Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5 vulnerabilities and exploits
(subscribe to this query)
645
VMScore
CVE-2001-0722
Internet Explorer 5.5 and 6.0 allows remote malicious users to read and modify user cookies via Javascript in an about: URL, aka the "First Cookie Handling Vulnerability."
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
405
VMScore
CVE-1999-0669
The Eyedog ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote malicious user to execute arbitrary commands as demonstrated by Bubbleboy.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 4.0
1 EDB exploit
515
VMScore
CVE-1999-1578
Buffer overflow in Registration Wizard ActiveX control (regwizc.dll, InvokeRegWizard) 3.0.0.0 for Internet Explorer 4.01 and 5 allows remote malicious users to execute arbitrary commands.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 4.0.1
1 EDB exploit
755
VMScore
CVE-2003-1328
The showHelp() function in Microsoft Internet Explorer 5.01, 5.5, and 6.0 supports certain types of pluggable protocols that allow remote malicious users to bypass the cross-domain security model and execute arbitrary code, aka "Improper Cross Domain Security Validation with...
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
1 EDB exploit
1000
VMScore
CVE-2000-0061
Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote malicious users to execute Javascript in a different security context while the document is loading.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.01
1 EDB exploit
755
VMScore
CVE-2002-1217
Cross-Frame scripting vulnerability in the WebBrowser control as used in Internet Explorer 5.5 and 6.0 allows remote malicious users to execute arbitrary code, read arbitrary files, or conduct other unauthorized activities via script that accesses the Document property, which byp...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
668
VMScore
CVE-2002-0269
Internet Explorer 5.x and 6 interprets an object as an HTML document even when its MIME Content-Type is text/plain, which could allow remote malicious users to execute arbitrary script in documents that the user does not expect, possibly through web applications that use a text/p...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
435
VMScore
CVE-2002-2062
Cross-site scripting (XSS) vulnerability in ftp.htt in Internet Explorer 5.5 and 6.0, when running on Windows 2000 with "Enable folder view for FTP sites" and "Enable Web content in folders" selected, allows remote malicious users to inject arbitrary web scrip...
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.5
1 EDB exploit
755
VMScore
CVE-2002-0723
Microsoft Internet Explorer 5.5 and 6.0 does not properly verify the domain of a frame within a browser window, which allows remote malicious users to read client files or invoke executable objects via the Object tag, aka "Cross Domain Verification in Object Tag."
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
505
VMScore
CVE-2002-1705
Microsoft Internet Explorer 5.5 up to and including 6.0 allows remote malicious users to cause a denial of service (crash) via a Cascading Style Sheet (CSS) with the p{cssText} element declared and a bold font weight.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »