Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft access 2013 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-5072
Cross-site scripting (XSS) vulnerability in Outlook Web Access in Microsoft Exchange Server 2010 SP2 and SP3 and 2013 Cumulative Update 2 and 3 allows remote malicious users to inject arbitrary web script or HTML via a crafted URL, aka "OWA XSS Vulnerability."
Microsoft Exchange Server 2013
Microsoft Exchange Server 2010
NA
CVE-2013-5065
NDProxy.sys in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in November 2013.
Microsoft Windows Xp
Microsoft Windows 2003 Server
3 EDB exploits
2 Articles
NA
CVE-2013-5556
The license-installation module on the Cisco Nexus 1000V switch 4.2(1)SV1(5.2b) and previous versions for VMware vSphere, Cisco Nexus 1000V switch 5.2(1)SM1(5.1) for Microsoft Hyper-V, and Cisco Virtual Security Gateway 4.2(1)VSG1(1) for Nexus 1000V switches allows local users to...
Cisco Nexus 1000v 4.2(1)vsg1(1)
Cisco Nexus 1000v 5.2(1)sm1(5.1)
Cisco Nexus 1000v 4.2(1) Sv1(4a)
Cisco Nexus 1000v 4.2(1) Sv1(4b)
Cisco Nexus 1000v 4.2(1)sv1(5.1a)
Cisco Nexus 1000v
Cisco Nexus 1000v 4.2(1)sv1(5.1)
Cisco Nexus 1000v 4.2(1)sv1(5.2)
Cisco Nexus 1000v 4.2(1) Sv1(4)
NA
CVE-2013-5791
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.4.0 and 8.4.1 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters. NOTE: the previous information is from the Octobe...
Oracle Fusion Middleware 8.4
Oracle Fusion Middleware 8.4.1
1 EDB exploit
NA
CVE-2013-5208
HR Systems Strategies info:HR HRIS 7.9 does not properly protect the database password, which allows local users to bypass intended database restrictions by accessing the USERPW registry key and bypassing an unspecified obfuscation technique.
Infohr Hr Human Resource Information System 7.9
NA
CVE-2013-3880
The App Container feature in the kernel-mode drivers in Microsoft Windows 8, Windows Server 2012, and Windows RT allows remote malicious users to bypass intended access restrictions and obtain sensitive information from a different container via a Trojan horse application, aka &q...
Microsoft Windows Rt -
Microsoft Windows 8 -
Microsoft Windows Server 2012 -
NA
CVE-2013-3896
Microsoft Silverlight 5 prior to 5.1.20913.0 does not properly validate pointers during access to Silverlight elements, which allows remote malicious users to obtain sensitive information via a crafted Silverlight application, aka "Silverlight Vulnerability."
Microsoft Silverlight 5.0.60818.0
Microsoft Silverlight 5.1.10411.0
Microsoft Silverlight 5.0.61118.0
Microsoft Silverlight 5.1.20125.0
Microsoft Silverlight 5.0.60401.0
Microsoft Silverlight 5.1.20513.0
1 EDB exploit
NA
CVE-2013-3157
Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka "Access Memory Corruption Vulnerability," a different vulner...
Microsoft Access 2013
Microsoft Access 2010
Microsoft Access 2007
NA
CVE-2013-3155
Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka "Access Memory Corruption Vulnerability," a different vulner...
Microsoft Access 2013
Microsoft Access 2010
Microsoft Access 2007
NA
CVE-2013-3156
Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka "Access File Format Memory Corruption Vulnerability."
Microsoft Access 2013
Microsoft Access 2010
Microsoft Access 2007
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »