Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 4.0.1 vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2000-0061
Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote malicious users to execute Javascript in a different security context while the document is loading.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.01
1 EDB exploit
1000
VMScore
CVE-1999-0702
Internet Explorer 5.0 and 5.01 allows remote malicious users to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability.
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
1 EDB exploit
755
VMScore
CVE-2002-0153
Internet Explorer 5.1 for Macintosh allows remote malicious users to bypass security checks and invoke local AppleScripts within a specific HTML element, aka the "Local Applescript Invocation" vulnerability.
Microsoft Ie 4.0
Microsoft Ie 3.0
Microsoft Ie 5.1
Microsoft Ie 4.5
Microsoft Ie 5.0
Microsoft Ie 3.1
Microsoft Ie 4.0.1
1 EDB exploit
676
VMScore
CVE-2000-0464
Internet Explorer 4.x and 5.x allows remote malicious users to execute arbitrary commands via a buffer overflow in the ActiveX parameter parsing capability, aka the "Malformed Component Attribute" vulnerability.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.01
668
VMScore
CVE-2000-0982
Internet Explorer prior to 5.5 forwards cached user credentials for a secure web site to insecure pages on the same web site, which could allow remote malicious users to obtain the credentials by monitoring connections to the web server, aka the "Cached Web Credentials"...
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 5.0
668
VMScore
CVE-2000-0596
Internet Explorer 5.x does not warn a user before opening a Microsoft Access database file that is referenced within ActiveX OBJECT tags in an HTML document, which could allow remote malicious users to execute arbitrary commands, aka the "IE Script" vulnerability.
Microsoft Internet Explorer 5
Microsoft Internet Explorer 4.0.1
668
VMScore
CVE-1999-1087
Internet Explorer 4 treats a 32-bit number ("dotless IP address") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unauthorized activi...
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
668
VMScore
CVE-1999-0488
Internet Explorer 4.0 and 5.0 allows a remote malicious user to execute security scripts in a different security context using malicious URLs, a variant of the "cross frame" vulnerability.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
668
VMScore
CVE-1999-0331
Buffer overflow in Internet Explorer 4.0(1).
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
645
VMScore
CVE-2002-0976
Internet Explorer 4.0 and later allows remote malicious users to read arbitrary files via a web page that accesses a legacy XML Datasource applet (com.ms.xml.dso.XMLDSO.class) and modifies the base URL to point to the local system, which is trusted by the applet.
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »