Page 6 of 29 results (0.012 seconds)

CVSS: 5.0EPSS: 2%CPEs: 3EXPL: 0

Microsoft Outlook 2002 allows remote attackers to cause a denial of service (repeated failure) via an email message with a certain invalid header field that is accessed using POP3, IMAP, or WebDAV, aka "E-mail Header Processing Flaw Could Cause Outlook 2002 to Fail." Microsoft Outlook 2002 permite a atacantes remotos causar una denegación de servicio (fallo repetido) mediante un mensaje de correo electrónico con cierto campo de cabecera inválido que es accedido usando POP3, IMAP O WebDAV. También conocido como "Error en Procesamiento de Cabecera de Correo Electrónico Podría Causar que Outlook 2002 Falle" • http://www.securityfocus.com/bid/6319 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-067 https://exchange.xforce.ibmcloud.com/vulnerabilities/10763 •

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 0

An interaction between Windows Media Player (WMP) and Outlook 2002 allows remote attackers to bypass Outlook security settings and execute Javascript via an IFRAME in an HTML email message that references .WMS (Windows Media Skin) or other WMP media files, whose onload handlers execute the player.LaunchURL() Javascript function. • http://online.securityfocus.com/archive/1/263429 http://www.iss.net/security_center/static/8604.php http://www.securityfocus.com/bid/4340 •

CVSS: 7.5EPSS: 15%CPEs: 6EXPL: 0

Microsoft Outlook 2000 and 2002, when configured to use Microsoft Word as the email editor, does not block scripts that are used while editing email messages in HTML or Rich Text Format (RTF), which could allow remote attackers to execute arbitrary scripts via an email that the user forwards or replies to. Microsoft Outlook 2000 y 2002, cuando están configurados para usar Microsoft Word como editor de correo, no bloquea secuencias de comandos (scripts) en usjo mientras se editan mensajes en HTML o Formato de Texto Enriquecido (RTF), lo que podría permitir a atacantes remotos ejecutar scripts arbitrarios mediante un correo electrónico que el usuario reenvia o al que responde. • http://marc.info/?l=bugtraq&m=101760380418890&w=2 http://online.securityfocus.com/archive/1/265621 http://www.iss.net/security_center/static/8708.php http://www.securityfocus.com/bid/4397 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-021 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A205 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A429 •

CVSS: 10.0EPSS: 5%CPEs: 1EXPL: 2

Microsoft Outlook View ActiveX Control in Microsoft Outlook 2002 and earlier allows remote attackers to execute arbitrary commands via a malicious HTML e-mail message or web page. • https://www.exploit-db.com/exploits/21004 https://www.exploit-db.com/exploits/21003 http://marc.info/?l=bugtraq&m=99496431214078&w=2 http://www.ciac.org/ciac/bulletins/l-113.shtml http://www.kb.cert.org/vuls/id/131569 http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0107&L=ntbugtraq&F=P&S=&P=862 http://www.securityfocus.com/bid/3025 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-038 https://exchange.xforce.ibmcloud.co •