Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft Outlook information leak (callback)
Published:05.07.2008
Source:
SecurityVulns ID:9132
Type:client
Threat Level:
6/10
Description:By setting CA certificate URL field in certificate used for message signing, it's possible to force Outlook to issue HTTP request without user intervation.
Original documentdocumentAugusto Paes de Barros, Unauthorized reading confirmation from Outlook (05.07.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod