Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 4.0.1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2000-0061
Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote malicious users to execute Javascript in a different security context while the document is loading.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.01
1 EDB exploit
10
CVSSv2
CVE-1999-0702
Internet Explorer 5.0 and 5.01 allows remote malicious users to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability.
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
1 EDB exploit
7.6
CVSSv2
CVE-2000-0464
Internet Explorer 4.x and 5.x allows remote malicious users to execute arbitrary commands via a buffer overflow in the ActiveX parameter parsing capability, aka the "Malformed Component Attribute" vulnerability.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
7.5
CVSSv2
CVE-2002-0153
Internet Explorer 5.1 for Macintosh allows remote malicious users to bypass security checks and invoke local AppleScripts within a specific HTML element, aka the "Local Applescript Invocation" vulnerability.
Microsoft Ie 4.0
Microsoft Ie 3.0
Microsoft Ie 5.1
Microsoft Ie 4.5
Microsoft Ie 5.0
Microsoft Ie 3.1
Microsoft Ie 4.0.1
1 EDB exploit
7.5
CVSSv2
CVE-2000-0982
Internet Explorer prior to 5.5 forwards cached user credentials for a secure web site to insecure pages on the same web site, which could allow remote malicious users to obtain the credentials by monitoring connections to the web server, aka the "Cached Web Credentials"...
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 5.0
7.5
CVSSv2
CVE-2000-0596
Internet Explorer 5.x does not warn a user before opening a Microsoft Access database file that is referenced within ActiveX OBJECT tags in an HTML document, which could allow remote malicious users to execute arbitrary commands, aka the "IE Script" vulnerability.
Microsoft Internet Explorer 5
Microsoft Internet Explorer 4.0.1
7.5
CVSSv2
CVE-1999-1087
Internet Explorer 4 treats a 32-bit number ("dotless IP address") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unauthorized activi...
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
7.5
CVSSv2
CVE-1999-0488
Internet Explorer 4.0 and 5.0 allows a remote malicious user to execute security scripts in a different security context using malicious URLs, a variant of the "cross frame" vulnerability.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
7.5
CVSSv2
CVE-1999-0331
Buffer overflow in Internet Explorer 4.0(1).
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
6.4
CVSSv2
CVE-2002-0976
Internet Explorer 4.0 and later allows remote malicious users to read arbitrary files via a web page that accesses a legacy XML Datasource applet (com.ms.xml.dso.XMLDSO.class) and modifies the base URL to point to the local system, which is trusted by the applet.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22460
CVE-2024-4646
CVE-2024-29212
IMAP
CVE-2023-36672
CVE-2024-34547
command injection
CVE-2024-4651
stored XSS
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »