Page 5 of 165 results (0.005 seconds)

CVSS: 9.3EPSS: 20%CPEs: 6EXPL: 0

14 Nov 2018 — A remote code execution vulnerability exists in Microsoft Outlook software when it fails to properly handle objects in memory, aka "Microsoft Outlook Remote Code Execution Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Outlook. This CVE ID is unique from CVE-2018-8522, CVE-2018-8576, CVE-2018-8582. Existe una vulnerabilidad de ejecución remota de código en el software de Microsoft Outlook cuando no gestiona correctamente objetos en la memoria. Esto también se conoce como "Micro... • http://www.securityfocus.com/bid/105823 •

CVSS: 9.3EPSS: 20%CPEs: 6EXPL: 0

14 Nov 2018 — A remote code execution vulnerability exists in Microsoft Outlook software when it fails to properly handle objects in memory, aka "Microsoft Outlook Remote Code Execution Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Outlook. This CVE ID is unique from CVE-2018-8522, CVE-2018-8524, CVE-2018-8582. Existe una vulnerabilidad de ejecución remota de código en el software de Microsoft Outlook cuando no gestiona correctamente objetos en la memoria. Esto también se conoce como "Micro... • http://www.securityfocus.com/bid/105822 •

CVSS: 9.3EPSS: 16%CPEs: 6EXPL: 0

14 Nov 2018 — A remote code execution vulnerability exists in the way that Microsoft Outlook parses specially modified rule export files, aka "Microsoft Outlook Remote Code Execution Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Outlook. This CVE ID is unique from CVE-2018-8522, CVE-2018-8524, CVE-2018-8576. Existe una vulnerabilidad de ejecución remota de código cuando Microsoft Outlook analiza archivos de exportación de reglas especialmente manipulados. Esto también se conoce como "Micros... • http://www.securityfocus.com/bid/105825 •

CVSS: 6.5EPSS: 10%CPEs: 5EXPL: 0

14 Jun 2018 — An elevation of privilege vulnerability exists when Microsoft Outlook does not validate attachment headers properly, aka "Microsoft Outlook Elevation of Privilege Vulnerability." This affects Microsoft Office, Microsoft Outlook. Existe una vulnerabilidad de elevación de privilegios cuando Microsoft Outlook no valida correctamente las cabeceras de adjuntos. Esto también se conoce como "Microsoft Outlook Elevation of Privilege Vulnerability". Esto afecta a Microsoft Office y Microsoft Outlook. • http://www.securityfocus.com/bid/104323 • CWE-20: Improper Input Validation •

CVSS: 5.9EPSS: 1%CPEs: 12EXPL: 1

16 May 2018 — The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification ** EN DISPUTA ** La especificación OpenPGP permite un ataque malleability-gadget Cipher Feedback Mode (CFB) que puede conducir indirectamente a la exfiltra... • http://flaked.sockpuppet.org/2018/05/16/a-unified-timeline.html •

CVSS: 5.9EPSS: 0%CPEs: 21EXPL: 1

16 May 2018 — The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. La especificación S/MIME permite un ataque malleability-gadget Cipher Block Chaining (CBC) que puede conducir indirectamente a la exfiltración en texto plano. Esto también se conoce como EFAIL. Multiple security issues have been found in Thunderbird, which may lead to the execution of arbitrary code, denial of service or attacks on encrypted emails. • http://www.securityfocus.com/bid/104165 •

CVSS: 6.5EPSS: 8%CPEs: 5EXPL: 0

15 Feb 2018 — Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013, Microsoft Outlook 2016, and Microsoft Office 2016 Click-to-Run allow an elevation of privilege vulnerability due to how the format of incoming message is validated, aka "Microsoft Outlook Elevation of Privilege Vulnerability". Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013, Microsoft Outlook 2016 y Microsoft Office 2016 Click-to-Run permiten una vulnerabilidad de elevación de privilegios debido a la forma en la q... • http://www.securityfocus.com/bid/102866 •

CVSS: 9.3EPSS: 15%CPEs: 8EXPL: 0

15 Feb 2018 — Microsoft Office 2007 SP2, Microsoft Office Word Viewer, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1 and RT SP1, Microsoft Office 2016, and Microsoft Office 2016 Click-to-Run (C2R) allow a remote code execution vulnerability, due to how Office handles objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0852. Microsoft Office 2007 SP2, Microsoft Office Word Viewer, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1 y RT SP1, Microsoft Office ... • http://www.securityfocus.com/bid/102870 • CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 15%CPEs: 6EXPL: 0

15 Feb 2018 — Microsoft Outlook 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1 and RT SP1, Microsoft Outlook 2016, and Microsoft Office 2016 Click-to-Run (C2R) allow a remote code execution vulnerability, due to how Outlook handles objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0851. Microsoft Outlook 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1 y RT SP1, Microsoft Outlook 2016 y Microsoft Office 2016 Click-to-Run (C2R) per... • http://www.securityfocus.com/bid/102871 • CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 29%CPEs: 6EXPL: 0

10 Jan 2018 — Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013, and Microsoft Outlook 2016 allow a remote code execution vulnerability due to the way email messages are parsed, aka "Microsoft Outlook Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0793. Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013 y Microsoft Outlook 2016 permiten una vulnerabilidad de ejecución remota de código debido a la forma en la que se analizan los mensajes de email. Esto tambi... • http://www.securityfocus.com/bid/102383 •