Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-1999-1110
Windows Media Player ActiveX object as used in Internet Explorer 5.0 returns a specific error code when a file does not exist, which allows remote malicious web sites to determine the existence of files on the client.
Microsoft Internet Explorer 5.0
1 EDB exploit
2.6
CVSSv2
CVE-2001-0807
Internet Explorer 5.0, and possibly other versions, may allow remote attackers (malicious web pages) to read known text files from a client's hard drive via a SCRIPT tag with a SRC value that points to the text file.
Microsoft Internet Explorer 5.0
4.6
CVSSv2
CVE-1999-1367
Internet Explorer 5.0 does not properly reset the username/password cache for Web sites that do not use standard cache controls, which could allow users on the same system to access restricted web sites that were visited by other users.
Microsoft Internet Explorer 5.0
7.2
CVSSv2
CVE-1999-1370
The setup wizard (ie5setup.exe) for Internet Explorer 5.0 disables (1) the screen saver, which could leave the system open to users with physical access if a failure occurs during an unattended installation, and (2) the Task Scheduler Service, which might prevent the scheduled ex...
Microsoft Internet Explorer 5.0
7.6
CVSSv2
CVE-1999-0802
Buffer overflow in Internet Explorer 5 allows remote malicious users to execute commands via a malformed Favorites icon.
Microsoft Internet Explorer 5.0
5
CVSSv2
CVE-1999-0858
Internet Explorer 5 allows a remote malicious user to modify the IE client's proxy configuration via a malicious Web Proxy Auto-Discovery (WPAD) server.
Microsoft Internet Explorer 5.0
5
CVSSv2
CVE-1999-0891
The "download behavior" in Internet Explorer 5 allows remote malicious users to read arbitrary files via a server-side redirect.
Microsoft Internet Explorer 5.0
1 EDB exploit
2.6
CVSSv2
CVE-1999-0468
Internet Explorer 5.0 allows a remote server to read arbitrary files on the client's file system using the Microsoft Scriptlet Component.
Microsoft Internet Explorer 5.0
5
CVSSv2
CVE-1999-0469
Internet Explorer 5.0 allows window spoofing, allowing a remote malicious user to spoof a legitimate web site and capture information from the client.
Microsoft Internet Explorer 5.0
5
CVSSv2
CVE-2010-5071
The JavaScript implementation in Microsoft Internet Explorer 8.0 and previous versions does not properly restrict the set of values contained in the object returned by the getComputedStyle method, which allows remote malicious users to obtain sensitive information about visited w...
Microsoft Internet Explorer 7.00.5730.1100
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 6.00.3790.1830
Microsoft Internet Explorer 6.00.2800.1106
Microsoft Internet Explorer 6.00.2479.0006
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.00.2919.6307
Microsoft Internet Explorer 5.00.2314.1003
Microsoft Internet Explorer 5.00.2014.0216
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.50.3825.1300
Microsoft Internet Explorer 4.72.3612.1713
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.71.1008.3
Microsoft Internet Explorer 4.72.2106.8
Microsoft Internet Explorer 4.40.308
Microsoft Internet Explorer 3.0.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »