Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 5.0 vulnerabilities and exploits
(subscribe to this query)
265
VMScore
CVE-2001-0089
Internet Explorer 5.0 up to and including 5.5 allows remote malicious users to read arbitrary files from the client via the INPUT TYPE element in an HTML form, aka the "File Upload via Form" vulnerability.
Microsoft Internet Explorer
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
1 EDB exploit
515
VMScore
CVE-1999-0981
Internet Explorer 5.01 and previous versions allows a remote malicious user to create a reference to a client window and use a server-side redirect to access local files via that window, aka "Server-side Page Reference Redirect."
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer
1 EDB exploit
676
VMScore
CVE-2000-0464
Internet Explorer 4.x and 5.x allows remote malicious users to execute arbitrary commands via a buffer overflow in the ActiveX parameter parsing capability, aka the "Malformed Component Attribute" vulnerability.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
231
VMScore
CVE-2000-0503
The IFRAME of the WebBrowser control in Internet Explorer 5.01 allows a remote malicious user to violate the cross frame security policy via the NavigateComplete2 event.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.01
515
VMScore
CVE-2000-0465
Internet Explorer 4.x and 5.x does not properly verify the domain of a frame within a browser window, which allows a remote malicious user to read client files via the frame, aka the "Frame Domain Verification" vulnerability.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 4.0
1 EDB exploit
231
VMScore
CVE-2000-0767
The ActiveX control for invoking a scriptlet in Internet Explorer 4.x and 5.x renders arbitrary file types instead of HTML, which allows an malicious user to read arbitrary files, aka the "Scriptlet Rendering" vulnerability.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
505
VMScore
CVE-2006-5162
wininet.dll in Microsoft Internet Explorer 6.0 SP2 and previous versions allows remote malicious users to cause a denial of service (unhandled exception and crash) via a long Content-Type header, which triggers a stack overflow.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
231
VMScore
CVE-2001-1450
Microsoft Internet Explorer 5.0 up to and including 6.0 allows malicious users to cause a denial of service (browser crash) via a crafted FTP URL such as "/.#./".
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
515
VMScore
CVE-2000-0156
Internet Explorer 4.x and 5.x allows remote web servers to access files on the client that are outside of its security domain, aka the "Image Source Redirect" vulnerability.
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.01
1 EDB exploit
445
VMScore
CVE-2002-0500
Internet Explorer 5.0 up to and including 6.0 allows remote malicious users to determine the existence of files on the client via an IMG tag with a dynsrc property that references the target file, which sets certain elements of the image object such as file size.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »