Page 6 of 58 results (0.081 seconds)

CVSS: 9.8EPSS: 83%CPEs: 3EXPL: 2

14 Jun 2005 — Stack-based buffer overflow in the news reader for Microsoft Outlook Express (MSOE.DLL) 5.5 SP2, 6, and 6 SP1 allows remote malicious NNTP servers to execute arbitrary code via a LIST response with a long second field. • https://www.exploit-db.com/exploits/1066 •

CVSS: 8.8EPSS: 26%CPEs: 2EXPL: 0

31 Dec 2004 — Microsoft Outlook 2000 and 2003, when configured to use Microsoft Word 2000 or 2003 as the e-mail editor and when forwarding e-mail, does not properly handle an opening OBJECT tag that does not have a closing OBJECT tag, which causes Outlook to automatically download the URI in the data property of the OBJECT tag and might allow remote attackers to execute arbitrary code. • http://secunia.com/advisories/12041 •

CVSS: 9.3EPSS: 75%CPEs: 43EXPL: 6

17 Sep 2004 — Buffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation. • https://www.exploit-db.com/exploits/474 •

CVSS: 10.0EPSS: 79%CPEs: 2EXPL: 4

06 Apr 2004 — The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability." El Manejador del protocolo MHTML en Microsoft Outlook Exp... • https://www.exploit-db.com/exploits/23695 •

CVSS: 9.8EPSS: 48%CPEs: 2EXPL: 1

28 Oct 2002 — Buffer overflow in the S/MIME Parsing capability in Microsoft Outlook Express 5.5 and 6.0 allows remote attackers to execute arbitrary code via a digitally signed email with a long "From" address, which triggers the overflow when the user views or previews the message. • https://www.exploit-db.com/exploits/21932 •

CVSS: 9.8EPSS: 40%CPEs: 4EXPL: 1

23 Aug 2002 — The Web Folder component for Internet Explorer 5.5 and 6.0 writes an error message to a known location in the temporary folder, which allows remote attackers to execute arbitrary code by injecting it into the error message, then referring to the error message file via a mhtml: URL. • https://www.exploit-db.com/exploits/21711 •

CVSS: 8.8EPSS: 22%CPEs: 15EXPL: 0

22 Apr 2002 — Buffer overflow in various Microsoft applications for Macintosh allows remote attackers to cause a denial of service (crash) or execute arbitrary code by invoking the file:// directive with a large number of / characters, which affects Internet Explorer 5.1, Outlook Express 5.0 through 5.0.2, Entourage v. ... Afecta a Internet Explorer 5.1, Outlook Express 5.0 a 5.0.2, Entourage v. • http://marc.info/?l=bugtraq&m=101897994314015&w=2 •

CVSS: 9.8EPSS: 24%CPEs: 1EXPL: 0

31 Dec 2001 — Outlook Express 6.0, with "Do not allow attachments to be saved or opened that could potentially be a virus" enabled, does not block email attachments from forwarded messages, which could allow remote attackers to execute arbitrary code. • http://www.iss.net/security_center/static/7670.php •