Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows mobile vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-0674
Pictures and Videos on Windows Mobile 5.0 and Windows Mobile 2003 and 2003SE for Smartphones and PocketPC allows user-assisted remote malicious users to cause a denial of service (device hang) via a malformed JPEG file.
Microsoft Windows Mobile 2003
Microsoft Windows Mobile
Microsoft Windows Mobile 2003 Se
Microsoft Windows Mobile 5.0
NA
CVE-2007-0685
Internet Explorer on Windows Mobile 5.0 and Windows Mobile 2003 and 2003SE for Smartphones and PocketPC allows malicious users to cause a denial of service (application crash and device instability) via unspecified vectors, possibly related to a buffer overflow.
Microsoft Windows Mobile 2003
Microsoft Windows Mobile
Microsoft Windows Mobile 2003 Se
Microsoft Windows Mobile 5.0
8.8
CVSSv3
CVE-2009-0244
Directory traversal vulnerability in the OBEX FTP Service in the Microsoft Bluetooth stack in Windows Mobile 6 Professional, and probably Windows Mobile 5.0 for Pocket PC and 5.0 for Pocket PC Phone Edition, allows remote authenticated users to list arbitrary directories, and cre...
Microsoft Windows Mobile 6.0
Microsoft Windows Mobile 5.0
7.8
CVSSv3
CVE-2022-26903
Windows Graphics Component Remote Code Execution Vulnerability
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows 10 1607
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2008
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows 10 1909
Microsoft Word -
Microsoft Windows 10 20h2
Microsoft Windows Server 2016 20h2
Microsoft Windows 10 21h1
Microsoft Windows Server 2022 -
Microsoft Windows 11 -
Microsoft Windows 10 21h2
Microsoft Excel Mobile -
Microsoft Powerpoint -
6.8
CVSSv3
CVE-2019-1314
A security feature bypass vulnerability exists in Windows 10 Mobile when Cortana allows a user to access files and folders through the locked screen, aka 'Windows 10 Mobile Security Feature Bypass Vulnerability'.
Microsoft Windows 10 Mobile -
3 Articles
NA
CVE-2008-4540
Windows Mobile 6 on the HTC Hermes device makes WLAN passwords available to an auto-completion mechanism for the password input field, which allows physically proximate malicious users to bypass password authentication and obtain WLAN access.
Microsoft Windows Mobile 6.0
NA
CVE-2008-4295
Microsoft Windows Mobile 6.0 on HTC Wiza 200 and HTC MDA 8125 devices does not properly handle the first attempt to establish a Bluetooth connection to a peer with a long name, which allows remote malicious users to cause a denial of service (device reboot) by configuring a Bluet...
Microsoft Windows Mobile 6.0
1 EDB exploit
4.6
CVSSv3
CVE-2007-5460
Microsoft ActiveSync 4.1, as used in Windows Mobile 5.0, uses weak encryption (XOR obfuscation with a fixed key) when sending the user's PIN/Password over the USB connection from the host to the device, which might make it easier for malicious users to decode a PIN/Password ...
Microsoft Windows Mobile 5.0
NA
CVE-2007-5493
The SMS handler for Windows Mobile 2005 Pocket PC Phone edition allows malicious users to hide the sender field of an SMS message via a malformed WAP PUSH message that causes the PDU to be incorrectly decoded.
Microsoft Windows Mobile 2005
NA
CVE-2007-0878
Unspecified vulnerability in Microsoft Internet Explorer on Windows Mobile 5.0 allows remote malicious users to cause a denial of service (loss of browser and other device functionality) via a malformed WML page, related to an "overflow state." NOTE: it is possible that...
Microsoft Windows Mobile 5.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »