Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft outlook 2016 vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2017-8508
A security feature bypass vulnerability exists in Microsoft Office software when it improperly handles the parsing of file formats, aka "Microsoft Office Security Feature Bypass Vulnerability".
Microsoft Outlook 2010
Microsoft Outlook 2016
Microsoft Outlook 2007
Microsoft Outlook 2013
383
VMScore
CVE-2017-0204
Microsoft Outlook 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1, and Microsoft Outlook 2016 allow remote malicious users to bypass the Office Protected View via a specially crafted document, aka "Microsoft Office Security Feature Bypass Vulnerability."...
Microsoft Outlook 2013
Microsoft Outlook 2016
Microsoft Outlook 2007
Microsoft Outlook 2010
1 Github repository
828
VMScore
CVE-2017-8663
Microsoft Outlook 2007 SP3, Outlook 2010 SP2, Outlook 2013 SP1, Outlook 2013 RT SP1, and Outlook 2016 as packaged in Microsoft Office allows a remote code execution vulnerability due to the way Microsoft Outlook parses specially crafted email messages, aka "Microsoft Office ...
Microsoft Outlook 2013
Microsoft Outlook 2016
Microsoft Outlook 2007
Microsoft Outlook 2010
828
VMScore
CVE-2017-8506
A remote code execution vulnerability exists in Microsoft Office when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8509, CVE-2017-8510, CVE-2017-8511, CVE-2017-8512, and CV...
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Outlook 2016
828
VMScore
CVE-2016-3278
Microsoft Outlook 2010 SP2, 2013 SP1, 2013 RT SP1, and 2016 allows remote malicious users to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
Microsoft Outlook 2016
Microsoft Outlook 2013
Microsoft Outlook 2010
Microsoft Outlook Rt 2013
828
VMScore
CVE-2018-0851
Microsoft Office 2007 SP2, Microsoft Office Word Viewer, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1 and RT SP1, Microsoft Office 2016, and Microsoft Office 2016 Click-to-Run (C2R) allow a remote code execution vulnerability, due to how Office handles objects in memory, ...
Microsoft Outlook 2013
Microsoft Outlook 2016
Microsoft Outlook 2010
Microsoft Office 2007
Microsoft Office 2016
Microsoft Office Word Viewer -
1 Article
605
VMScore
CVE-2021-28452
Microsoft Outlook Memory Corruption Vulnerability
Microsoft Outlook 2016
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Office 2019
Microsoft 365 Apps -
828
VMScore
CVE-2020-1483
A remote code execution vulnerability exists in Microsoft Outlook when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on w...
Microsoft Outlook 2016
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Office 2019
Microsoft 365 Apps -
1 Article
383
VMScore
CVE-2020-1493
An information disclosure vulnerability exists when attaching files to Outlook messages. This vulnerability could potentially allow users to share attached files such that they are accessible by anonymous users where they should be restricted to specific users. To exploit this vu...
Microsoft Outlook 2016
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Office 2019
Microsoft 365 Apps -
1 Github repository
605
VMScore
CVE-2020-1349
A remote code execution vulnerability exists in Microsoft Outlook software when it fails to properly handle objects in memory, aka 'Microsoft Outlook Remote Code Execution Vulnerability'.
Microsoft Outlook 2016
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Office 2019
Microsoft 365 Apps -
1 Github repository
1 Article
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »