
CVE-2002-0285
https://notcve.org/view.php?id=CVE-2002-0285
03 May 2002 — Outlook Express 5.5 and 6.0 on Windows treats a carriage return ("CR") in a message header as if it were a valid carriage return/line feed combination (CR/LF), which could allow remote attackers to bypass virus protection and or other filtering mechanisms via a mail message with headers that only contain the CR, which causes Outlook to create separate headers. Outlook Express 5.5 y 6.0 en Windows trata un retorno de carro (CR) en una cabecera de mensaje como si fuera una combinación válida retorno de carro/... • http://marc.info/?l=bugtraq&m=101362077701164&w=2 •

CVE-2001-1088 – Microsoft Outlook 97/98/2000/4/5 - Address Book Spoofing
https://notcve.org/view.php?id=CVE-2001-1088
05 Jun 2001 — Microsoft Outlook 8.5 and earlier, and Outlook Express 5 and earlier, with the "Automatically put people I reply to in my address book" option enabled, do not notify the user when the "Reply-To" address is different than the "From" address, which could allow an untrusted remote attacker to spoof legitimate addresses and intercept email from the client that is intended for another user. • https://www.exploit-db.com/exploits/20899 •

CVE-2001-1325 – Microsoft Internet Explorer 5.0/5.5 / OE 5.5 - XML Stylesheets Active Scripting
https://notcve.org/view.php?id=CVE-2001-1325
20 Apr 2001 — Internet Explorer 5.0 and 5.5, and Outlook Express 5.0 and 5.5, allow remote attackers to execute scripts when Active Scripting is disabled by including the scripts in XML stylesheets (XSL) that are referenced using an IFRAME tag, possibly due to a vulnerability in Windows Scripting Host (WSH). • https://www.exploit-db.com/exploits/20782 •

CVE-2001-0322 – Microsoft Internet Explorer 4 / Outlook 2000/5.5 - 'MSHTML.dll' Crash
https://notcve.org/view.php?id=CVE-2001-0322
04 Apr 2001 — MSHTML.DLL HTML parser in Internet Explorer 4.0, and other versions, allows remote attackers to cause a denial of service (application crash) via a script that creates and deletes an object that is associated with the browser window object. • https://www.exploit-db.com/exploits/20552 •