Show filters
183 Total Results
Displaying 1-10 of 183
Sort by:
Attacker Value
Very High

CVE-2023-23397

Disclosure Date: March 14, 2023 (last updated August 15, 2024)
Microsoft Outlook Elevation of Privilege Vulnerability
Attacker Value
Unknown

CVE-2024-30103

Disclosure Date: June 11, 2024 (last updated January 12, 2025)
Microsoft Outlook Remote Code Execution Vulnerability
Attacker Value
High

CVE-2023-33131

Disclosure Date: June 14, 2023 (last updated January 11, 2025)
Microsoft Outlook Remote Code Execution Vulnerability
Attacker Value
Very High

CVE-2015-1641

Disclosure Date: April 14, 2015 (last updated July 25, 2024)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability."
Attacker Value
Unknown

CVE-2023-35311

Disclosure Date: July 11, 2023 (last updated February 05, 2025)
Microsoft Outlook Security Feature Bypass Vulnerability
Attacker Value
Unknown

CVE-2020-16947

Disclosure Date: October 16, 2020 (last updated February 22, 2025)
<p>A remote code execution vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the targeted user. If the targeted user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Outlook software. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, a…
1
Attacker Value
Unknown

CVE-2025-0916

Disclosure Date: February 19, 2025 (last updated February 20, 2025)
The YaySMTP and Email Logs: Amazon SES, SendGrid, Outlook, Mailgun, Brevo, Google and Any SMTP Service plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions 2.4.9 to 2.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: The vulnerability has been initially patched in version 2.4.8 and was reintroduced in version 2.4.9 with the removal of the wp_kses_post() built-in WordPress sanitization function.
Attacker Value
Unknown

CVE-2025-21259

Disclosure Date: February 11, 2025 (last updated February 12, 2025)
Microsoft Outlook Spoofing Vulnerability
Attacker Value
Unknown

CVE-2025-21361

Disclosure Date: January 14, 2025 (last updated January 18, 2025)
Microsoft Outlook Remote Code Execution Vulnerability
Attacker Value
Unknown

CVE-2025-21357

Disclosure Date: January 14, 2025 (last updated January 22, 2025)
Microsoft Outlook Remote Code Execution Vulnerability