Page 5 of 37 results (0.004 seconds)

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 0

An interaction between Windows Media Player (WMP) and Outlook 2002 allows remote attackers to bypass Outlook security settings and execute Javascript via an IFRAME in an HTML email message that references .WMS (Windows Media Skin) or other WMP media files, whose onload handlers execute the player.LaunchURL() Javascript function. • http://online.securityfocus.com/archive/1/263429 http://www.iss.net/security_center/static/8604.php http://www.securityfocus.com/bid/4340 •

CVSS: 7.5EPSS: 15%CPEs: 6EXPL: 0

Microsoft Outlook 2000 and 2002, when configured to use Microsoft Word as the email editor, does not block scripts that are used while editing email messages in HTML or Rich Text Format (RTF), which could allow remote attackers to execute arbitrary scripts via an email that the user forwards or replies to. Microsoft Outlook 2000 y 2002, cuando están configurados para usar Microsoft Word como editor de correo, no bloquea secuencias de comandos (scripts) en usjo mientras se editan mensajes en HTML o Formato de Texto Enriquecido (RTF), lo que podría permitir a atacantes remotos ejecutar scripts arbitrarios mediante un correo electrónico que el usuario reenvia o al que responde. • http://marc.info/?l=bugtraq&m=101760380418890&w=2 http://online.securityfocus.com/archive/1/265621 http://www.iss.net/security_center/static/8708.php http://www.securityfocus.com/bid/4397 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-021 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A205 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A429 •

CVSS: 10.0EPSS: 5%CPEs: 1EXPL: 2

Microsoft Outlook View ActiveX Control in Microsoft Outlook 2002 and earlier allows remote attackers to execute arbitrary commands via a malicious HTML e-mail message or web page. • https://www.exploit-db.com/exploits/21004 https://www.exploit-db.com/exploits/21003 http://marc.info/?l=bugtraq&m=99496431214078&w=2 http://www.ciac.org/ciac/bulletins/l-113.shtml http://www.kb.cert.org/vuls/id/131569 http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0107&L=ntbugtraq&F=P&S=&P=862 http://www.securityfocus.com/bid/3025 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-038 https://exchange.xforce.ibmcloud.co •

CVSS: 7.5EPSS: 3%CPEs: 11EXPL: 3

Microsoft Outlook 8.5 and earlier, and Outlook Express 5 and earlier, with the "Automatically put people I reply to in my address book" option enabled, do not notify the user when the "Reply-To" address is different than the "From" address, which could allow an untrusted remote attacker to spoof legitimate addresses and intercept email from the client that is intended for another user. • https://www.exploit-db.com/exploits/20899 http://support.microsoft.com/default.aspx?scid=kb%3BEN-US%3Bq234241 http://www.securityfocus.com/archive/1/188752 http://www.securityfocus.com/bid/2823 https://exchange.xforce.ibmcloud.com/vulnerabilities/6655 •

CVSS: 5.0EPSS: 5%CPEs: 3EXPL: 2

MSHTML.DLL HTML parser in Internet Explorer 4.0, and other versions, allows remote attackers to cause a denial of service (application crash) via a script that creates and deletes an object that is associated with the browser window object. • https://www.exploit-db.com/exploits/20552 http://marc.info/?l=bugtraq&m=97958685100219&w=2 http://www.securityfocus.com/bid/2202 https://exchange.xforce.ibmcloud.com/vulnerabilities/5938 •