Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2003-0809
Internet Explorer 5.01 up to and including 6.0 does not properly handle object tags returned from a Web server during XML data binding, which allows remote malicious users to execute arbitrary code via an HTML e-mail message or web page.
Microsoft Internet Explorer 5.0.1
Microsoft Ie 6.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
5
CVSSv2
CVE-2003-0519
Certain versions of Internet Explorer 5 and 6, in certain Windows environments, allow remote malicious users to cause a denial of service (freeze) via a URL to C:\aux (MS-DOS device name) and possibly other devices.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
5
CVSSv2
CVE-2001-1410
Internet Explorer 6 and previous versions allows remote malicious users to create chromeless windows using the Javascript window.createPopup method, which could allow malicious users to simulate a victim's display and conduct unauthorized activities or steal sensitive data v...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
5.1
CVSSv2
CVE-2003-0447
The Custom HTTP Errors capability in Internet Explorer 5.01, 5.5 and 6.0 allows remote malicious users to execute script in the Local Zone via an argument to shdocvw.dll that causes a "javascript:" link to be generated.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
4.3
CVSSv2
CVE-2003-0446
Cross-site scripting (XSS) in Internet Explorer 5.5 and 6.0, possibly in a component that is also used by other Microsoft products, allows remote malicious users to insert arbitrary web script via an XML file that contains a parse error, which inserts the script in the resulting ...
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.5
1 EDB exploit
7.5
CVSSv2
CVE-2003-0344
Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious users to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page.
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
3 EDB exploits
7.5
CVSSv2
CVE-2003-0309
Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious users to bypass security zone restrictions and execute arbitrary programs via a web document with a large number of duplicate file:// or other requests that point to the program and open multiple file download dialogs, ...
Microsoft Internet Explorer 6.0.2800
1 EDB exploit
7.5
CVSSv2
CVE-2003-0113
Buffer overflow in URLMON.DLL in Microsoft Internet Explorer 5.01, 5.5 and 6.0 allows remote malicious users to execute arbitrary code via an HTTP response containing long values in (1) Content-type and (2) Content-encoding fields.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.0.1
Microsoft Ie 6.0
1 EDB exploit
7.5
CVSSv2
CVE-2003-1328
The showHelp() function in Microsoft Internet Explorer 5.01, 5.5, and 6.0 supports certain types of pluggable protocols that allow remote malicious users to bypass the cross-domain security model and execute arbitrary code, aka "Improper Cross Domain Security Validation with...
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
1 EDB exploit
5
CVSSv2
CVE-2002-1705
Microsoft Internet Explorer 5.5 up to and including 6.0 allows remote malicious users to cause a denial of service (crash) via a Cascading Style Sheet (CSS) with the p{cssText} element declared and a bold font weight.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »