Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft access 2013 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2019-0827
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0823, CVE-2...
Microsoft Office 2013
Microsoft Office 2010
Microsoft Office 365 Proplus
Microsoft Office 2016
Microsoft Office 2019
1 Article
9.3
CVSSv2
CVE-2019-0672
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0671, CVE-2...
Microsoft Office 2013
Microsoft Office 365 Proplus -
Microsoft Office 2019
Microsoft Office 2016
Microsoft Office 2010
1 Article
9.3
CVSSv2
CVE-2019-0673
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0671, CVE-2...
Microsoft Office 365 Proplus -
Microsoft Office 2019
Microsoft Office 2016
Microsoft Office 2013
Microsoft Office 2010
1 Article
9.3
CVSSv2
CVE-2019-0674
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0671, CVE-2...
Microsoft Office 2019
Microsoft Office 2016
Microsoft Office 2013
Microsoft Office 2010
Microsoft Office 365 Proplus -
1 Article
9.3
CVSSv2
CVE-2019-0671
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0672, CVE-2...
Microsoft Office 365 Proplus -
Microsoft Office 2019
Microsoft Office 2016
Microsoft Office 2013
Microsoft Office 2010
1 Article
4.3
CVSSv2
CVE-2018-0940
Microsoft Exchange Outlook Web Access (OWA) in Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 20, Microsoft Exchange Server 2013 Cumulative Update 18, Microsoft Exchange Server 2013 Cumulative Update 19, Microsoft Exchange Server 2013 Service Pack 1, Microsoft Exchan...
Microsoft Exchange Server 2010
Microsoft Exchange Server 2016
Microsoft Exchange Server 2013
1 Article
4.3
CVSSv2
CVE-2020-1493
An information disclosure vulnerability exists when attaching files to Outlook messages. This vulnerability could potentially allow users to share attached files such that they are accessible by anonymous users where they should be restricted to specific users. To exploit this vu...
Microsoft Outlook 2016
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Office 2019
Microsoft 365 Apps -
1 Github repository
5
CVSSv2
CVE-2021-42293
Microsoft Jet Red Database Engine and Access Connectivity Engine Elevation of Privilege Vulnerability
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office 2013 Rt
Microsoft 365 Apps -
Microsoft Office 2019
Microsoft Office 2021
7.5
CVSSv2
CVE-2021-34523
Microsoft Exchange Server Elevation of Privilege Vulnerability
Microsoft Exchange Server 2013
Microsoft Exchange Server 2019
Microsoft Exchange Server 2016
7 Github repositories
11 Articles
NA
CVE-2022-41040
Microsoft Exchange Server Elevation of Privilege Vulnerability
Microsoft Exchange Server 2013
Microsoft Exchange Server 2016
Microsoft Exchange Server 2019
13 Github repositories
6 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »