漏洞信息详情
Microsoft Outlook Express 6纯文本邮件脚本执行漏洞
- CNNVD编号:CNNVD-200109-047
- 危害等级: 高危
![图片[1]-Microsoft Outlook Express 6纯文本邮件脚本执行漏洞-一一网](https://www.proyy.com/skycj/data/images/2021-05-11/bbdd3e8868c10d22861b2275d65f4500.png)
- CVE编号:
CVE-2001-0999
- 漏洞类型:
未知
- 发布时间:
2001-09-12
- 威胁类型:
远程
- 更新时间:
2005-10-20
- 厂 商:
microsoft - 漏洞来源:
This vulnerability… -
漏洞简介
Outlook Express 6.00版本存在漏洞。远程攻击者可以通过向MIME目录类型是text/plain的信息中植入SCRIPT标签执行任意脚本,该漏洞相反于text/plain信息不运行脚本的预期行为。
漏洞公告
Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com
参考网址
来源: XF
名称: outlook-express-text-script-execution(7118)
链接:http://xforce.iss.net/static/7118.php
来源: BID
名称: 3334
链接:http://www.securityfocus.com/bid/3334
来源: BUGTRAQ
名称: 20010915 Proof-Of-Concept Perl Script for Bugtraq-ID: #3334
链接:http://www.securityfocus.com/archive/1/214453
来源: BUGTRAQ
名称: 20010912 FREAK SHOW: Outlook Express 6.00
链接:http://www.securityfocus.com/archive/1/213754




















![[桜井宁宁]COS和泉纱雾超可爱写真福利集-一一网](https://www.proyy.com/skycj/data/images/2020-12-13/4d3cf227a85d7e79f5d6b4efb6bde3e8.jpg)

![[桜井宁宁] 爆乳奶牛少女cos写真-一一网](https://www.proyy.com/skycj/data/images/2020-12-13/d40483e126fcf567894e89c65eaca655.jpg)