Page 3 of 14 results (0.005 seconds)

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

Outlook Express 5.5 and 6.0 on Windows treats a carriage return ("CR") in a message header as if it were a valid carriage return/line feed combination (CR/LF), which could allow remote attackers to bypass virus protection and or other filtering mechanisms via a mail message with headers that only contain the CR, which causes Outlook to create separate headers. Outlook Express 5.5 y 6.0 en Windows trata un retorno de carro (CR) en una cabecera de mensaje como si fuera una combinación válida retorno de carro/avance de línea (CR/LF), lo que podría permitir a atacantes remotos evitar la protección contra virus y/o otros mecanismos de filtrado mediante correos con cabeceras que sólo contienen el CR, lo que hace que Outlook cree cabeceras separadas. • http://marc.info/?l=bugtraq&m=101362077701164&w=2 http://www.iss.net/security_center/static/8198.php http://www.securityfocus.com/bid/4092 •

CVSS: 7.5EPSS: 3%CPEs: 11EXPL: 3

Microsoft Outlook 8.5 and earlier, and Outlook Express 5 and earlier, with the "Automatically put people I reply to in my address book" option enabled, do not notify the user when the "Reply-To" address is different than the "From" address, which could allow an untrusted remote attacker to spoof legitimate addresses and intercept email from the client that is intended for another user. • https://www.exploit-db.com/exploits/20899 http://support.microsoft.com/default.aspx?scid=kb%3BEN-US%3Bq234241 http://www.securityfocus.com/archive/1/188752 http://www.securityfocus.com/bid/2823 https://exchange.xforce.ibmcloud.com/vulnerabilities/6655 •

CVSS: 7.5EPSS: 3%CPEs: 4EXPL: 2

Internet Explorer 5.0 and 5.5, and Outlook Express 5.0 and 5.5, allow remote attackers to execute scripts when Active Scripting is disabled by including the scripts in XML stylesheets (XSL) that are referenced using an IFRAME tag, possibly due to a vulnerability in Windows Scripting Host (WSH). • https://www.exploit-db.com/exploits/20782 http://www.securityfocus.com/archive/1/3AE02004.57FDF958%40guninski.com http://www.securityfocus.com/bid/2633 https://exchange.xforce.ibmcloud.com/vulnerabilities/6448 •

CVSS: 5.0EPSS: 5%CPEs: 3EXPL: 2

MSHTML.DLL HTML parser in Internet Explorer 4.0, and other versions, allows remote attackers to cause a denial of service (application crash) via a script that creates and deletes an object that is associated with the browser window object. • https://www.exploit-db.com/exploits/20552 http://marc.info/?l=bugtraq&m=97958685100219&w=2 http://www.securityfocus.com/bid/2202 https://exchange.xforce.ibmcloud.com/vulnerabilities/5938 •