Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft access 2007 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-0220
Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) in Microsoft Exchange Server 2000 SP3, and 2003 SP1 and SP2 allows remote malicious users to execute arbitrary scripts, spoof content, or obtain sensitive information via certain UTF-encoded, script-based e-mail...
Microsoft Exchange Server 2000
Microsoft Exchange Server 2003
NA
CVE-2007-0944
Unspecified vulnerability in the CTableCol::OnPropertyChange method in Microsoft Internet Explorer 5.01 SP4 on Windows 2000 SP4; 6 SP1 on Windows 2000 SP4; and 6 on Windows XP SP2, or Windows Server 2003 SP1 or SP2 allows remote malicious users to execute arbitrary code by callin...
Microsoft Internet Explorer 5.01
Microsoft Ie 6.0
NA
CVE-2007-2221
Unspecified vulnerability in the mdsauth.dll COM object in Microsoft Windows Media Server in the Microsoft Internet Explorer 5.01 SP4 on Windows 2000 SP4; 6 SP1 on Windows 2000 SP4; 6 and 7 on Windows XP SP2, or Windows Server 2003 SP1 or SP2; or 7 on Windows Vista allows remote ...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 7.0
1 EDB exploit
NA
CVE-2007-2292
CRLF injection vulnerability in the Digest Authentication support for Mozilla Firefox prior to 2.0.0.8 and SeaMonkey prior to 1.1.5 allows remote malicious users to conduct HTTP request splitting attacks via LF (%0a) bytes in the username attribute.
Mozilla Firefox
Mozilla Seamonkey
Microsoft Internet Explorer 7.0.5730.11
NA
CVE-2007-1531
Microsoft Windows XP and Vista overwrites ARP table entries included in gratuitous ARP, which allows remote malicious users to cause a denial of service (loss of network access) by sending a gratuitous ARP for the address of the Vista host.
Microsoft Windows Xp
Microsoft Windows Vista
2 EDB exploits
NA
CVE-2007-0718
Heap-based buffer overflow in Apple QuickTime prior to 7.1.5 allows remote user-assisted malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a QTIF file with a Video Sample Description containing a Color table ID of 0, which triggers memor...
Apple Quicktime 7.1.1
Apple Quicktime 7.1.2
Apple Quicktime 7.1.3
Apple Quicktime 7.0
Apple Quicktime 7.0.1
Apple Quicktime 7.1.4
Apple Quicktime 7.0.2
Apple Quicktime 7.0.3
Apple Quicktime 7.0.4
Apple Quicktime 7.1
NA
CVE-2007-1220
The Hypervisor in Microsoft Xbox 360 kernel 4532 and 4548 does not properly verify the parameters passed to the syscall dispatcher, which allows attackers with physical access to bypass code-signing requirements and execute arbitrary code.
Microsoft Xbox 360 4532
Microsoft Xbox 360 4548
NA
CVE-2007-1221
The Hypervisor in Microsoft Xbox 360 kernel 4532 and 4548 allows attackers with physical access to force execution of the hypervisor syscall with a certain register set, which bypasses intended code protection.
Microsoft Xbox 360 4548
Microsoft Xbox 360 4532
NA
CVE-2007-0843
The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 2003, and Vista does not check permissions for child objects, which allows local users to bypass permissions by opening a directory with LIST (READ) access and using ReadDirectoryChangesW to monitor chan...
Microsoft Windows Vista
Microsoft Windows Xp
Microsoft Windows 2000
Microsoft Windows 2003 Server
1 EDB exploit
1 Github repository
NA
CVE-2007-0211
The hardware detection functionality in the Windows Shell in Microsoft Windows XP SP2 and Professional, and Server 2003 SP1 allows local users to gain privileges via an unvalidated parameter to a function related to the "detection and registration of new hardware."
Microsoft Windows Xp
Microsoft Windows 2003 Server Sp1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »