oval
via4
|
accepted | 2011-05-16T04:01:26.956-04:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | John Hoyland | organization | Centennial Software |
name | Anna Min | organization | BigFix, Inc |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Dragos Prisaca | organization | Gideon Technologies, Inc. |
name | Tim Harrison | organization | National Institute of Standards and Technology |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
| description | Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values. | family | windows | id | oval:org.mitre.oval:def:1611 | status | accepted | submitted | 2006-04-12T12:55:00.000-04:00 | title | Microsoft Outlook Express 6 (XP,SP2) WAB Remote Code Execution Vulnerability | version | 72 |
accepted | 2011-05-16T04:01:35.093-04:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Anna Min | organization | BigFix, Inc |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
| description | Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values. | family | windows | id | oval:org.mitre.oval:def:1682 | status | accepted | submitted | 2006-04-12T12:55:00.000-04:00 | title | Microsoft Outlook Express 6,SP1 WAB Remote Code Execution Vulnerability | version | 69 |
accepted | 2011-01-17T04:00:18.065-05:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | John Hoyland | organization | Centennial Software |
name | Anna Min | organization | BigFix, Inc |
name | Tim Harrison | organization | National Institute of Standards and Technology |
| description | Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values. | family | windows | id | oval:org.mitre.oval:def:1769 | status | accepted | submitted | 2006-04-12T12:55:00.000-04:00 | title | Microsoft Outlook Express 6 (64-bit XP) WAB Remote Code Execution Vulnerability | version | 67 |
accepted | 2011-05-16T04:01:46.627-04:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | John Hoyland | organization | Centennial Software |
name | Anna Min | organization | BigFix, Inc |
name | Jonathan Baker | organization | The MITRE Corporation |
name | Tim Harrison | organization | National Institute of Standards and Technology |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
| description | Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values. | family | windows | id | oval:org.mitre.oval:def:1771 | status | accepted | submitted | 2006-04-12T12:55:00.000-04:00 | title | Microsoft Outlook Express 6 (S03-Gold, Itanium) WAB Remote Code Execution Vulnerability | version | 71 |
accepted | 2006-11-14T08:57:55.387-05:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | John Hoyland | organization | Centennial Software |
name | Anna Min | organization | BigFix, Inc |
| description | Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values. | family | windows | id | oval:org.mitre.oval:def:1780 | status | accepted | submitted | 2006-04-12T12:55:00.000-04:00 | title | Microsoft Outlook Express 5.5 WAB Remote Code Execution Vulnerability | version | 65 |
accepted | 2011-05-16T04:01:50.849-04:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | John Hoyland | organization | Centennial Software |
name | Anna Min | organization | BigFix, Inc |
name | Tim Harrison | organization | National Institute of Standards and Technology |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
| description | Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values. | family | windows | id | oval:org.mitre.oval:def:1791 | status | accepted | submitted | 2006-04-12T12:55:00.000-04:00 | title | Microsoft Outlook Express 6 (S03,SP1) WAB Remote Code Execution Vulnerability | version | 70 |
accepted | 2011-05-16T04:03:31.624-04:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | John Hoyland | organization | Centennial Software |
name | Anna Min | organization | BigFix, Inc |
name | Jonathan Baker | organization | The MITRE Corporation |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Tim Harrison | organization | National Institute of Standards and Technology |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
| description | Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values. | family | windows | id | oval:org.mitre.oval:def:812 | status | accepted | submitted | 2006-04-12T12:55:00.000-04:00 | title | Microsoft Outlook Express 6 (S03-Gold) WAB Remote Code Execution Vulnerability | version | 72 |
|