Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.5 vulnerabilities and exploits
(subscribe to this query)
570
VMScore
CVE-2001-0723
Internet Explorer 5.5 and 6.0 allows remote malicious users to read and modify user cookies via Javascript, aka the "Second Cookie Handling Vulnerability."
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
445
VMScore
CVE-2001-0874
Internet Explorer 5.5 and 6.0 allow remote malicious users to read certain files via HTML that passes information from a frame in the client's domain to a frame in the web site's domain, a variant of the "Frame Domain Verification" vulnerability.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
445
VMScore
CVE-2001-0904
Internet Explorer 5.5 and 6 with the Q312461 (MS01-055) patch modifies the HTTP_USER_AGENT (UserAgent) information that indicates that the patch has been installed, which could allow remote malicious web sites to more easily identify and exploit vulnerable clients.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
668
VMScore
CVE-2002-0027
Internet Explorer 5.5 and 6.0 allows remote malicious users to read certain files and spoof the URL in the address bar by using the Document.open function to pass information between two frames from different domains, a new variant of the "Frame Domain Verification" vul...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
445
VMScore
CVE-2000-0662
Internet Explorer 5.x and Microsoft Outlook allows remote malicious users to read arbitrary files by redirecting the contents of an IFRAME using the DHTML Edit Control (DHTMLED).
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
668
VMScore
CVE-2001-0727
Internet Explorer 6.0 allows remote malicious users to execute arbitrary code by modifying the Content-Disposition and Content-Type header fields in a way that causes Internet Explorer to believe that the file is safe to open without prompting the user, aka the "File Executi...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
760
VMScore
CVE-2001-0875
Internet Explorer 5.5 and 6.0 allows remote malicious users to cause the File Download dialogue box to misrepresent the name of the file in the dialogue in a way that could fool users into thinking that the file type is safe to download.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
2 EDB exploits
755
VMScore
CVE-2001-1325
Internet Explorer 5.0 and 5.5, and Outlook Express 5.0 and 5.5, allow remote malicious users to execute scripts when Active Scripting is disabled by including the scripts in XML stylesheets (XSL) that are referenced using an IFRAME tag, possibly due to a vulnerability in Windows ...
Microsoft Outlook Express 5.0
Microsoft Outlook Express 5.5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
1 EDB exploit
445
VMScore
CVE-2003-1028
The download function of Internet Explorer 6 SP1 allows remote malicious users to obtain the cache directory name via an HTTP response with an invalid ContentType and a .htm file, which could allow remote malicious users to bypass security mechanisms that rely on random names, as...
Microsoft Ie 6.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6.0
935
VMScore
CVE-2003-1026
Internet Explorer 5.01 through 6 SP1 allows remote malicious users to bypass zone restrictions via a javascript protocol URL in a sub-frame, which is added to the history list and executed in the top window's zone when the history.back (back) function is called, as demonstra...
Microsoft Ie 6.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6.0
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »