Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows mail - vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2006-3438
Unspecified vulnerability in Microsoft Hyperlink Object Library (hlink.dll), possibly a buffer overflow, allows user-assisted malicious users to execute arbitrary code via crafted hyperlinks that are not properly handled when hlink.dll "uses a file containing a malformed fun...
Microsoft Hyperlink Object Library
9.3
CVSSv2
CVE-2006-0010
Heap-based buffer overflow in T2EMBED.DLL in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1, Windows 98, and Windows ME allows remote malicious users to execute arbitrary code via an e-mail message or web page with a crafted Embedded Open Type (EOT) web fon...
Microsoft Windows 2000
Microsoft Windows 2003 Server Datacenter 64-bit
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Standard 64-bit
Microsoft Windows Nt 3.5.1
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Web
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2003 Server R2
Microsoft Windows 98
Microsoft Windows 98se
Microsoft Windows Me
9.3
CVSSv2
CVE-2003-1026
Internet Explorer 5.01 through 6 SP1 allows remote malicious users to bypass zone restrictions via a javascript protocol URL in a sub-frame, which is added to the history list and executed in the top window's zone when the history.back (back) function is called, as demonstra...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
1 EDB exploit
7.5
CVSSv2
CVE-2010-4368
awstats.cgi in AWStats prior to 7.0 on Windows accepts a configdir parameter in the URL, which allows remote malicious users to execute arbitrary commands via a crafted configuration file located at a UNC share pathname.
Awstats Awstats 6.4
Awstats Awstats 6.4 1
Awstats Awstats 2.2.3
Awstats Awstats 4.1
Awstats Awstats 5.9
Awstats Awstats 5.7
Awstats Awstats 5.0
Awstats Awstats
Awstats Awstats 3.0
Awstats Awstats 6.5
Awstats Awstats 2.1.
Awstats Awstats 6.5 1
Awstats Awstats 5.5
Awstats Awstats 5.4
Awstats Awstats 5.3
Awstats Awstats 5.2
Awstats Awstats 3.2
Awstats Awstats 6.2
Awstats Awstats 3.1
Awstats Awstats 6.3
Awstats Awstats 6.9
Awstats Awstats 6.6
7.5
CVSSv2
CVE-2010-4367
awstats.cgi in AWStats prior to 7.0 accepts a configdir parameter in the URL, which allows remote malicious users to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server.
Awstats Awstats 6.3
Awstats Awstats 2.2.4
Awstats Awstats 6.5 1
Awstats Awstats 2.2.3
Awstats Awstats 6.0
Awstats Awstats 5.9
Awstats Awstats 5.2
Awstats Awstats 5.1
Awstats Awstats 6.2
Awstats Awstats 3.1
Awstats Awstats 6.5
Awstats Awstats 2.1.
Awstats Awstats 6.7
Awstats Awstats 6.1
Awstats Awstats 5.4
Awstats Awstats 5.3
Awstats Awstats 6.4
Awstats Awstats 6.4 1
Awstats Awstats 6.5 1.857
Awstats Awstats 4.1
Awstats Awstats 1.0
Awstats Awstats 5.8
1 EDB exploit
7.5
CVSSv2
CVE-2008-3068
Microsoft Crypto API 5.131.2600.2180 up to and including 6.0, as used in Outlook, Windows Live Mail, and Office 2007, performs Certificate Revocation List (CRL) checks by using an arbitrary URL from a certificate embedded in a (1) S/MIME e-mail message or (2) signed document, whi...
Microsoft Groove 2007
Microsoft Infopath 2003
Microsoft Outlook 2007
Microsoft Powerpoint 2003
Microsoft Visio Professional 2007
Microsoft Visio Standard 2007
Microsoft Access 2007
Microsoft Office 2007
Microsoft Office Communicator 2007
Microsoft Project Standard 2007
Microsoft Publisher 2003
Microsoft Excel 2003
Microsoft Excel 2007
Microsoft Frontpage 2003
Microsoft Onenote 2003
Microsoft Outlook 2003
Microsoft Publisher 2007
Microsoft Sharepoint Designer 2007
Microsoft Infopath 2007
Microsoft Powerpoint 2007
Microsoft Project Professional 2007
Microsoft Windows Live Mail 2008
7.5
CVSSv2
CVE-2006-3431
Buffer overflow in certain Asian language versions of Microsoft Excel might allow user-assisted malicious users to execute arbitrary code via a crafted STYLE record in a spreadsheet that triggers the overflow when the user attempts to repair the document or selects the "Styl...
Microsoft Excel
1 EDB exploit
7.5
CVSSv2
CVE-2006-2371
Buffer overflow in the Remote Access Connection Manager service (RASMAN) service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and previous versions allows remote unauthenticated or authenticated malicious users to execute arbitrary code via certain crafted &...
Microsoft Windows 2003 Server Datacenter Edition 64-bit
Microsoft Windows 2003 Server Standard
Microsoft Windows Xp
Microsoft Windows 2000
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Enterprise Edition
Microsoft Windows 2003 Server Standard 64-bit
Microsoft Windows 2003 Server Web
Microsoft Windows 2003 Server Enterprise Edition 64-bit
Microsoft Windows 2003 Server Datacenter Edition
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Sp1
7.5
CVSSv2
CVE-2005-1987
Buffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote malicious users to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Cont...
Microsoft Exchange Server 2000
Microsoft Windows Server 2003 R2
Microsoft Windows Server 2003 -
Microsoft Windows Xp -
Microsoft Windows Server 2003 Sp1
Microsoft Windows 2000 -
7.5
CVSSv2
CVE-2004-1244
Windows Media Player 9 allows remote malicious users to execute arbitrary code via a PNG file containing large (1) width or (2) height values, aka the "PNG Processing Vulnerability."
Microsoft Windows Media Player 9
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »