Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 3.1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-1999-0876
Buffer overflow in Internet Explorer 4.0 via EMBED tag.
Microsoft Ie 3.0
Microsoft Ie 3.1
Microsoft Ie 4.0
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.1
9.3
CVSSv2
CVE-2008-2306
Apple Safari prior to 3.1.2 on Windows does not properly interpret the URLACTION_SHELL_EXECUTE_HIGHRISK Internet Explorer zone setting, which allows remote malicious users to bypass intended access restrictions, and force a client system to download and execute arbitrary files.
Apple Safari 3.0
Apple Safari 3.1
Apple Safari
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 3.0.1
Apple Safari 3.0.2
9.3
CVSSv2
CVE-2007-0018
Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote malicious users to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the products include (1) NCTsoft NC...
Altdo Mp3 Record And Edit Audio Master 1.2
Americanshareware Mp3 Wav Converter 3.1.8
Code-it Softare Wave Mp3 Editor 10.1
Dandans Digital Media Products Easy Audio Editor 7.4
Dandans Digital Media Products Full Audio Converter 4.2
Iaudiosoft.com Absolute Sound Recorder 3.4.5
Iaudiosoft.com Absolute Video To Audio Converter 2.7.9
J Hepple Products Fx Movie Joiner And Splitter 6.2.8
J Hepple Products Fx Movie Splitter 6.4.7
Mcfunsoft Audio Editor 6.3.3 Build 489
Mcfunsoft Audio Recorder For Free 6.1
Movavi Convertmovie 4.4
Cdburnerxp Cdburnerxp Pro 3.0.116
Cheetahburner Cheetah Cd Burner 3.56
Digital Borneo Audio Mixer And Editor 1.1.0
Easy Ringtone Maker Easy Ringtone Maker 2.0.5
J Hepple Products Fx Audio Editor 4.7.11
J Hepple Products Fx Audio Tools 7.3.4
Joshua Mediasoft Audio Convertor Plus 2.2
Joshua Mediasoft Video Converter Plus 3.01
Mcfunsoft Ipod Music Converter 5.1
Mcfunsoft Recording To Ipod Solution 5.1
3 EDB exploits
7.5
CVSSv2
CVE-2004-0867
Mozilla Firefox 0.9.2 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote malicious users to perform a session fixation attack and hijack a user's HTTP session. NOTE: it was later reported th...
Kde Konqueror 2.2.1
Kde Konqueror 2.2.2
Kde Konqueror 3.1
Kde Konqueror 3.1.1
Kde Konqueror 3.1.2
Microsoft Ie 6.0
Kde Konqueror 2.1.1
Kde Konqueror 2.1.2
Kde Konqueror 3.0.5
Kde Konqueror 3.0.5b
Kde Konqueror 3.2.3
Microsoft Internet Explorer 6.0
Kde Konqueror 3.0
Kde Konqueror 3.0.1
Kde Konqueror 3.1.3
Kde Konqueror 3.1.4
Mozilla Firefox 0.9.2
Kde Konqueror 3.0.2
Kde Konqueror 3.0.3
Kde Konqueror 3.1.5
Kde Konqueror 3.2.1
Suse Suse Linux 9.0
7.5
CVSSv2
CVE-2004-0866
Internet Explorer 6.0 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote malicious users to perform a session fixation attack and hijack a user's HTTP session.
Kde Konqueror 3.0.2
Kde Konqueror 3.0.3
Kde Konqueror 3.1.4
Kde Konqueror 3.1.5
Kde Konqueror 3.0
Kde Konqueror 3.0.1
Kde Konqueror 3.1.2
Kde Konqueror 3.1.3
Mozilla Firefox 0.9.2
Kde Konqueror 2.1.1
Kde Konqueror 2.1.2
Kde Konqueror 3.0.5
Kde Konqueror 3.0.5b
Kde Konqueror 3.2.1
Kde Konqueror 3.2.3
Microsoft Internet Explorer 6.0
Kde Konqueror 2.2.1
Kde Konqueror 2.2.2
Kde Konqueror 3.1
Kde Konqueror 3.1.1
Microsoft Ie 6.0
Suse Suse Linux 1.0
7.5
CVSSv2
CVE-2002-0153
Internet Explorer 5.1 for Macintosh allows remote malicious users to bypass security checks and invoke local AppleScripts within a specific HTML element, aka the "Local Applescript Invocation" vulnerability.
Microsoft Ie 4.0
Microsoft Ie 3.0
Microsoft Ie 5.1
Microsoft Ie 4.5
Microsoft Ie 5.0
Microsoft Ie 3.1
Microsoft Ie 4.0.1
1 EDB exploit
7.5
CVSSv2
CVE-2002-0075
Cross-site scripting vulnerability for Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote malicious users to execute arbitrary script as other web users via the error message used in a URL redirect (""302 Object Moved") message.
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0
5.8
CVSSv2
CVE-2009-2069
Microsoft Internet Explorer prior to 8 displays a cached certificate for a (1) 4xx or (2) 5xx CONNECT response page returned by a proxy server, which allows man-in-the-middle malicious users to spoof an arbitrary https site by letting a browser obtain a valid certificate from thi...
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.0.1
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.70.1215
Microsoft Internet Explorer 4.70.1300
Microsoft Internet Explorer 5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.00.0518.10
Microsoft Internet Explorer 5.00.0910.1309
Microsoft Internet Explorer 5.00.2920.0000
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.00.2462.0000
Microsoft Internet Explorer 6.00.2479.0006
Microsoft Internet Explorer 7
Microsoft Internet Explorer 7.00.6000.16386
Microsoft Internet Explorer 7.00.6000.16441
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.1
5.8
CVSSv2
CVE-2009-2057
Microsoft Internet Explorer prior to 8 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle malicious users to execute arbitrary web script by modifying this CONNECT ...
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.70.1155
Microsoft Internet Explorer 4.70.1215
Microsoft Internet Explorer 4.72.2106.8
Microsoft Internet Explorer 4.72.3612.1713
Microsoft Internet Explorer 5.0.1
Microsoft Ie 5.0
Microsoft Internet Explorer 5.00.2919.6307
Microsoft Internet Explorer 5.00.2920.0000
Microsoft Internet Explorer 5.00.3502.1000
Microsoft Internet Explorer 5.01
Microsoft Ie 5.22
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.50.4522.1800
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0.2900
Microsoft Ie 6.0
Microsoft Internet Explorer 6.00.3790.0000
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.00.6000.16386
Microsoft Internet Explorer 3.0.1
5
CVSSv2
CVE-2010-5071
The JavaScript implementation in Microsoft Internet Explorer 8.0 and previous versions does not properly restrict the set of values contained in the object returned by the getComputedStyle method, which allows remote malicious users to obtain sensitive information about visited w...
Microsoft Internet Explorer 7.00.5730.1100
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 6.00.3790.1830
Microsoft Internet Explorer 6.00.2800.1106
Microsoft Internet Explorer 6.00.2479.0006
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.00.2919.6307
Microsoft Internet Explorer 5.00.2314.1003
Microsoft Internet Explorer 5.00.2014.0216
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.50.3825.1300
Microsoft Internet Explorer 4.72.3612.1713
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.71.1008.3
Microsoft Internet Explorer 4.72.2106.8
Microsoft Internet Explorer 4.40.308
Microsoft Internet Explorer 3.0.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »