Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows mobile vulnerabilities and exploits
(subscribe to this query)
7.1
CVSSv2
CVE-2007-0674
Pictures and Videos on Windows Mobile 5.0 and Windows Mobile 2003 and 2003SE for Smartphones and PocketPC allows user-assisted remote malicious users to cause a denial of service (device hang) via a malformed JPEG file.
Microsoft Windows Mobile 2003
Microsoft Windows Mobile
Microsoft Windows Mobile 2003 Se
Microsoft Windows Mobile 5.0
2.6
CVSSv2
CVE-2007-0685
Internet Explorer on Windows Mobile 5.0 and Windows Mobile 2003 and 2003SE for Smartphones and PocketPC allows malicious users to cause a denial of service (application crash and device instability) via unspecified vectors, possibly related to a buffer overflow.
Microsoft Windows Mobile 2003
Microsoft Windows Mobile
Microsoft Windows Mobile 2003 Se
Microsoft Windows Mobile 5.0
8.5
CVSSv2
CVE-2009-0244
Directory traversal vulnerability in the OBEX FTP Service in the Microsoft Bluetooth stack in Windows Mobile 6 Professional, and probably Windows Mobile 5.0 for Pocket PC and 5.0 for Pocket PC Phone Edition, allows remote authenticated users to list arbitrary directories, and cre...
Microsoft Windows Mobile 6.0
Microsoft Windows Mobile 5.0
9.3
CVSSv2
CVE-2022-26903
Windows Graphics Component Remote Code Execution Vulnerability
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows 10 1607
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2008
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows 10 1909
Microsoft Word -
Microsoft Windows 10 20h2
Microsoft Windows Server 2016 20h2
Microsoft Windows 10 21h1
Microsoft Windows Server 2022 -
Microsoft Windows 11 -
Microsoft Windows 10 21h2
Microsoft Excel Mobile -
Microsoft Powerpoint -
7.1
CVSSv2
CVE-2007-5460
Microsoft ActiveSync 4.1, as used in Windows Mobile 5.0, uses weak encryption (XOR obfuscation with a fixed key) when sending the user's PIN/Password over the USB connection from the host to the device, which might make it easier for malicious users to decode a PIN/Password ...
Microsoft Windows Mobile 5.0
4.6
CVSSv2
CVE-2019-1314
A security feature bypass vulnerability exists in Windows 10 Mobile when Cortana allows a user to access files and folders through the locked screen, aka 'Windows 10 Mobile Security Feature Bypass Vulnerability'.
Microsoft Windows 10 Mobile -
3 Articles
7.8
CVSSv2
CVE-2007-0878
Unspecified vulnerability in Microsoft Internet Explorer on Windows Mobile 5.0 allows remote malicious users to cause a denial of service (loss of browser and other device functionality) via a malformed WML page, related to an "overflow state." NOTE: it is possible that...
Microsoft Windows Mobile 5.0
5.4
CVSSv2
CVE-2008-4295
Microsoft Windows Mobile 6.0 on HTC Wiza 200 and HTC MDA 8125 devices does not properly handle the first attempt to establish a Bluetooth connection to a peer with a long name, which allows remote malicious users to cause a denial of service (device reboot) by configuring a Bluet...
Microsoft Windows Mobile 6.0
1 EDB exploit
2.1
CVSSv2
CVE-2008-4540
Windows Mobile 6 on the HTC Hermes device makes WLAN passwords available to an auto-completion mechanism for the password input field, which allows physically proximate malicious users to bypass password authentication and obtain WLAN access.
Microsoft Windows Mobile 6.0
4.3
CVSSv2
CVE-2007-5493
The SMS handler for Windows Mobile 2005 Pocket PC Phone edition allows malicious users to hide the sender field of an SMS message via a malformed WAP PUSH message that causes the PDU to be incorrectly decoded.
Microsoft Windows Mobile 2005
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »