Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows mail vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2007-2217
Kodak Image Viewer in Microsoft Windows 2000 SP4, and in some cases XP SP2 and Server 2003 SP1 and SP2, allows remote malicious users to execute arbitrary code via crafted image files that trigger memory corruption, as demonstrated by a certain .tif (TIFF) file.
Kodak Image Viewer
2 EDB exploits
5
CVSSv2
CVE-2003-1106
The SMTP service in Microsoft Windows 2000 before SP4 allows remote malicious users to cause a denial of service (crash or hang) via an e-mail message with a malformed time stamp in the FILETIME attribute.
7.5
CVSSv2
CVE-2010-4368
awstats.cgi in AWStats prior to 7.0 on Windows accepts a configdir parameter in the URL, which allows remote malicious users to execute arbitrary commands via a crafted configuration file located at a UNC share pathname.
Awstats Awstats 6.4
Awstats Awstats 6.4 1
Awstats Awstats 2.2.3
Awstats Awstats 4.1
Awstats Awstats 5.9
Awstats Awstats 5.7
Awstats Awstats 5.0
Awstats Awstats
Awstats Awstats 3.0
Awstats Awstats 6.5
Awstats Awstats 2.1.
Awstats Awstats 6.5 1
Awstats Awstats 5.5
Awstats Awstats 5.4
Awstats Awstats 5.3
Awstats Awstats 5.2
Awstats Awstats 3.2
Awstats Awstats 6.2
Awstats Awstats 3.1
Awstats Awstats 6.3
Awstats Awstats 6.9
Awstats Awstats 6.6
5
CVSSv2
CVE-2010-1425
F-Secure Internet Security 2010 and previous versions; Anti-Virus for Microsoft Exchange 9 and previous versions, and for MIMEsweeper 5.61 and previous versions; Internet Gatekeeper for Windows 6.61 and previous versions, and for Linux 4.02 and previous versions; Anti-Virus 2010 ...
F-secure F-secure Anti-virus 5.61
F-secure F-secure Anti-virus 5.41
F-secure F-secure Anti-virus 4.62
F-secure F-secure Anti-virus 4.51
F-secure F-secure Anti-virus
F-secure F-secure Anti-virus 5.42
F-secure F-secure Anti-virus 4.52
F-secure F-secure Anti-virus 5.5
F-secure F-secure Anti-virus 5.43
F-secure F-secure Anti-virus 6.2
F-secure F-secure Anti-virus 4.64
F-secure F-secure Anti-virus 5.11
F-secure F-secure Anti-virus 5.40
F-secure F-secure Anti-virus 5.52
F-secure F-secure Anti-virus 6.01
F-secure F-secure Anti-virus 2007
F-secure F-secure Anti-virus 2008
F-secure F-secure Anti-virus 4.61
F-secure F-secure Anti-virus 5.01
F-secure F-secure Anti-virus 4.50
F-secure F-secure Anti-virus 5.0.2
F-secure F-secure Anti-virus 5.2.1
7.5
CVSSv2
CVE-2010-4367
awstats.cgi in AWStats prior to 7.0 accepts a configdir parameter in the URL, which allows remote malicious users to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server.
Awstats Awstats 6.3
Awstats Awstats 2.2.4
Awstats Awstats 6.5 1
Awstats Awstats 2.2.3
Awstats Awstats 6.0
Awstats Awstats 5.9
Awstats Awstats 5.2
Awstats Awstats 5.1
Awstats Awstats 6.2
Awstats Awstats 3.1
Awstats Awstats 6.5
Awstats Awstats 2.1.
Awstats Awstats 6.7
Awstats Awstats 6.1
Awstats Awstats 5.4
Awstats Awstats 5.3
Awstats Awstats 6.4
Awstats Awstats 6.4 1
Awstats Awstats 6.5 1.857
Awstats Awstats 4.1
Awstats Awstats 1.0
Awstats Awstats 5.8
1 EDB exploit
4.4
CVSSv2
CVE-2011-0794
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5.0 allows local users to affect confidentiality, integrity, and availability, related to File ID SDK. NOTE: the previous information was obtained from the April 2011 CPU. Orac...
Oracle Fusion Middleware 8.3.5.0
4.4
CVSSv2
CVE-2011-0808
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.2.0 and 8.3.5.0 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Outside In Filters. NOTE: the previous information was ...
Oracle Fusion Middleware 8.3.2.0
Oracle Fusion Middleware 8.3.5.0
9.3
CVSSv2
CVE-2007-3845
Mozilla Firefox prior to 2.0.0.6, Thunderbird prior to 1.5.0.13 and 2.x prior to 2.0.0.6, and SeaMonkey prior to 1.1.4 allow remote malicious users to execute arbitrary commands via certain vectors associated with launching "a file handling program based on the file extensio...
Mozilla Firefox 2.0.0.5
Mozilla Seamonkey 1.1.3
Mozilla Thunderbird 2.0.0.5
1 EDB exploit
NA
CVE_2022_21882
OSEP-Notes Initial Access HTA Fileless Initial Access Reverse Shell (AppLocker + CLM + Defender Bypass) Scenario: You can make a user execute your malicious HTA files, but AppLocker, CLM, and Defender block all payloads. To get a fileless reverse shell, one method that worked for...
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6