Page 8 of 46 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 1

Microsoft Outlook Express allows remote attackers to monitor a user's email by creating a persistent browser link to the Outlook Express windows, aka the "Persistent Mail-Browser Link" vulnerability. • https://www.exploit-db.com/exploits/19738 http://www.securityfocus.com/bid/1502 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-045 •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 0

Microsoft Outlook 98 and 2000, and Outlook Express 4.0x and 5.0x, allow remote attackers to read files on the client's system via a malformed HTML message that stores files outside of the cache, aka the "Cache Bypass" vulnerability. • http://www.cert.org/advisories/CA-2000-14.html http://www.securityfocus.com/bid/1501 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-046 https://exchange.xforce.ibmcloud.com/vulnerabilities/5013 •

CVSS: 5.0EPSS: 3%CPEs: 6EXPL: 2

Buffer overflow in Microsoft Outlook and Outlook Express allows remote attackers to execute arbitrary commands via a long Date field in an email header, aka the "Malformed E-mail Header" vulnerability. • https://www.exploit-db.com/exploits/20078 https://www.exploit-db.com/exploits/20079 http://www.securityfocus.com/bid/1481 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-043 https://exchange.xforce.ibmcloud.com/vulnerabilities/4953 •

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in Outlook Express 4.x allows attackers to cause a denial of service via a mail or news message that has a .jpg or .bmp attachment with a long file name. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0140.html http://www.securityfocus.com/bid/1195 •

CVSS: 5.0EPSS: 86%CPEs: 1EXPL: 1

Outlook Express 5.01 and Internet Explorer 5.01 allow remote attackers to view a user's email messages via a script that accesses a variable that references subsequent email messages that are read by the client. • https://www.exploit-db.com/exploits/19738 http://www.securityfocus.com/bid/962 •