Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft outlook 2016 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2018-0850
Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013, Microsoft Outlook 2016, and Microsoft Office 2016 Click-to-Run allow an elevation of privilege vulnerability due to how the format of incoming message is validated, aka "Microsoft Outlook Elevation of Pr...
Microsoft Outlook 2016
Microsoft Outlook 2013
Microsoft Outlook 2010
Microsoft Outlook 2007
Microsoft Office 2016
1 Article
9.3
CVSSv2
CVE-2018-0852
Microsoft Outlook 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1 and RT SP1, Microsoft Outlook 2016, and Microsoft Office 2016 Click-to-Run (C2R) allow a remote code execution vulnerability, due to how Outlook handles objects in memory, aka "Microsoft Offic...
Microsoft Outlook 2013
Microsoft Outlook 2016
Microsoft Outlook 2010
Microsoft Office 2016
1 Article
9.3
CVSSv2
CVE-2018-0791
Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013, and Microsoft Outlook 2016 allow a remote code execution vulnerability due to the way email messages are parsed, aka "Microsoft Outlook Remote Code Execution Vulnerability". This CVE is unique from ...
Microsoft Outlook 2010
Microsoft Outlook 2007
Microsoft Office 2016
Microsoft Outlook 2016
Microsoft Outlook 2013
9.3
CVSSv2
CVE-2018-0793
Microsoft Outlook 2007, Microsoft Outlook 2010 and Microsoft Outlook 2013 allow a remote code execution vulnerability due to the way email messages are parsed, aka "Microsoft Outlook Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0791.
Microsoft Word 2016
Microsoft Word 2013
Microsoft Office 2016
Microsoft Office 2010
Microsoft Word 2010
Microsoft Office Compatibility Pack -
Microsoft Word 2007
4.3
CVSSv2
CVE-2018-0819
Microsoft Office 2016 for Mac allows an malicious user to send a specially crafted email attachment to a user in an attempt to launch a social engineering attack, such as phishing, due to how Outlook for Mac displays encoded email addresses, aka "Spoofing Vulnerability in Mi...
Microsoft Office 2016
1 Article
5.8
CVSSv2
CVE-2017-11932
Microsoft Exchange Server 2016 CU5 and Microsoft Exchange Server 2016 CU5 allow a spoofing vulnerability due to the way Outlook Web Access (OWA) validates web requests, aka "Microsoft Exchange Spoofing Vulnerability".
Microsoft Exchange Server 2016
1 Github repository
1 Article
6.8
CVSSv2
CVE-2017-11774
Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an malicious user to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka "Microsoft Outlook Security Feature Bypass Vulnerability."
Microsoft Outlook 2010
Microsoft Outlook 2016
Microsoft Outlook
Microsoft Outlook 2013
2 Github repositories
1 Article
5
CVSSv2
CVE-2017-11776
Microsoft Outlook 2016 allows an malicious user to obtain the email content of a user, due to how Outlook 2016 discloses user email content, aka "Microsoft Outlook Information Disclosure Vulnerability."
Microsoft Outlook 2016
1 Article
4.3
CVSSv2
CVE-2017-8758
Microsoft Exchange Server 2016 allows an elevation of privilege vulnerability when Microsoft Exchange Outlook Web Access (OWA) fails to properly handle web requests, aka "Microsoft Exchange Cross-Site Scripting Vulnerability."
Microsoft Exchange Server 2016
1 Github repository
9.3
CVSSv2
CVE-2017-8663
Microsoft Outlook 2007 SP3, Outlook 2010 SP2, Outlook 2013 SP1, Outlook 2013 RT SP1, and Outlook 2016 as packaged in Microsoft Office allows a remote code execution vulnerability due to the way Microsoft Outlook parses specially crafted email messages, aka "Microsoft Office ...
Microsoft Outlook 2013
Microsoft Outlook 2016
Microsoft Outlook 2007
Microsoft Outlook 2010
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »