A spoofing vulnerability exists in the way Microsoft Outlook for Android software parses specifically crafted email messages. An authenticated attacker could exploit the vulnerability by sending a specially crafted email message to a victim.
The attacker who successfully exploited this vulnerability could then perform cross-site scripting attacks on the affected systems and run scripts in the security context of the current user.
The security update addresses the vulnerability by correcting how Outlook for Android parses specially crafted email messages.
References
Link | Resource |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1105 | |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1105 | Patch Vendor Advisory |
Configurations
History
20 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A spoofing vulnerability exists in the way Microsoft Outlook for Android software parses specifically crafted email messages. An authenticated attacker could exploit the vulnerability by sending a specially crafted email message to a victim. The attacker who successfully exploited this vulnerability could then perform cross-site scripting attacks on the affected systems and run scripts in the security context of the current user. The security update addresses the vulnerability by correcting how Outlook for Android parses specially crafted email messages. | |
References |
|
21 Nov 2024, 04:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1105 - Patch, Vendor Advisory |
Information
Published : 2019-07-29 14:15
Updated : 2025-05-20 18:15
NVD link : CVE-2019-1105
Mitre link : CVE-2019-1105
CVE.ORG link : CVE-2019-1105
JSON object : View
Products Affected
microsoft
- outlook
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')