Microsoft Outlook HTML Mail Script...

- AV AC AU C I A
发布: 2002-03-31
修订: 2025-04-13

Microsoft Outlook can be made to execute script embedded in HTML mail without warning the user. This is done by creating a web browser object containing script in the "Location" parameter specified by a <PARAM ... > tag and embedding this in the mail. When a user chooses to "reply" or "forward" the message, the script is executed. Script may also be embedded in .doc or .xls attachments. It may be possible to exploit this vulnerability to cause arbitrary commands to be executed on the system running the vulnerable software. This issue only exists if the WordMail editor is used. Those who use the default Outlook editor are allegedly not affected by this vulnerability.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息