Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft ie 4.1 vulnerabilities and exploits
(subscribe to this query)
5.1
CVSSv2
CVE-2000-0162
The Microsoft virtual machine (VM) in Internet Explorer 4.x and 5.x allows a remote malicious user to read files via a malicious Java applet that escapes the Java sandbox, aka the "VM File Reading" vulnerability.
Microsoft Ie 4.1
Microsoft Ie 5.0
Microsoft Ie 5
Microsoft Visual Studio 6.0
Microsoft Internet Explorer 4.0
Microsoft Ie 4.0
10
CVSSv2
CVE-1999-0876
Buffer overflow in Internet Explorer 4.0 via EMBED tag.
Microsoft Ie 3.0
Microsoft Ie 3.1
Microsoft Ie 4.0
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.1
2.1
CVSSv2
CVE-2001-1497
Microsoft Internet Explorer 4.0 up to and including 6.0 could allow local users to differentiate between alphanumeric and non-alphanumeric characters used in a password by pressing certain control keys that jump between non-alphanumeric characters, which makes it easier to conduc...
Microsoft Internet Explorer 4.0.1
Microsoft Ie 4.1
Microsoft Internet Explorer 4.0
Microsoft Ie 4.0.1
Microsoft Internet Explorer 5.5
Microsoft Ie 4.0
Microsoft Internet Explorer 6.0
5.1
CVSSv2
CVE-2000-0329
A Microsoft ActiveX control allows a remote malicious user to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the "Active Setup Control" vulnerability.
Microsoft Ie 4.1
Microsoft Outlook 98
Microsoft Outlook Express 4.27.3110.1
Microsoft Internet Explorer 4.0
Microsoft Ie 4.0.1
Microsoft Ie 5.0
Microsoft Outlook Express 4.72.2106.4
Microsoft Outlook Express 4.72.3120.0
Microsoft Outlook Express 4.72.3612.1700
Microsoft Outlook Express 5.0
Microsoft Ie 4.0
Microsoft Ie 5
Microsoft Outlook 2000
1 EDB exploit
5
CVSSv2
CVE-2009-2576
Microsoft Internet Explorer 6.0.2900.2180 and previous versions allows remote malicious users to cause a denial of service (CPU and memory consumption) via a long Unicode string argument to the write method, a related issue to CVE-2009-2479. NOTE: it was later reported that 7.0.6...
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.0.1
Microsoft Ie 3.1
Microsoft Internet Explorer 3.2
Microsoft Internet Explorer 4.0.1
Microsoft Ie 4.0
Microsoft Ie 4.0a
Microsoft Internet Explorer 4.1
Microsoft Ie 4.5
Microsoft Internet Explorer 4.72.3110.8
Microsoft Internet Explorer 4.72.3612.1713
Microsoft Ie 5.0.1
Microsoft Ie 5.0
Microsoft Internet Explorer 5.00.2014.0216
Microsoft Internet Explorer 5.00.2516.1900
Microsoft Internet Explorer 5.00.3502.1000
Microsoft Internet Explorer 5.00.3700.1000
Microsoft Ie 6
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 5.50.4807.2300
Microsoft Internet Explorer 5.50.4522.1800
Microsoft Internet Explorer 5.5
4.3
CVSSv2
CVE-2007-4848
Microsoft Internet Explorer 4.0 through 7 allows remote malicious users to determine the existence of local files that have associated images via a res:// URI in the src property of a JavaScript Image object, as demonstrated by the URI for a bitmap image resource within a (1) .ex...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Ie 5.0 Ta3
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 4.5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Ie 5.x
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Ie 4.x
Microsoft Internet Explorer 5
Microsoft Ie 5.0
Microsoft Internet Explorer 5.1
2.6
CVSSv2
CVE-1999-0827
By default, Internet Explorer 5.0 and other versions enables the "Navigate sub-frames across different domains" option, which allows frame spoofing.
Netscape Navigator
Microsoft Ie 4.0
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.1
Microsoft Internet Explorer 3.2
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 4.5
Microsoft Internet Explorer 5.0
2.6
CVSSv2
CVE-2000-0028
Internet Explorer 5.0 and 5.01 allows remote malicious users to bypass the cross frame security policy and read files via the external.NavigateAndFind function.
Microsoft Ie 4.0
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.1
Microsoft Internet Explorer 3.2
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 4.5
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.0
1 EDB exploit
5.8
CVSSv2
CVE-2009-2057
Microsoft Internet Explorer prior to 8 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle malicious users to execute arbitrary web script by modifying this CONNECT ...
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.70.1155
Microsoft Internet Explorer 4.70.1215
Microsoft Internet Explorer 4.72.2106.8
Microsoft Internet Explorer 4.72.3612.1713
Microsoft Internet Explorer 5.0.1
Microsoft Ie 5.0
Microsoft Internet Explorer 5.00.2919.6307
Microsoft Internet Explorer 5.00.2920.0000
Microsoft Internet Explorer 5.00.3502.1000
Microsoft Internet Explorer 5.01
Microsoft Ie 5.22
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.50.4522.1800
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0.2900
Microsoft Ie 6.0
Microsoft Internet Explorer 6.00.3790.0000
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.00.6000.16386
Microsoft Internet Explorer 3.0.1
5.8
CVSSv2
CVE-2009-2069
Microsoft Internet Explorer prior to 8 displays a cached certificate for a (1) 4xx or (2) 5xx CONNECT response page returned by a proxy server, which allows man-in-the-middle malicious users to spoof an arbitrary https site by letting a browser obtain a valid certificate from thi...
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.0.1
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.70.1215
Microsoft Internet Explorer 4.70.1300
Microsoft Internet Explorer 5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.00.0518.10
Microsoft Internet Explorer 5.00.0910.1309
Microsoft Internet Explorer 5.00.2920.0000
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.00.2462.0000
Microsoft Internet Explorer 6.00.2479.0006
Microsoft Internet Explorer 7
Microsoft Internet Explorer 7.00.6000.16386
Microsoft Internet Explorer 7.00.6000.16441
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
CVE-2006-4304
CVE-2023-26603
CVE-2024-28327
CVE-2023-50363
CVE-2024-21905
template injection
CVE-2024-3400
cross-site request forgery
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »