Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft ie 4.0 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-0153
Internet Explorer 5.1 for Macintosh allows remote malicious users to bypass security checks and invoke local AppleScripts within a specific HTML element, aka the "Local Applescript Invocation" vulnerability.
Microsoft Ie 4.0
Microsoft Ie 3.0
Microsoft Ie 5.1
Microsoft Ie 4.5
Microsoft Ie 5.0
Microsoft Ie 3.1
Microsoft Ie 4.0.1
1 EDB exploit
7.5
CVSSv2
CVE-2001-0667
Internet Explorer 6 and previous versions, when used with the Telnet client in Services for Unix (SFU) 2.0, allows remote malicious users to execute commands by spawning Telnet with a log file option on the command line and writing arbitrary code into an executable file which is ...
Microsoft Internet Explorer
7.5
CVSSv2
CVE-1999-1087
Internet Explorer 4 treats a 32-bit number ("dotless IP address") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unauthorized activi...
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
7.5
CVSSv2
CVE-1999-0354
Internet Explorer 4.x or 5.x with Word 97 allows arbitrary execution of Visual Basic programs to the IE client through the Word 97 template, which doesn't warn the user that the template contains executable content. Also applies to Outlook when the client views a malicious e...
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.0
Microsoft Word 97
6.8
CVSSv2
CVE-2009-2064
Microsoft Internet Explorer 8, and possibly other versions, detects http content in https web pages only when the top-level frame uses https, which allows man-in-the-middle malicious users to execute arbitrary web script, in an https site's context, by modifying an http page...
Microsoft Internet Explorer 6
Microsoft Pocket Ie 1.1
Microsoft Pocket Ie 2.0
Microsoft Internet Explorer 8
Microsoft Internet Explorer 8.0b
Microsoft Pocket Ie 3.0
Microsoft Pocket Ie 4.0
Microsoft Internet Explorer 5
Microsoft Internet Explorer 5.01
Microsoft Pocket Ie 1.0
Microsoft Internet Explorer
Microsoft Internet Explorer 7
Microsoft Internet Explorer 7.0.5730
Microsoft Pocket Ie 2002
Microsoft Pocket Ie 2003
5.8
CVSSv2
CVE-2009-2057
Microsoft Internet Explorer prior to 8 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle malicious users to execute arbitrary web script by modifying this CONNECT ...
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.70.1155
Microsoft Internet Explorer 4.70.1215
Microsoft Internet Explorer 4.72.2106.8
Microsoft Internet Explorer 4.72.3612.1713
Microsoft Internet Explorer 5.0.1
Microsoft Ie 5.0
Microsoft Internet Explorer 5.00.2919.6307
Microsoft Internet Explorer 5.00.2920.0000
Microsoft Internet Explorer 5.00.3502.1000
Microsoft Internet Explorer 5.01
Microsoft Ie 5.22
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.50.4522.1800
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0.2900
Microsoft Ie 6.0
Microsoft Internet Explorer 6.00.3790.0000
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.00.6000.16386
Microsoft Internet Explorer 3.0.1
5.8
CVSSv2
CVE-2009-2069
Microsoft Internet Explorer prior to 8 displays a cached certificate for a (1) 4xx or (2) 5xx CONNECT response page returned by a proxy server, which allows man-in-the-middle malicious users to spoof an arbitrary https site by letting a browser obtain a valid certificate from thi...
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.0.1
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.70.1215
Microsoft Internet Explorer 4.70.1300
Microsoft Internet Explorer 5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.00.0518.10
Microsoft Internet Explorer 5.00.0910.1309
Microsoft Internet Explorer 5.00.2920.0000
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.00.2462.0000
Microsoft Internet Explorer 6.00.2479.0006
Microsoft Internet Explorer 7
Microsoft Internet Explorer 7.00.6000.16386
Microsoft Internet Explorer 7.00.6000.16441
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.1
5.1
CVSSv2
CVE-2000-0162
The Microsoft virtual machine (VM) in Internet Explorer 4.x and 5.x allows a remote malicious user to read files via a malicious Java applet that escapes the Java sandbox, aka the "VM File Reading" vulnerability.
Microsoft Ie 4.1
Microsoft Ie 5.0
Microsoft Ie 5
Microsoft Visual Studio 6.0
Microsoft Internet Explorer 4.0
Microsoft Ie 4.0
5.1
CVSSv2
CVE-2000-0329
A Microsoft ActiveX control allows a remote malicious user to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the "Active Setup Control" vulnerability.
Microsoft Ie 4.1
Microsoft Outlook 98
Microsoft Outlook Express 4.27.3110.1
Microsoft Internet Explorer 4.0
Microsoft Ie 4.0.1
Microsoft Ie 5.0
Microsoft Outlook Express 4.72.2106.4
Microsoft Outlook Express 4.72.3120.0
Microsoft Outlook Express 4.72.3612.1700
Microsoft Outlook Express 5.0
Microsoft Ie 4.0
Microsoft Ie 5
Microsoft Outlook 2000
1 EDB exploit
5.1
CVSSv2
CVE-1999-1575
The Kodak/Wang (1) Image Edit (imgedit.ocx), (2) Image Annotation (imgedit.ocx), (3) Image Scan (imgscan.ocx), (4) Thumbnail Image (imgthumb.ocx), (5) Image Admin (imgadmin.ocx), (6) HHOpen (hhopen.ocx), (7) Registration Wizard (regwizc.dll), and (8) IE Active Setup (setupctl.dll...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 4.0.1
3 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »