Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft ie 7.0 vulnerabilities and exploits
(subscribe to this query)
694
VMScore
CVE-2007-3550
Microsoft Internet Explorer 6.0 and 7.0 allows remote malicious users to fill Zones with arbitrary domains using certain metacharacters such as wildcards via JavaScript, which results in a denial of service (website suppression and resource consumption), aka "Internet Explor...
Microsoft Ie 6.0
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 7.0
668
VMScore
CVE-2004-1155
Internet Explorer 5.01 through 6 allows remote malicious users to spoof arbitrary web sites by injecting content from one window into another window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "w...
Microsoft Ie 5.0.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0.1
Microsoft Ie 5.2.3
Microsoft Ie 6.0
Microsoft Ie 7.0
Microsoft Internet Explorer 6.0
668
VMScore
CVE-2003-0346
Multiple integer overflows in a Microsoft Windows DirectX MIDI library (QUARTZ.DLL) allow remote malicious users to execute arbitrary code via a MIDI (.mid) file with (1) large length for a Text or Copyright string, or (2) a large number of tracks, which leads to a heap-based buf...
Microsoft Directx 5.2
Microsoft Directx 6.1
Microsoft Directx 9.0a
Microsoft Directx 7.0
Microsoft Directx 7.0a
Microsoft Directx 8.1
605
VMScore
CVE-2007-5344
Microsoft Internet Explorer 5.01 through 7 allows remote malicious users to execute arbitrary code via a crafted website using Javascript that creates, modifies, deletes, and accesses document objects using the tags property, which triggers heap corruption, related to uninitializ...
Microsoft Internet Explorer 5
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0.2800
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Ie 5.x
Microsoft Internet Explorer 6
Microsoft Ie 6.0
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.2.3
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 7
605
VMScore
CVE-2007-5347
Microsoft Internet Explorer 5.01 through 7 allows remote malicious users to execute arbitrary code via "unexpected method calls to HTML objects," aka "DHTML Object Memory Corruption Vulnerability."
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Ie 6.0
Microsoft Internet Explorer 7.0
Microsoft Ie 5.x
Microsoft Internet Explorer 6
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.2.3
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 7
Microsoft Internet Explorer 5
Microsoft Internet Explorer 6.0.2800
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 7.0.5730.11
605
VMScore
CVE-2007-3903
Microsoft Internet Explorer 6 and 7 allows remote malicious users to execute arbitrary code via uninitialized or deleted objects used in repeated calls to the (1) cloneNode or (2) nodeValue JavaScript function, a different issue than CVE-2007-3902 and CVE-2007-5344, a variant of ...
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 6.0.2800
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 7.0.5730.11
Microsoft Ie 6.0
605
VMScore
CVE-2007-1091
Microsoft Internet Explorer 7 allows remote malicious users to prevent users from leaving a site, spoof the address bar, and conduct phishing and other attacks via onUnload Javascript handlers.
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Ie 7.0
570
VMScore
CVE-2006-5913
Microsoft Internet Explorer 7 allows remote malicious users to (1) cause a security certificate from a secure web site to appear invalid via a link to res://ieframe.dll/sslnavcancel.htm with the target site in the anchor identifier, which displays the site's URL in the addre...
Microsoft Ie 7.0
570
VMScore
CVE-2006-5544
Visual truncation vulnerability in Microsoft Internet Explorer 7 allows remote malicious users to spoof the address bar and possibly conduct phishing attacks via a malicious URL containing non-breaking spaces (%A0), which causes the address bar to omit some characters from the UR...
Microsoft Ie 7.0
516
VMScore
CVE-2012-1545
Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, allows remote malicious users to bypass Protected Mode or cause a denial of service (memory corruption) by leveraging access to a Low integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanS...
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 6.0.2900.2180
Microsoft Internet Explorer 6.00.3790.1830
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 7.0.5730
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.00.3718.0000
Microsoft Internet Explorer 6.00.2900.2180
Microsoft Internet Explorer 7.00.6000.16441
Microsoft Internet Explorer 8.0.6001
Microsoft Internet Explorer 9
Microsoft Internet Explorer 6.00.2600.0000
Microsoft Internet Explorer 6.00.2800.1106
Microsoft Internet Explorer 6.00.2462.0000
Microsoft Internet Explorer 6.00.2479.0006
Microsoft Internet Explorer 7.00.5730.1100
Microsoft Ie 10
Microsoft Internet Explorer 6.0.2600
Microsoft Internet Explorer 6.0.2800
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »