Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft access 2002 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2002-0736
Microsoft BackOffice 4.0 and 4.5, when configured to be accessible by other systems, allows remote malicious users to bypass authentication and access the administrative ASP pages via an HTTP request with an authorization type (auth_type) that is not blank.
Microsoft Backoffice 4.5
Microsoft Backoffice 4.0
5
CVSSv2
CVE-2002-0863
Remote Data Protocol (RDP) version 5.0 in Microsoft Windows 2000 and RDP 5.1 in Windows XP does not encrypt the checksums of plaintext session data, which could allow a remote malicious user to determine the contents of encrypted sessions via sniffing, aka "Weak Encryption i...
Microsoft .net Windows Server Beta3
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Microsoft Windows Nt 4.0
Microsoft Windows Xp
7.5
CVSSv2
CVE-2002-0619
The Mail Merge Tool in Microsoft Word 2002 for Windows, when Microsoft Access is present on a system, allows remote malicious users to execute Visual Basic (VBA) scripts within a mail merge document that is saved in HTML format, aka a "Variant of MS00-071, Word Mail Merge Vu...
Microsoft Office Xp
Microsoft Office 2000
7.5
CVSSv2
CVE-2002-0054
SMTP service in (1) Microsoft Windows 2000 and (2) Internet Mail Connector (IMC) in Exchange Server 5.5 does not properly handle responses to NTLM authentication, which allows remote malicious users to perform mail relaying via an SMTP AUTH command using null session credentials.
Microsoft Exchange Server 5.5
Microsoft Windows 2000 -
7.5
CVSSv2
CVE-2002-1262
Internet Explorer 5.5 and 6.0 does not perform complete security checks on external caching, which allows remote malicious users to read arbitrary files.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
7.5
CVSSv2
CVE-2002-0027
Internet Explorer 5.5 and 6.0 allows remote malicious users to read certain files and spoof the URL in the address bar by using the Document.open function to pass information between two frames from different domains, a new variant of the "Frame Domain Verification" vul...
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
4.6
CVSSv2
CVE-2002-1184
The system root folder of Microsoft Windows 2000 has default permissions of Everyone group with Full access (Everyone:F) and is in the search path when locating programs during login or application launch from the desktop, which could allow malicious users to gain privileges as o...
Microsoft Windows 2000
Microsoft Windows Nt 4.0
7.5
CVSSv2
CVE-2002-0189
Cross-site scripting vulnerability in Internet Explorer 6.0 allows remote malicious users to execute scripts in the Local Computer zone via a URL that exploits a local HTML resource file, aka the "Cross-Site Scripting in Local HTML Resource" vulnerability.
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
7.5
CVSSv2
CVE-2002-0154
Buffer overflows in extended stored procedures for Microsoft SQL Server 7.0 and 2000 allow remote malicious users to cause a denial of service or execute arbitrary code via a database query with certain long arguments.
Microsoft Sql Server 7.0
Microsoft Sql Server 2000
9.3
CVSSv2
CVE-2011-1274
Microsoft Excel 2002 SP3, 2003 SP3, and 2007 SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 do not properly validate record information during parsing...
Microsoft Excel Viewer
Microsoft Open Xml File Format Converter
Microsoft Excel 2002
Microsoft Excel 2007
Microsoft Office Compatibility Pack 2007
Microsoft Excel 2003
Microsoft Office 2004
Microsoft Office 2008
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »