Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft outlook 2016 vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2017-8572
Microsoft Outlook 2007 SP3, Outlook 2010 SP2, Outlook 2013 SP1, Outlook 2013 RT SP1, and Outlook 2016 as packaged in Microsoft Office allows an information disclosure vulnerability due to the way that it discloses the contents of its memory, aka "Microsoft Office Outlook Inf...
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Outlook 2007
Microsoft Outlook 2016
5.5
CVSSv3
CVE-2017-8508
A security feature bypass vulnerability exists in Microsoft Office software when it improperly handles the parsing of file formats, aka "Microsoft Office Security Feature Bypass Vulnerability".
Microsoft Outlook 2010
Microsoft Outlook 2016
Microsoft Outlook 2007
Microsoft Outlook 2013
6.5
CVSSv3
CVE-2016-3366
Microsoft Outlook 2007 SP3, Outlook 2010 SP2, Outlook 2013 SP1, Outlook 2013 RT SP1, Outlook 2016, and Outlook 2016 for Mac do not properly implement RFC 2046, which allows remote malicious users to bypass virus or spam detection via crafted MIME data in an e-mail attachment, aka...
Microsoft Outlook 2013
Microsoft Outlook 2016
Microsoft Outlook 2007
Microsoft Outlook 2010
7.8
CVSSv3
CVE-2017-8506
A remote code execution vulnerability exists in Microsoft Office when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8509, CVE-2017-8510, CVE-2017-8511, CVE-2017-8512, and CV...
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Outlook 2016
7.8
CVSSv3
CVE-2016-3278
Microsoft Outlook 2010 SP2, 2013 SP1, 2013 RT SP1, and 2016 allows remote malicious users to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
Microsoft Outlook 2016
Microsoft Outlook 2013
Microsoft Outlook 2010
Microsoft Outlook Rt 2013
8.8
CVSSv3
CVE-2018-0851
Microsoft Office 2007 SP2, Microsoft Office Word Viewer, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1 and RT SP1, Microsoft Office 2016, and Microsoft Office 2016 Click-to-Run (C2R) allow a remote code execution vulnerability, due to how Office handles objects in memory, ...
Microsoft Outlook 2013
Microsoft Outlook 2016
Microsoft Outlook 2010
Microsoft Office 2007
Microsoft Office 2016
Microsoft Office Word Viewer -
1 Article
5
CVSSv3
CVE-2020-1483
A remote code execution vulnerability exists in Microsoft Outlook when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on w...
Microsoft Outlook 2016
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Office 2019
Microsoft 365 Apps -
1 Article
5.5
CVSSv3
CVE-2020-1493
An information disclosure vulnerability exists when attaching files to Outlook messages. This vulnerability could potentially allow users to share attached files such that they are accessible by anonymous users where they should be restricted to specific users. To exploit this vu...
Microsoft Outlook 2016
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Office 2019
Microsoft 365 Apps -
1 Github repository
7.8
CVSSv3
CVE-2020-1349
A remote code execution vulnerability exists in Microsoft Outlook software when it fails to properly handle objects in memory, aka 'Microsoft Outlook Remote Code Execution Vulnerability'.
Microsoft Outlook 2016
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Office 2019
Microsoft 365 Apps -
1 Github repository
1 Article
6.5
CVSSv3
CVE-2020-17119
Microsoft Outlook Information Disclosure Vulnerability
Microsoft Outlook 2016
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Office 2019
Microsoft 365 Apps -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4654
CVE-2023-49606
encryption
NULL pointer dereference
CVE-2024-4439
CVE-2024-4649
race condition
CVE-2024-27202
CVE-2024-34566
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »