Download
| Alert*
oval:org.mitre.oval:def:1165
Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to messag ... oval:org.mitre.oval:def:1485 Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to messag ... oval:org.mitre.oval:def:1456 Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to messag ... oval:org.secpod.oval:def:1379 The host is missing an important security update according to Microsoft security bulletin, MS10-045. The update is required to fix remote code execution vulnerability. A flaw is present in the Microsoft Office Outlook, which fails to verify attachments in a specially crafted e-mail message. Successf ... oval:org.secpod.oval:def:1989 The host is missing a critical security update according to Microsoft security bulletin, MS10-064. The update is required to fix heap-based buffer overflow vulnerability. A flaw is present in the Outlook in Microsoft Windows, which fails to check specially crafted e-mail message. Successful exploita ... oval:org.mitre.oval:def:7125 Heap-based buffer overflow in Microsoft Outlook 2002 SP3, 2003 SP3, and 2007 SP2, when Online Mode for an Exchange Server is enabled, allows remote attackers to execute arbitrary code via a crafted e-mail message, aka "Heap Based Buffer Overflow in Outlook Vulnerability." oval:org.mitre.oval:def:11623 Microsoft Office Outlook 2002 SP3, 2003 SP3, and 2007 SP1 and SP2 does not properly verify e-mail attachments with a PR_ATTACH_METHOD property value of ATTACH_BY_REFERENCE, which allows user-assisted remote attackers to execute arbitrary code via a crafted message, aka "Microsoft Outlook SMB Attachm ... |