Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft ie 5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-0839
Windows NT Task Scheduler installed with Internet Explorer 5 allows a user to gain privileges by modifying the job after it has been scheduled.
Microsoft Ie 5.0
Microsoft Ie 5
NA
CVE-1999-0989
Buffer overflow in Internet Explorer 5 directshow filter (MSDXM.OCX) allows remote malicious users to execute commands via the vnd.ms.radio protocol.
Microsoft Ie 5.0
Microsoft Ie 5
1 EDB exploit
NA
CVE-2000-0518
Internet Explorer 4.x and 5.x does not properly verify all contents of an SSL certificate if a connection is made to the server via an image or a frame, aka one of two different "SSL Certificate Validation" vulnerabilities.
Microsoft Internet Explorer 4.0
Microsoft Ie 4.0.1
Microsoft Ie 5.0.1
Microsoft Ie 4.0
Microsoft Ie 5.0
Microsoft Ie 5
NA
CVE-2000-1061
Microsoft Virtual Machine (VM) in Internet Explorer 4.x and 5.x allows an unsigned applet to create and use ActiveX controls, which allows a remote malicious user to bypass Internet Explorer's security settings and execute arbitrary commands via a malicious web page or email...
Microsoft Ie 4.x
Microsoft Ie 5.x
1 EDB exploit
NA
CVE-2000-0162
The Microsoft virtual machine (VM) in Internet Explorer 4.x and 5.x allows a remote malicious user to read files via a malicious Java applet that escapes the Java sandbox, aka the "VM File Reading" vulnerability.
Microsoft Ie 4.1
Microsoft Ie 5.0
Microsoft Ie 5
Microsoft Visual Studio 6.0
Microsoft Internet Explorer 4.0
Microsoft Ie 4.0
NA
CVE-2003-1041
Internet Explorer 5.x and 6.0 allows remote malicious users to execute arbitrary programs via a modified directory traversal attack using a URL containing ".." (dot dot) sequences and a filename that ends in "::" which is treated as a .chm file even if it does...
Microsoft Internet Explorer 5
Microsoft Internet Explorer 5.5
Microsoft Ie 6.0
Microsoft Ie 6
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2002-0153
Internet Explorer 5.1 for Macintosh allows remote malicious users to bypass security checks and invoke local AppleScripts within a specific HTML element, aka the "Local Applescript Invocation" vulnerability.
Microsoft Ie 4.0
Microsoft Ie 3.0
Microsoft Ie 5.1
Microsoft Ie 4.5
Microsoft Ie 5.0
Microsoft Ie 3.1
Microsoft Ie 4.0.1
1 EDB exploit
NA
CVE-2006-2094
Microsoft Internet Explorer before Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1, when Prompt is configured in Security Settings, uses modal dialogs to verify that a user wishes to run an ActiveX control or perform other risky actions, which allows user-assiste...
Microsoft Ie 5.0.1
Microsoft Ie 5.0
Microsoft Internet Explorer 5.5
Microsoft Ie 6.0
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.0
Microsoft Ie 5
1 EDB exploit
NA
CVE-2000-0160
The Microsoft Active Setup ActiveX component in Internet Explorer 4.x and 5.x allows a remote malicious user to install software components without prompting the user by stating that the software's manufacturer is Microsoft.
Microsoft Internet Explorer 5
Microsoft Ie 4.x
Microsoft Outlook
NA
CVE-2000-0329
A Microsoft ActiveX control allows a remote malicious user to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the "Active Setup Control" vulnerability.
Microsoft Ie 4.1
Microsoft Outlook 98
Microsoft Outlook Express 4.27.3110.1
Microsoft Internet Explorer 4.0
Microsoft Ie 4.0.1
Microsoft Ie 5.0
Microsoft Outlook Express 4.72.2106.4
Microsoft Outlook Express 4.72.3120.0
Microsoft Outlook Express 4.72.3612.1700
Microsoft Outlook Express 5.0
Microsoft Ie 4.0
Microsoft Ie 5
Microsoft Outlook 2000
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »