Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft outlook 2002 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-0033
Microsoft Outlook 2002 and 2003 allows user-assisted remote malicious users to execute arbitrary code via a malformed VEVENT record in an .iCal meeting request or ICS file.
Microsoft Office 2000
Microsoft Outlook 2000
Microsoft Office Xp
Microsoft Outlook 2002
Microsoft Office 2003
Microsoft Outlook 2003
NA
CVE-2006-1305
Microsoft Outlook 2000, 2002, and 2003 allows user-assisted remote malicious users to cause a denial of service (memory exhaustion and interrupted mail recovery) via malformed e-mail header information, possibly related to (1) long subject lines or (2) large numbers of recipients...
Microsoft Office 2000
Microsoft Outlook 2000
Microsoft Outlook 2002
Microsoft Office Xp
Microsoft Office 2003
Microsoft Outlook 2003
NA
CVE-2006-3877
Unspecified vulnerability in PowerPoint in Microsoft Office 2000, Office 2002, Office 2003, Office 2004 for Mac, and Office v.X for Mac allows user-assisted malicious users to execute arbitrary code via an unspecified "crafted file," a different vulnerability than CVE-2...
Microsoft Excel 2003
Microsoft Excel Viewer 2003
Microsoft Office 2004
Microsoft Office Xp
Microsoft Powerpoint 2004
Microsoft Project 2000
Microsoft Visio 2003
Microsoft Word 2000
Microsoft Access 2000
Microsoft Frontpage 2000
Microsoft Frontpage 2002
Microsoft Onenote 2003
Microsoft Outlook 2000
Microsoft Outlook 2002
Microsoft Project 2002
Microsoft Project 2003
Microsoft Word 2002
Microsoft Word 2003
Microsoft Excel 2000
Microsoft Excel 2002
Microsoft Office 2000
Microsoft Office 2003
NA
CVE-2006-0002
Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote malicious users to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME att...
Microsoft Exchange Server 5.0
Microsoft Exchange Server 5.5
Microsoft Exchange Server 2000
Microsoft Office 2000
Microsoft Office 2003
Microsoft Office Xp
Microsoft Outlook 2000
Microsoft Outlook 2002
Microsoft Outlook 2003
NA
CVE-2005-0921
Microsoft Outlook 2002 Connector for IBM Lotus Domino 2.0 allows local users to save passwords and login credentials locally, even when password caching is disabled by a group policy.
Microsoft Outlook Connector 2002
NA
CVE-2004-2147
Unknown versions of Symantec Norton AntiVirus and Microsoft Outlook allow malicious users to cause a denial of service (crash) via malformed e-mail messages (1) without a body or (2) without a carriage return ("\n") separating the headers from the body.
Symantec Norton Antivirus Corporate 7.2
Symantec Norton Antivirus Corporate 7.51
Symantec Norton Antivirus Professional 2003
Symantec Norton Antivirus Corporate 7.60.build 926
Symantec Norton Antivirus Corporate 7.61
Symantec Norton Antivirus Corporate 8.0
Symantec Norton Antivirus Professional 2001
Symantec Norton Antivirus 2.1
Symantec Norton Antivirus 2001
Symantec Norton Antivirus 2002
Symantec Norton Antivirus 2003
Symantec Norton Antivirus Corporate 7.0
Symantec Norton Antivirus Corporate 7.5
Symantec Norton Antivirus Corporate 7.6
Symantec Norton Antivirus Professional 2002
Symantec Norton Antivirus Professional 2004
NA
CVE-2004-0284
Microsoft Internet Explorer 6.0, Outlook 2002, and Outlook 2003 allow remote malicious users to cause a denial of service (CPU consumption), if "Do not save encrypted pages to disk" is disabled, via a web site or HTML e-mail that contains two null characters (%00) after...
Microsoft Outlook 2002
Microsoft Outlook 2003
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
NA
CVE-2004-0200
Buffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote malicious users to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length ...
Microsoft .net Framework 1.0
Microsoft Frontpage 2003
Microsoft Greetings 2002
Microsoft Picture It 2002
Microsoft Picture It 7.0
Microsoft Publisher 2003
Microsoft Visio 2002
Microsoft Visual C\\+\\+ 2003
Microsoft Visual J\\# .net 2003
Microsoft Excel 2003
Microsoft Frontpage 2002
Microsoft Outlook 2002
Microsoft Outlook 2003
Microsoft Project 2002
Microsoft Project 2003
Microsoft Publisher 2002
Microsoft Visual C\\# 2003
Microsoft Visual C\\+\\+ 2002
Microsoft Digital Image Suite 9
Microsoft Excel 2002
Microsoft Office Xp
Microsoft Onenote 2003
6 EDB exploits
NA
CVE-2004-0526
Unknown versions of Internet Explorer and Outlook allow remote malicious users to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, w...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Ie 6.0
Microsoft Outlook 2000
Microsoft Outlook 2002
Microsoft Outlook 2003
Microsoft Outlook Express 4.72.3612
Microsoft Outlook Express 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Outlook Express 4.27.3110
Microsoft Outlook Express 4.72.2106
Microsoft Outlook Express 4.72.3120.0
Microsoft Outlook 97
Microsoft Outlook 98
Microsoft Outlook Express 5.0.1
Microsoft Outlook Express 5.5
Microsoft Outlook Express 4.0
Microsoft Outlook Express 4.01
Microsoft Outlook Express 6.0
1 EDB exploit
NA
CVE-2004-0121
Argument injection vulnerability in Microsoft Outlook 2002 does not sufficiently filter parameters of mailto: URLs when using them as arguments when calling OUTLOOK.EXE, which allows remote malicious users to use script code in the Local Machine zone and execute arbitrary program...
Microsoft Outlook 2002
Microsoft Office Xp
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »