Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
outlook express vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2002-0022
Buffer overflow in the implementation of an HTML directive in mshtml.dll in Internet Explorer 5.5 and 6.0 allows remote malicious users to execute arbitrary code via a web page that specifies embedded ActiveX controls in a way that causes 2 Unicode strings to be concatenated.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
668
VMScore
CVE-2001-1547
Outlook Express 6.0, with "Do not allow attachments to be saved or opened that could potentially be a virus" enabled, does not block email attachments from forwarded messages, which could allow remote malicious users to execute arbitrary code.
Microsoft Outlook Express 6.0
668
VMScore
CVE-2001-0999
Outlook Express 6.00 allows remote malicious users to execute arbitrary script by embedding SCRIPT tags in a message whose MIME content type is text/plain, contrary to the expected behavior that text/plain messages will not run script.
Microsoft Outlook Express 6.0
668
VMScore
CVE-2001-0145
Buffer overflow in VCard handler in Outlook 2000 and 98, and Outlook Express 5.x, allows an malicious user to execute arbitrary commands via a malformed vCard birthday field.
Microsoft Outlook Express 5.0
Microsoft Outlook 2000
Microsoft Outlook 98
668
VMScore
CVE-2000-0621
Microsoft Outlook 98 and 2000, and Outlook Express 4.0x and 5.0x, allow remote malicious users to read files on the client's system via a malformed HTML message that stores files outside of the cache, aka the "Cache Bypass" vulnerability.
Microsoft Outlook Express 4.01
Microsoft Outlook Express 5.0
Microsoft Outlook Express 5.0.1
Microsoft Outlook 2000
Microsoft Outlook 97
Microsoft Outlook 98
Microsoft Outlook Express 4.0
632
VMScore
CVE-2008-1448
The MHTML protocol handler in a component of Microsoft Outlook Express 5.5 SP2 and 6 through SP1, and Windows Mail, does not assign the correct Internet Explorer Security Zone to UNC share pathnames, which allows remote malicious users to bypass intended access restrictions and r...
Microsoft Outlook Express 5.5
Microsoft Windows Mail
Microsoft Outlook Express 6.0
605
VMScore
CVE-2006-2386
Unspecified vulnerability in Microsoft Outlook Express 6 and previous versions allows remote malicious users to execute arbitrary code via a crafted contact record in a Windows Address Book (WAB) file.
Microsoft Outlook Express 5.5
Microsoft Outlook Express 6.0
516
VMScore
CVE-2004-2694
Microsoft Outlook Express 6.0 allows remote malicious users to bypass intended access restrictions, load content from arbitrary sources into the Outlook context, and facilitate phishing attacks via a "BASE HREF" with the target set to "_top".
Microsoft Outlook Express 6.0
515
VMScore
CVE-2000-0329
A Microsoft ActiveX control allows a remote malicious user to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the "Active Setup Control" vulnerability.
Microsoft Ie 4.1
Microsoft Outlook 98
Microsoft Outlook Express 4.27.3110.1
Microsoft Internet Explorer 4.0
Microsoft Ie 4.0.1
Microsoft Ie 5.0
Microsoft Outlook Express 4.72.2106.4
Microsoft Outlook Express 4.72.3120.0
Microsoft Outlook Express 4.72.3612.1700
Microsoft Outlook Express 5.0
Microsoft Ie 4.0
Microsoft Ie 5
Microsoft Outlook 2000
1 EDB exploit
510
VMScore
CVE-2000-0567
Buffer overflow in Microsoft Outlook and Outlook Express allows remote malicious users to execute arbitrary commands via a long Date field in an email header, aka the "Malformed E-mail Header" vulnerability.
Microsoft Outlook 2000
Microsoft Outlook Express 4.0
Microsoft Outlook Express 4.01
Microsoft Outlook 97
Microsoft Outlook 98
Microsoft Outlook Express 5.0
2 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »