Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.5 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-0024
File Download box in Internet Explorer 5.01, 5.5 and 6.0 allows an malicious user to use the Content-Disposition and Content-Type HTML header fields to modify how the name of the file is displayed, which could trick a user into believing that a file is safe to download.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
7.5
CVSSv2
CVE-2002-0026
Internet Explorer 5.5 and 6.0 allows remote malicious users to bypass restrictions for executing scripts via an object that processes asynchronous events after the initial security checks have been made.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
7.5
CVSSv2
CVE-2002-0077
Microsoft Internet Explorer 5.01, 5.5 and 6.0 treats objects invoked on an HTML page with the codebase property as part of Local Computer zone, which allows remote malicious users to invoke executables present on the local system through objects such as the popup object, aka the ...
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
7.5
CVSSv2
CVE-2001-0727
Internet Explorer 6.0 allows remote malicious users to execute arbitrary code by modifying the Content-Disposition and Content-Type header fields in a way that causes Internet Explorer to believe that the file is safe to open without prompting the user, aka the "File Executi...
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.5
7.5
CVSSv2
CVE-2001-0726
Outlook Web Access (OWA) in Microsoft Exchange 5.5 Server, when used with Internet Explorer, does not properly detect certain inline script, which can allow remote malicious users to perform arbitrary actions on a user's Exchange mailbox via an HTML e-mail message.
Microsoft Exchange Server 5.5
7.5
CVSSv2
CVE-2001-0875
Internet Explorer 5.5 and 6.0 allows remote malicious users to cause the File Download dialogue box to misrepresent the name of the file in the dialogue in a way that could fool users into thinking that the file type is safe to download.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
2 EDB exploits
7.5
CVSSv2
CVE-2001-0724
Internet Explorer 5.5 allows remote malicious users to bypass security restrictions via malformed URLs that contain dotless IP addresses, which causes Internet Explorer to process the page in the Intranet Zone, which may have fewer security restrictions, aka the "Zone Spoofi...
Microsoft Internet Explorer 5.5
7.5
CVSSv2
CVE-2001-0712
The rendering engine in Internet Explorer determines the MIME type independently of the type that is specified by the server, which allows remote servers to automatically execute script which is placed in a file whose MIME type does not normally support scripting, such as text (....
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
7.5
CVSSv2
CVE-2001-0664
Internet Explorer 5.5 and 5.01 allows remote malicious users to bypass security restrictions via malformed URLs that contain dotless IP addresses, which causes Internet Explorer to process the page in the Intranet Zone, which may have fewer security restrictions, aka the "Zo...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
1 EDB exploit
7.5
CVSSv2
CVE-2001-0002
Internet Explorer 5.5 and previous versions allows remote malicious users to obtain the physical location of cached content and open the content in the Local Computer Zone, then use compiled HTML help (.chm) files to execute arbitrary programs.
Microsoft Windows Script Host 5.1
Microsoft Windows Script Host 5.5
Microsoft Internet Explorer
Microsoft Internet Explorer 5.01
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »