Spoofing vulnerability in Microsoft Office via crafted MIME dataID: oval:org.secpod.oval:def:37085 | Date: (C)2016-09-15 (M)2023-07-13 |
Class: VULNERABILITY | Family: windows |
The host is installed with Microsoft Outlook 2007 SP3, Outlook 2010 SP2, Outlook 2013 SP1 or Outlook 2016 and is prone to a spoofing vulnerability. A flaw is present in the applications, which fail to handle crafted MIME data in an e-mail attachment. Successful exploitation could allow attackers to bypass virus or spam detection.
Platform: |
Microsoft Windows Server 2022 |
Microsoft Windows 11 |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2016 |
Microsoft Windows 10 |
Microsoft Windows 7 |
Microsoft Windows 8 |
Microsoft Windows Server 2003 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Vista |
Product: |
Microsoft Outlook 2007 |
Microsoft Outlook 2010 |
Microsoft Outlook 2013 |
Microsoft Outlook 2016 |