Page 2 of 12 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 1

Microsoft Outlook Express allows remote attackers to monitor a user's email by creating a persistent browser link to the Outlook Express windows, aka the "Persistent Mail-Browser Link" vulnerability. • https://www.exploit-db.com/exploits/19738 http://www.securityfocus.com/bid/1502 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-045 •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 0

Microsoft Outlook 98 and 2000, and Outlook Express 4.0x and 5.0x, allow remote attackers to read files on the client's system via a malformed HTML message that stores files outside of the cache, aka the "Cache Bypass" vulnerability. • http://www.cert.org/advisories/CA-2000-14.html http://www.securityfocus.com/bid/1501 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-046 https://exchange.xforce.ibmcloud.com/vulnerabilities/5013 •

CVSS: 5.0EPSS: 3%CPEs: 6EXPL: 2

Buffer overflow in Microsoft Outlook and Outlook Express allows remote attackers to execute arbitrary commands via a long Date field in an email header, aka the "Malformed E-mail Header" vulnerability. • https://www.exploit-db.com/exploits/20078 https://www.exploit-db.com/exploits/20079 http://www.securityfocus.com/bid/1481 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-043 https://exchange.xforce.ibmcloud.com/vulnerabilities/4953 •

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in Outlook Express 4.x allows attackers to cause a denial of service via a mail or news message that has a .jpg or .bmp attachment with a long file name. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0140.html http://www.securityfocus.com/bid/1195 •

CVSS: 5.1EPSS: 1%CPEs: 20EXPL: 1

A Microsoft ActiveX control allows a remote attacker to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the "Active Setup Control" vulnerability. • https://www.exploit-db.com/exploits/19603 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-048 •