Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-1999-0891
The "download behavior" in Internet Explorer 5 allows remote malicious users to read arbitrary files via a server-side redirect.
Microsoft Internet Explorer 5.0
1 EDB exploit
5
CVSSv2
CVE-1999-1016
Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as t...
Microsoft Outlook Express 5.0
Qualcomm Eudora
Microsoft Frontpage
Microsoft Internet Explorer 5.0
1 EDB exploit
5
CVSSv2
CVE-1999-0469
Internet Explorer 5.0 allows window spoofing, allowing a remote malicious user to spoof a legitimate web site and capture information from the client.
Microsoft Internet Explorer 5.0
4.6
CVSSv2
CVE-2002-0031
Buffer overflows in Yahoo! Messenger 5,0,0,1064 and previous versions allows remote malicious users to execute arbitrary code via a ymsgr URI with long arguments to (1) call, (2) sendim, (3) getimv, (4) chat, (5) addview, or (6) addfriend.
Yahoo Messenger 5.0
2 EDB exploits
4.6
CVSSv2
CVE-1999-1235
Internet Explorer 5.0 records the username and password for FTP servers in the URL history, which could allow (1) local users to read the information from another user's index.dat, or (2) people who are physically observing ("shoulder surfing") another user to read...
Microsoft Internet Explorer 5.0
1 EDB exploit
4.6
CVSSv2
CVE-1999-1367
Internet Explorer 5.0 does not properly reset the username/password cache for Web sites that do not use standard cache controls, which could allow users on the same system to access restricted web sites that were visited by other users.
Microsoft Internet Explorer 5.0
4.3
CVSSv2
CVE-2019-11358
jQuery prior to 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
Jquery Jquery
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Drupal Drupal
Backdropcms Backdrop
Fedoraproject Fedora 28
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Netapp Snapcenter -
Netapp Oncommand System Manager
Redhat Cloudforms 4.7
Redhat Virtualization Manager 4.3
Oracle Service Bus 12.1.3.0.0
Oracle Primavera Unifier 16.2
Oracle Jd Edwards Enterpriseone Tools 9.2
Oracle Weblogic Server 12.1.3.0.0
Oracle Service Bus 11.1.1.9.0
Oracle Jdeveloper 11.1.1.9.0
Oracle Primavera Unifier 16.1
162 Github repositories
4.3
CVSSv2
CVE-2002-2435
The Cascading Style Sheets (CSS) implementation in Microsoft Internet Explorer 8.0 and previous versions does not properly handle the :visited pseudo-class, which allows remote malicious users to obtain sensitive information about visited web pages via a crafted HTML document, a ...
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 7.0.5730
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 6.00.3663.0000
Microsoft Internet Explorer 6.00.2600.0000
Microsoft Internet Explorer 5.00.3105.0106
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.00.2614.3500
Microsoft Internet Explorer 5.00.2314.1003
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.50.4807.2300
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.00.3700.1000
Microsoft Internet Explorer 5.50.3825.1300
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.71.544
Microsoft Internet Explorer 4.71.1008.3
Microsoft Internet Explorer 3.1
4.3
CVSSv2
CVE-2011-3389
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle malicious users...
Opera Opera Browser -
Microsoft Internet Explorer -
Microsoft Windows -
Google Chrome -
Mozilla Firefox -
Siemens Simatic Rf68xr Firmware
Siemens Simatic Rf615r Firmware
Haxx Curl
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 6.2
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 10.04
2 Github repositories
1 Article
4.3
CVSSv2
CVE-2011-2382
Microsoft Internet Explorer 8 and previous versions, and Internet Explorer 9 beta, does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote malicious users to read cookie files via vectors involving an IFRAME element with a SRC attribute cont...
Microsoft Internet Explorer
Microsoft Internet Explorer 5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 5.01
Microsoft Ie 9
Microsoft Internet Explorer 7
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 3.0.1
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.1
Microsoft Internet Explorer 3.2
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 4.5
Microsoft Internet Explorer 4.40.308
Microsoft Internet Explorer 4.40.520
Microsoft Internet Explorer 4.70.1155
Microsoft Internet Explorer 4.70.1158
Microsoft Internet Explorer 4.70.1215
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »