Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft ie 3.1 vulnerabilities and exploits
(subscribe to this query)
755
VMScore
CVE-2002-0153
Internet Explorer 5.1 for Macintosh allows remote malicious users to bypass security checks and invoke local AppleScripts within a specific HTML element, aka the "Local Applescript Invocation" vulnerability.
Microsoft Ie 4.0
Microsoft Ie 3.0
Microsoft Ie 5.1
Microsoft Ie 4.5
Microsoft Ie 5.0
Microsoft Ie 3.1
Microsoft Ie 4.0.1
1 EDB exploit
890
VMScore
CVE-1999-0876
Buffer overflow in Internet Explorer 4.0 via EMBED tag.
Microsoft Ie 3.0
Microsoft Ie 3.1
Microsoft Ie 4.0
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.1
445
VMScore
CVE-2009-2576
Microsoft Internet Explorer 6.0.2900.2180 and previous versions allows remote malicious users to cause a denial of service (CPU and memory consumption) via a long Unicode string argument to the write method, a related issue to CVE-2009-2479. NOTE: it was later reported that 7.0.6...
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.0.1
Microsoft Ie 3.1
Microsoft Internet Explorer 3.2
Microsoft Internet Explorer 4.0.1
Microsoft Ie 4.0
Microsoft Ie 4.0a
Microsoft Internet Explorer 4.1
Microsoft Ie 4.5
Microsoft Internet Explorer 4.72.3110.8
Microsoft Internet Explorer 4.72.3612.1713
Microsoft Ie 5.0.1
Microsoft Ie 5.0
Microsoft Internet Explorer 5.00.2014.0216
Microsoft Internet Explorer 5.00.2516.1900
Microsoft Internet Explorer 5.00.3502.1000
Microsoft Internet Explorer 5.00.3700.1000
Microsoft Ie 6
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 5.50.4807.2300
Microsoft Internet Explorer 5.50.4522.1800
Microsoft Internet Explorer 5.5
231
VMScore
CVE-1999-0827
By default, Internet Explorer 5.0 and other versions enables the "Navigate sub-frames across different domains" option, which allows frame spoofing.
Netscape Navigator
Microsoft Ie 4.0
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.1
Microsoft Internet Explorer 3.2
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 4.5
Microsoft Internet Explorer 5.0
265
VMScore
CVE-2000-0028
Internet Explorer 5.0 and 5.01 allows remote malicious users to bypass the cross frame security policy and read files via the external.NavigateAndFind function.
Microsoft Ie 4.0
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.1
Microsoft Internet Explorer 3.2
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 4.5
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.0
1 EDB exploit
516
VMScore
CVE-2009-2057
Microsoft Internet Explorer prior to 8 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle malicious users to execute arbitrary web script by modifying this CONNECT ...
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.70.1155
Microsoft Internet Explorer 4.70.1215
Microsoft Internet Explorer 4.72.2106.8
Microsoft Internet Explorer 4.72.3612.1713
Microsoft Internet Explorer 5.0.1
Microsoft Ie 5.0
Microsoft Internet Explorer 5.00.2919.6307
Microsoft Internet Explorer 5.00.2920.0000
Microsoft Internet Explorer 5.00.3502.1000
Microsoft Internet Explorer 5.01
Microsoft Ie 5.22
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.50.4522.1800
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0.2900
Microsoft Ie 6.0
Microsoft Internet Explorer 6.00.3790.0000
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.00.6000.16386
Microsoft Internet Explorer 3.0.1
516
VMScore
CVE-2009-2069
Microsoft Internet Explorer prior to 8 displays a cached certificate for a (1) 4xx or (2) 5xx CONNECT response page returned by a proxy server, which allows man-in-the-middle malicious users to spoof an arbitrary https site by letting a browser obtain a valid certificate from thi...
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.0.1
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.70.1215
Microsoft Internet Explorer 4.70.1300
Microsoft Internet Explorer 5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.00.0518.10
Microsoft Internet Explorer 5.00.0910.1309
Microsoft Internet Explorer 5.00.2920.0000
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.00.2462.0000
Microsoft Internet Explorer 6.00.2479.0006
Microsoft Internet Explorer 7
Microsoft Internet Explorer 7.00.6000.16386
Microsoft Internet Explorer 7.00.6000.16441
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.1
383
VMScore
CVE-2002-2435
The Cascading Style Sheets (CSS) implementation in Microsoft Internet Explorer 8.0 and previous versions does not properly handle the :visited pseudo-class, which allows remote malicious users to obtain sensitive information about visited web pages via a crafted HTML document, a ...
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 7.0.5730
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 6.00.3663.0000
Microsoft Internet Explorer 6.00.2600.0000
Microsoft Internet Explorer 5.00.3105.0106
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.00.2614.3500
Microsoft Internet Explorer 5.00.2314.1003
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.50.4807.2300
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.00.3700.1000
Microsoft Internet Explorer 5.50.3825.1300
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.71.544
Microsoft Internet Explorer 4.71.1008.3
Microsoft Internet Explorer 3.1
445
VMScore
CVE-2010-5071
The JavaScript implementation in Microsoft Internet Explorer 8.0 and previous versions does not properly restrict the set of values contained in the object returned by the getComputedStyle method, which allows remote malicious users to obtain sensitive information about visited w...
Microsoft Internet Explorer 7.00.5730.1100
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 6.00.3790.1830
Microsoft Internet Explorer 6.00.2800.1106
Microsoft Internet Explorer 6.00.2479.0006
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.00.2919.6307
Microsoft Internet Explorer 5.00.2314.1003
Microsoft Internet Explorer 5.00.2014.0216
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.50.3825.1300
Microsoft Internet Explorer 4.72.3612.1713
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.71.1008.3
Microsoft Internet Explorer 4.72.2106.8
Microsoft Internet Explorer 4.40.308
Microsoft Internet Explorer 3.0.2
668
VMScore
CVE-2004-0866
Internet Explorer 6.0 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote malicious users to perform a session fixation attack and hijack a user's HTTP session.
Kde Konqueror 3.0.2
Kde Konqueror 3.0.3
Kde Konqueror 3.1.4
Kde Konqueror 3.1.5
Kde Konqueror 3.0
Kde Konqueror 3.0.1
Kde Konqueror 3.1.2
Kde Konqueror 3.1.3
Mozilla Firefox 0.9.2
Kde Konqueror 2.1.1
Kde Konqueror 2.1.2
Kde Konqueror 3.0.5
Kde Konqueror 3.0.5b
Kde Konqueror 3.2.1
Kde Konqueror 3.2.3
Microsoft Internet Explorer 6.0
Kde Konqueror 2.2.1
Kde Konqueror 2.2.2
Kde Konqueror 3.1
Kde Konqueror 3.1.1
Microsoft Ie 6.0
Suse Suse Linux 1.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2006-4304
CVE-2024-4240
arbitrary
CVE-2024-31601
XSS
CVE-2023-20198
CVE-2024-4256
CVE-2024-3342
encryption
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »