Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft access 2013 vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2019-0674
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0671, CVE-2...
Microsoft Office 2019
Microsoft Office 2016
Microsoft Office 2013
Microsoft Office 2010
Microsoft Office 365 Proplus -
1 Article
828
VMScore
CVE-2019-0671
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0672, CVE-2...
Microsoft Office 365 Proplus -
Microsoft Office 2019
Microsoft Office 2016
Microsoft Office 2013
Microsoft Office 2010
1 Article
828
VMScore
CVE-2019-0673
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0671, CVE-2...
Microsoft Office 365 Proplus -
Microsoft Office 2019
Microsoft Office 2016
Microsoft Office 2013
Microsoft Office 2010
1 Article
605
VMScore
CVE-2019-0826
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0823, CVE-2...
Microsoft Office 2013
Microsoft Office 2010
Microsoft Office 365 Proplus
Microsoft Office 2016
Microsoft Office 2019
1 Article
605
VMScore
CVE-2019-0827
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0823, CVE-2...
Microsoft Office 2013
Microsoft Office 2010
Microsoft Office 365 Proplus
Microsoft Office 2016
Microsoft Office 2019
1 Article
383
VMScore
CVE-2018-0940
Microsoft Exchange Outlook Web Access (OWA) in Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 20, Microsoft Exchange Server 2013 Cumulative Update 18, Microsoft Exchange Server 2013 Cumulative Update 19, Microsoft Exchange Server 2013 Service Pack 1, Microsoft Exchan...
Microsoft Exchange Server 2010
Microsoft Exchange Server 2016
Microsoft Exchange Server 2013
1 Article
383
VMScore
CVE-2020-1493
An information disclosure vulnerability exists when attaching files to Outlook messages. This vulnerability could potentially allow users to share attached files such that they are accessible by anonymous users where they should be restricted to specific users. To exploit this vu...
Microsoft Outlook 2016
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Office 2019
Microsoft 365 Apps -
1 Github repository
445
VMScore
CVE-2021-42293
Microsoft Jet Red Database Engine and Access Connectivity Engine Elevation of Privilege Vulnerability
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office 2013 Rt
Microsoft 365 Apps -
Microsoft Office 2019
Microsoft Office 2021
670
VMScore
CVE-2021-34523
Microsoft Exchange Server Elevation of Privilege Vulnerability
Microsoft Exchange Server 2013
Microsoft Exchange Server 2019
Microsoft Exchange Server 2016
7 Github repositories
11 Articles
NA
CVE-2022-41040
Microsoft Exchange Server Elevation of Privilege Vulnerability
Microsoft Exchange Server 2013
Microsoft Exchange Server 2016
Microsoft Exchange Server 2019
13 Github repositories
6 Articles
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »