supports certain types of pluggable protocols that allow remote malicious users to bypass the cross-domain security model and execute arbitrary code, aka "Improper Cross Domain Security Validation with...
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
1 EDB exploit
NA
CVE-2000-0061
Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote malicious users to execute Javascript in a different security context while the document is loading.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.01
1 EDB exploit
NA
CVE-2002-1217
Cross-Frame scripting vulnerability in the WebBrowser control as used in Internet Explorer 5.5 and 6.0 allows remote malicious users to execute arbitrary code, read arbitrary files, or conduct other unauthorized activities via script that accesses the Document property, which byp...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2002-0269
Internet Explorer 5.x and 6 interprets an object as an HTML document even when its MIME Content-Type is text/plain, which could allow remote malicious users to execute arbitrary script in documents that the user does not expect, possibly through web applications that use a text/p...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
NA
CVE-2002-1705
Microsoft Internet Explorer 5.5 up to and including 6.0 allows remote malicious users to cause a denial of service (crash) via a Cascading Style Sheet (CSS) with the p{cssText} element declared and a bold font weight.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2002-0723
Microsoft Internet Explorer 5.5 and 6.0 does not properly verify the domain of a frame within a browser window, which allows remote malicious users to read client files or invoke executable objects via the Object tag, aka "Cross Domain Verification in Object Tag."
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2002-2062
Cross-site scripting (XSS) vulnerability in ftp.htt in Internet Explorer 5.5 and 6.0, when running on Windows 2000 with "Enable folder view for FTP sites" and "Enable Web content in folders" selected, allows remote malicious users to inject arbitrary web scrip...
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.5
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »