Page 6 of 37 results (0.009 seconds)

CVSS: 5.0EPSS: 5%CPEs: 3EXPL: 2

MSHTML.DLL HTML parser in Internet Explorer 4.0, and other versions, allows remote attackers to cause a denial of service (application crash) via a script that creates and deletes an object that is associated with the browser window object. • https://www.exploit-db.com/exploits/20552 http://marc.info/?l=bugtraq&m=97958685100219&w=2 http://www.securityfocus.com/bid/2202 https://exchange.xforce.ibmcloud.com/vulnerabilities/5938 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

The Microsoft Outlook mail client identifies the physical path of the sender's machine within a winmail.dat attachment to Rich Text Format (RTF) files. • http://www.securityfocus.com/archive/1/201422 http://www.securityfocus.com/archive/1/78240 http://www.securityfocus.com/bid/1631 https://exchange.xforce.ibmcloud.com/vulnerabilities/5508 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Microsoft Outlook 2000 does not properly process long or malformed fields in vCard (.vcf) files, which allows attackers to cause a denial of service. • http://www.securityfocus.com/bid/1633 http://www.securityfocus.com/templates/archive.pike?list=1&msg=Springmail.105.967737080.0.16997300%40www.springmail.com •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 0

Microsoft Outlook 98 and 2000, and Outlook Express 4.0x and 5.0x, allow remote attackers to read files on the client's system via a malformed HTML message that stores files outside of the cache, aka the "Cache Bypass" vulnerability. • http://www.cert.org/advisories/CA-2000-14.html http://www.securityfocus.com/bid/1501 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-046 https://exchange.xforce.ibmcloud.com/vulnerabilities/5013 •

CVSS: 5.0EPSS: 3%CPEs: 6EXPL: 2

Buffer overflow in Microsoft Outlook and Outlook Express allows remote attackers to execute arbitrary commands via a long Date field in an email header, aka the "Malformed E-mail Header" vulnerability. • https://www.exploit-db.com/exploits/20078 https://www.exploit-db.com/exploits/20079 http://www.securityfocus.com/bid/1481 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-043 https://exchange.xforce.ibmcloud.com/vulnerabilities/4953 •