Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 4.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-0257
Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine whether it is safe to execute a method, which allows remote malicious users to execute arbitrary code via (1) a crafted web site or (2) a crafted .NET Framework applicati...
Microsoft .net Framework 1.0
Microsoft .net Framework 1.1
Microsoft .net Framework 4.5
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 2.0
Microsoft .net Framework 4.5.1
Microsoft .net Framework 4.0
1 EDB exploit
NA
CVE-2010-5071
The JavaScript implementation in Microsoft Internet Explorer 8.0 and previous versions does not properly restrict the set of values contained in the object returned by the getComputedStyle method, which allows remote malicious users to obtain sensitive information about visited w...
Microsoft Internet Explorer 7.00.5730.1100
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 6.00.3790.1830
Microsoft Internet Explorer 6.00.2800.1106
Microsoft Internet Explorer 6.00.2479.0006
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.00.2919.6307
Microsoft Internet Explorer 5.00.2314.1003
Microsoft Internet Explorer 5.00.2014.0216
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.50.3825.1300
Microsoft Internet Explorer 4.72.3612.1713
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.71.1008.3
Microsoft Internet Explorer 4.72.2106.8
Microsoft Internet Explorer 4.40.308
Microsoft Internet Explorer 3.0.2
NA
CVE-2002-2435
The Cascading Style Sheets (CSS) implementation in Microsoft Internet Explorer 8.0 and previous versions does not properly handle the :visited pseudo-class, which allows remote malicious users to obtain sensitive information about visited web pages via a crafted HTML document, a ...
Microsoft Internet Explorer 7.0.5730.11
Microsoft Internet Explorer 7.0.5730
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 6.00.3663.0000
Microsoft Internet Explorer 6.00.2600.0000
Microsoft Internet Explorer 5.00.3105.0106
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.00.2614.3500
Microsoft Internet Explorer 5.00.2314.1003
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.50.4807.2300
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.00.3700.1000
Microsoft Internet Explorer 5.50.3825.1300
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.71.544
Microsoft Internet Explorer 4.71.1008.3
Microsoft Internet Explorer 3.1
NA
CVE-2011-2383
Microsoft Internet Explorer 9 and previous versions does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote malicious users to read cookie files via vectors involving an IFRAME element with a SRC attribute containing an http: URL that redire...
Microsoft Internet Explorer 8
Microsoft Internet Explorer 5
Microsoft Ie 9
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer
NA
CVE-2011-2382
Microsoft Internet Explorer 8 and previous versions, and Internet Explorer 9 beta, does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote malicious users to read cookie files via vectors involving an IFRAME element with a SRC attribute cont...
Microsoft Internet Explorer
Microsoft Internet Explorer 5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 5.01
Microsoft Ie 9
Microsoft Internet Explorer 7
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 3.0.1
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.1
Microsoft Internet Explorer 3.2
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.1
Microsoft Internet Explorer 4.5
Microsoft Internet Explorer 4.40.308
Microsoft Internet Explorer 4.40.520
Microsoft Internet Explorer 4.70.1155
Microsoft Internet Explorer 4.70.1158
Microsoft Internet Explorer 4.70.1215
NA
CVE-2009-2954
Microsoft Internet Explorer 6.0.2900.2180 and previous versions allows remote malicious users to cause a denial of service (CPU consumption and application hang) via JavaScript code with a long string value for the hash property (aka location.hash), a related issue to CVE-2008-57...
Microsoft Internet Explorer
Microsoft Internet Explorer 6.00.2600.0000
Microsoft Internet Explorer 6.00.2479.0006
Microsoft Internet Explorer 5.50.4308.2900
Microsoft Internet Explorer 5.50.4030.2400
Microsoft Internet Explorer 5.00.3502.1000
Microsoft Internet Explorer 5.00.3315.1000
Microsoft Internet Explorer 5.00.2516.1900
Microsoft Internet Explorer 5.00.2614.3500
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 4.70.1300
Microsoft Internet Explorer 4.70.1215
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.0.1
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 6.0.2900
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 6.0.2800
Microsoft Internet Explorer 5.5
NA
CVE-2009-2576
Microsoft Internet Explorer 6.0.2900.2180 and previous versions allows remote malicious users to cause a denial of service (CPU and memory consumption) via a long Unicode string argument to the write method, a related issue to CVE-2009-2479. NOTE: it was later reported that 7.0.6...
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.0.1
Microsoft Ie 3.1
Microsoft Internet Explorer 3.2
Microsoft Internet Explorer 4.0.1
Microsoft Ie 4.0
Microsoft Ie 4.0a
Microsoft Internet Explorer 4.1
Microsoft Ie 4.5
Microsoft Internet Explorer 4.72.3110.8
Microsoft Internet Explorer 4.72.3612.1713
Microsoft Ie 5.0.1
Microsoft Ie 5.0
Microsoft Internet Explorer 5.00.2014.0216
Microsoft Internet Explorer 5.00.2516.1900
Microsoft Internet Explorer 5.00.3502.1000
Microsoft Internet Explorer 5.00.3700.1000
Microsoft Ie 6
Microsoft Internet Explorer 6.0.2800.1106
Microsoft Internet Explorer 5.50.4807.2300
Microsoft Internet Explorer 5.50.4522.1800
Microsoft Internet Explorer 5.5
NA
CVE-2009-2057
Microsoft Internet Explorer prior to 8 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle malicious users to execute arbitrary web script by modifying this CONNECT ...
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 4.70.1155
Microsoft Internet Explorer 4.70.1215
Microsoft Internet Explorer 4.72.2106.8
Microsoft Internet Explorer 4.72.3612.1713
Microsoft Internet Explorer 5.0.1
Microsoft Ie 5.0
Microsoft Internet Explorer 5.00.2919.6307
Microsoft Internet Explorer 5.00.2920.0000
Microsoft Internet Explorer 5.00.3502.1000
Microsoft Internet Explorer 5.01
Microsoft Ie 5.22
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.50.4522.1800
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0.2900
Microsoft Ie 6.0
Microsoft Internet Explorer 6.00.3790.0000
Microsoft Internet Explorer 6.00.3790.3959
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.00.6000.16386
Microsoft Internet Explorer 3.0.1
NA
CVE-2009-2069
Microsoft Internet Explorer prior to 8 displays a cached certificate for a (1) 4xx or (2) 5xx CONNECT response page returned by a proxy server, which allows man-in-the-middle malicious users to spoof an arbitrary https site by letting a browser obtain a valid certificate from thi...
Microsoft Internet Explorer 3.0
Microsoft Internet Explorer 3.0.1
Microsoft Internet Explorer 4.01
Microsoft Internet Explorer 4.70.1215
Microsoft Internet Explorer 4.70.1300
Microsoft Internet Explorer 5
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.00.0518.10
Microsoft Internet Explorer 5.00.0910.1309
Microsoft Internet Explorer 5.00.2920.0000
Microsoft Internet Explorer 5.00.3103.1000
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.00.2462.0000
Microsoft Internet Explorer 6.00.2479.0006
Microsoft Internet Explorer 7
Microsoft Internet Explorer 7.00.6000.16386
Microsoft Internet Explorer 7.00.6000.16441
Microsoft Internet Explorer 3.0.2
Microsoft Internet Explorer 3.1
NA
CVE-2009-2064
Microsoft Internet Explorer 8, and possibly other versions, detects http content in https web pages only when the top-level frame uses https, which allows man-in-the-middle malicious users to execute arbitrary web script, in an https site's context, by modifying an http page...
Microsoft Internet Explorer 6
Microsoft Pocket Ie 1.1
Microsoft Pocket Ie 2.0
Microsoft Internet Explorer 8
Microsoft Internet Explorer 8.0b
Microsoft Pocket Ie 3.0
Microsoft Pocket Ie 4.0
Microsoft Internet Explorer 5
Microsoft Internet Explorer 5.01
Microsoft Pocket Ie 1.0
Microsoft Internet Explorer
Microsoft Internet Explorer 7
Microsoft Internet Explorer 7.0.5730
Microsoft Pocket Ie 2002
Microsoft Pocket Ie 2003
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »