Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.5 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-0722
Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious users to misrepresent the source of a file in the File Download dialogue box to trick users into thinking that the file type is safe to download, aka "File Origin Spoofing."
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
7.5
CVSSv2
CVE-2002-0691
Microsoft Internet Explorer 5.01 and 5.5 allows remote malicious users to execute scripts in the Local Computer zone via a URL that references a local HTML resource file, a variant of "Cross-Site Scripting in Local HTML Resource" as identified by CAN-2002-0189.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.01
7.5
CVSSv2
CVE-2002-0832
Internet Explorer 5, 5.6, and 6 allows remote malicious users to bypass cookie privacy settings and store information across browser sessions via the userData (storeuserData) feature.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
7.5
CVSSv2
CVE-2002-0371
Buffer overflow in gopher client for Microsoft Internet Explorer 5.1 up to and including 6.0, Proxy Server 2.0, or ISA Server 2000 allows remote malicious users to execute arbitrary code via a gopher:// URL that redirects the user to a real or simulated gopher server that sends a...
Microsoft Internet Explorer 6.0
Microsoft Isa Server 2000
Microsoft Internet Explorer 5.0.1
Microsoft Proxy Server 2.0
Microsoft Internet Explorer 5.5
University Of Minnesota Gopher
1 EDB exploit
7.5
CVSSv2
CVE-2002-0189
Cross-site scripting vulnerability in Internet Explorer 6.0 allows remote malicious users to execute scripts in the Local Computer zone via a URL that exploits a local HTML resource file, aka the "Cross-Site Scripting in Local HTML Resource" vulnerability.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
7.5
CVSSv2
CVE-2002-0190
Microsoft Internet Explorer 5.01, 5.5 and 6.0 allows remote malicious users to execute arbitrary code under fewer security restrictions via a malformed web page that requires NetBIOS connectivity, aka "Zone Spoofing through Malformed Web Page" vulnerability.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
7.5
CVSSv2
CVE-2002-0269
Internet Explorer 5.x and 6 interprets an object as an HTML document even when its MIME Content-Type is text/plain, which could allow remote malicious users to execute arbitrary script in documents that the user does not expect, possibly through web applications that use a text/p...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
7.5
CVSSv2
CVE-2002-0078
The zone determination function in Microsoft Internet Explorer 5.5 and 6.0 allows remote malicious users to run scripts in the Local Computer zone by embedding the script in a cookie, aka the "Cookie-based Script Execution" vulnerability.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 Github repository
7.5
CVSSv2
CVE-2002-0026
Internet Explorer 5.5 and 6.0 allows remote malicious users to bypass restrictions for executing scripts via an object that processes asynchronous events after the initial security checks have been made.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
7.5
CVSSv2
CVE-2002-0027
Internet Explorer 5.5 and 6.0 allows remote malicious users to read certain files and spoof the URL in the address bar by using the Document.open function to pass information between two frames from different domains, a new variant of the "Frame Domain Verification" vul...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »