Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft outlook express 5.5 vulnerabilities and exploits
(subscribe to this query)
7.1
CVSSv2
CVE-2008-1448
The MHTML protocol handler in a component of Microsoft Outlook Express 5.5 SP2 and 6 through SP1, and Windows Mail, does not assign the correct Internet Explorer Security Zone to UNC share pathnames, which allows remote malicious users to bypass intended access restrictions and r...
Microsoft Outlook Express 5.5
Microsoft Windows Mail
Microsoft Outlook Express 6.0
5
CVSSv2
CVE-2001-0322
MSHTML.DLL HTML parser in Internet Explorer 4.0, and other versions, allows remote malicious users to cause a denial of service (application crash) via a script that creates and deletes an object that is associated with the browser window object.
Microsoft Outlook Express 5.5
Microsoft Internet Explorer 4.0
Microsoft Outlook 2000
1 EDB exploit
4.3
CVSSv2
CVE-2006-2111
A component in Microsoft Outlook Express 6 allows remote malicious users to bypass domain restrictions and obtain sensitive information via redirections with the mhtml: URI handler, as originally reported for Internet Explorer 6 and 7, aka "URL Redirect Cross Domain Informat...
Microsoft Outlook Express 6.0
1 EDB exploit
9.3
CVSSv2
CVE-2010-0816
Integer overflow in inetcomm.dll in Microsoft Outlook Express 5.5 SP2, 6, and 6 SP1; Windows Live Mail on Windows XP SP2 and SP3, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7; and Windows Mail on Windows Vista SP1 and SP2, Windows Server 2008 Go...
Microsoft Outlook Express 5.5
Microsoft Outlook Express 6.0
Microsoft Windows Live Mail
Microsoft Windows Mail
1 EDB exploit
7.5
CVSSv2
CVE-2002-0980
The Web Folder component for Internet Explorer 5.5 and 6.0 writes an error message to a known location in the temporary folder, which allows remote malicious users to execute arbitrary code by injecting it into the error message, then referring to the error message file via a mht...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
5
CVSSv2
CVE-2004-0215
Microsoft Outlook Express 5.5 and 6 allows malicious users to cause a denial of service (application crash) via a malformed e-mail header.
Microsoft Outlook Express 6.0
Avaya Definity One Media Server
Avaya Ip600 Media Servers
Avaya S8100
Avaya Modular Messaging Message Storage Server S3400
2.6
CVSSv2
CVE-2003-1105
Unknown vulnerability in Internet Explorer 5.01 SP3 up to and including 6.0 SP1 allows remote malicious users to cause a denial of service (browser or Outlook Express crash) via HTML with certain input tags that are not properly rendered.
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
7.5
CVSSv2
CVE-2002-0022
Buffer overflow in the implementation of an HTML directive in mshtml.dll in Internet Explorer 5.5 and 6.0 allows remote malicious users to execute arbitrary code via a web page that specifies embedded ActiveX controls in a way that causes 2 Unicode strings to be concatenated.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
7.5
CVSSv2
CVE-2002-1262
Internet Explorer 5.5 and 6.0 does not perform complete security checks on external caching, which allows remote malicious users to read arbitrary files.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
5
CVSSv2
CVE-2003-0116
Microsoft Internet Explorer 5.01, 5.5 and 6.0 does not properly check the Cascading Style Sheet input parameter for Modal dialogs, which allows remote malicious users to read files on the local system via a web page containing script that creates a dialog and then accesses the ta...
Microsoft Internet Explorer 5.0.1
Microsoft Ie 6.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32886
insecure direct object reference
CVE-2024-34342
file inclusion
CVE-2024-34562
CVE-2024-34347
CVE-2024-26026
CVE-2024-4647
unprivileged
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »