Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
outlook express vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-2386
Unspecified vulnerability in Microsoft Outlook Express 6 and previous versions allows remote malicious users to execute arbitrary code via a crafted contact record in a Windows Address Book (WAB) file.
Microsoft Outlook Express 5.5
Microsoft Outlook Express 6.0
NA
CVE-2006-2766
Buffer overflow in INETCOMM.DLL, as used in Microsoft Internet Explorer 6.0 up to and including 6.0 SP2, Windows Explorer, Outlook Express 6, and possibly other programs, allows remote user-assisted malicious users to cause a denial of service (application crash) via a long mhtml...
Microsoft Ie 6.0
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2006-2111
A component in Microsoft Outlook Express 6 allows remote malicious users to bypass domain restrictions and obtain sensitive information via redirections with the mhtml: URI handler, as originally reported for Internet Explorer 6 and 7, aka "URL Redirect Cross Domain Informat...
Microsoft Outlook Express 6.0
1 EDB exploit
NA
CVE-2006-0014
Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote malicious users to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values.
Microsoft Outlook Express 5.5
Microsoft Outlook Express 6.0
NA
CVE-2005-4840
The Outlook Express Address Book control, when using Internet Explorer 6, allows remote malicious users to cause a denial of service (NULL dereference and browser crash) by creating the OutlookExpress.AddressBook COM object, which is not intended for use within Internet Explorer.
Microsoft Outlook Express Book Control
NA
CVE-2005-2226
Microsoft Outlook Express 6.0 leaks the default news server account when a user responds to a "watched" conversation thread, which could allow remote malicious users to obtain sensitive information.
Microsoft Outlook Express 6.0
NA
CVE-2005-1213
Stack-based buffer overflow in the news reader for Microsoft Outlook Express (MSOE.DLL) 5.5 SP2, 6, and 6 SP1 allows remote malicious NNTP servers to execute arbitrary code via a LIST response with a long second field.
Microsoft Outlook Express 6.0
Microsoft Outlook Express 5.5
2 EDB exploits
NA
CVE-2004-1050
Heap-based buffer overflow in Internet Explorer 6 allows remote malicious users to execute arbitrary code via long (1) SRC or (2) NAME attributes in IFRAME, FRAME, and EMBED elements, as originally discovered using the mangleme utility, aka "the IFRAME vulnerability" or...
Avaya Ip600 Media Servers
Avaya Ip600 Media Servers R10
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Avaya Definity One Media Server R8
Avaya Definity One Media Server R9
Avaya S3400
Avaya S8100 R8
Avaya S8100 R9
Avaya Ip600 Media Servers R8
Avaya Ip600 Media Servers R9
Avaya Definity One Media Server R6
Avaya Definity One Media Server R7
Avaya S8100 R6
Avaya S8100 R7
Avaya Ip600 Media Servers R6
Avaya Ip600 Media Servers R7
Avaya Definity One Media Server R11
Avaya Definity One Media Server R12
Avaya S8100 R11
Avaya S8100 R12
Avaya Ip600 Media Servers R11
1 EDB exploit
NA
CVE-2004-2137
Outlook Express 6.0, when sending multipart e-mail messages using the "Break apart messages larger than" setting, leaks the BCC recipients of the message to the addresses listed in the To and CC fields, which may allow remote malicious users to obtain sensitive informat...
Microsoft Outlook Express 6.0
NA
CVE-2004-2694
Microsoft Outlook Express 6.0 allows remote malicious users to bypass intended access restrictions, load content from arbitrary sources into the Outlook context, and facilitate phishing attacks via a "BASE HREF" with the target set to "_top".
Microsoft Outlook Express 6.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »