A spoofing vulnerability exists in the way Microsoft Outlook iOS software parses specifically crafted email messages. An authenticated attacker could exploit the vulnerability by sending a specially crafted email message to a victim.
The attacker who successfully exploited this vulnerability could then perform cross-site scripting attacks on the affected systems and run scripts in the security context of the current user.
The security update addresses the vulnerability by correcting how Outlook iOS parses specially crafted email messages.
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1218 | Patch Vendor Advisory |
Configurations
History
29 May 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A spoofing vulnerability exists in the way Microsoft Outlook iOS software parses specifically crafted email messages. An authenticated attacker could exploit the vulnerability by sending a specially crafted email message to a victim. The attacker who successfully exploited this vulnerability could then perform cross-site scripting attacks on the affected systems and run scripts in the security context of the current user. The security update addresses the vulnerability by correcting how Outlook iOS parses specially crafted email messages. |
Information
Published : 2019-08-14 21:15
Updated : 2024-05-29 17:16
NVD link : CVE-2019-1218
Mitre link : CVE-2019-1218
CVE.ORG link : CVE-2019-1218
JSON object : View
Products Affected
microsoft
- outlook
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')