Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2007-06-12T00:00:00", "descriptions": [{"lang": "en", "value": "A component in Microsoft Outlook Express 6 and Windows Mail in Windows Vista does not properly handle certain HTTP headers when processing MHTML protocol URLs, which allows remote attackers to obtain sensitive information from other Internet Explorer domains, aka \"URL Parsing Cross Domain Information Disclosure Vulnerability.\""}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2018-10-16T14:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft"}, "references": [{"name": "MS07-034", "tags": ["vendor-advisory", "x_refsource_MS"], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-034"}, {"name": "1018232", "tags": ["vdb-entry", "x_refsource_SECTRACK"], "url": "http://www.securitytracker.com/id?1018232"}, {"name": "VU#682825", "tags": ["third-party-advisory", "x_refsource_CERT-VN"], "url": "http://www.kb.cert.org/vuls/id/682825"}, {"name": "SSRT071438", "tags": ["vendor-advisory", "x_refsource_HP"], "url": "http://www.securityfocus.com/archive/1/471947/100/0/threaded"}, {"name": "24392", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/24392"}, {"tags": ["x_refsource_MISC"], "url": "http://openmya.hacker.jp/hasegawa/security/ms07-034.txt"}, {"name": "20070622 MS07-034: Executing arbitrary script with mhtml: protocol handler", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://www.securityfocus.com/archive/1/472002/100/0/threaded"}, {"tags": ["x_refsource_MISC"], "url": "http://archive.openmya.devnull.jp/2007.06/msg00060.html"}, {"name": "35345", "tags": ["vdb-entry", "x_refsource_OSVDB"], "url": "http://osvdb.org/35345"}, {"name": "1018231", "tags": ["vdb-entry", "x_refsource_SECTRACK"], "url": "http://www.securitytracker.com/id?1018231"}, {"name": "TA07-163A", "tags": ["third-party-advisory", "x_refsource_CERT"], "url": "http://www.us-cert.gov/cas/techalerts/TA07-163A.html"}, {"name": "oval:org.mitre.oval:def:2045", "tags": ["vdb-entry", "signature", "x_refsource_OVAL"], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2045"}, {"name": "25639", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/25639"}, {"name": "ADV-2007-2154", "tags": ["vdb-entry", "x_refsource_VUPEN"], "url": "http://www.vupen.com/english/advisories/2007/2154"}, {"name": "HPSBST02231", "tags": ["vendor-advisory", "x_refsource_HP"], "url": "http://www.securityfocus.com/archive/1/471947/100/0/threaded"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "secure@microsoft.com", "ID": "CVE-2007-2225", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "A component in Microsoft Outlook Express 6 and Windows Mail in Windows Vista does not properly handle certain HTTP headers when processing MHTML protocol URLs, which allows remote attackers to obtain sensitive information from other Internet Explorer domains, aka \"URL Parsing Cross Domain Information Disclosure Vulnerability.\""}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "MS07-034", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-034"}, {"name": "1018232", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018232"}, {"name": "VU#682825", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/682825"}, {"name": "SSRT071438", "refsource": "HP", "url": "http://www.securityfocus.com/archive/1/471947/100/0/threaded"}, {"name": "24392", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24392"}, {"name": "http://openmya.hacker.jp/hasegawa/security/ms07-034.txt", "refsource": "MISC", "url": "http://openmya.hacker.jp/hasegawa/security/ms07-034.txt"}, {"name": "20070622 MS07-034: Executing arbitrary script with mhtml: protocol handler", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/472002/100/0/threaded"}, {"name": "http://archive.openmya.devnull.jp/2007.06/msg00060.html", "refsource": "MISC", "url": "http://archive.openmya.devnull.jp/2007.06/msg00060.html"}, {"name": "35345", "refsource": "OSVDB", "url": "http://osvdb.org/35345"}, {"name": "1018231", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018231"}, {"name": "TA07-163A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-163A.html"}, {"name": "oval:org.mitre.oval:def:2045", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2045"}, {"name": "25639", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25639"}, {"name": "ADV-2007-2154", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2154"}, {"name": "HPSBST02231", "refsource": "HP", "url": "http://www.securityfocus.com/archive/1/471947/100/0/threaded"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-07T13:23:51.107Z"}, "title": "CVE Program Container", "references": [{"name": "MS07-034", "tags": ["vendor-advisory", "x_refsource_MS", "x_transferred"], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-034"}, {"name": "1018232", "tags": ["vdb-entry", "x_refsource_SECTRACK", "x_transferred"], "url": "http://www.securitytracker.com/id?1018232"}, {"name": "VU#682825", "tags": ["third-party-advisory", "x_refsource_CERT-VN", "x_transferred"], "url": "http://www.kb.cert.org/vuls/id/682825"}, {"name": "SSRT071438", "tags": ["vendor-advisory", "x_refsource_HP", "x_transferred"], "url": "http://www.securityfocus.com/archive/1/471947/100/0/threaded"}, {"name": "24392", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/24392"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://openmya.hacker.jp/hasegawa/security/ms07-034.txt"}, {"name": "20070622 MS07-034: Executing arbitrary script with mhtml: protocol handler", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://www.securityfocus.com/archive/1/472002/100/0/threaded"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://archive.openmya.devnull.jp/2007.06/msg00060.html"}, {"name": "35345", "tags": ["vdb-entry", "x_refsource_OSVDB", "x_transferred"], "url": "http://osvdb.org/35345"}, {"name": "1018231", "tags": ["vdb-entry", "x_refsource_SECTRACK", "x_transferred"], "url": "http://www.securitytracker.com/id?1018231"}, {"name": "TA07-163A", "tags": ["third-party-advisory", "x_refsource_CERT", "x_transferred"], "url": "http://www.us-cert.gov/cas/techalerts/TA07-163A.html"}, {"name": "oval:org.mitre.oval:def:2045", "tags": ["vdb-entry", "signature", "x_refsource_OVAL", "x_transferred"], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2045"}, {"name": "25639", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/25639"}, {"name": "ADV-2007-2154", "tags": ["vdb-entry", "x_refsource_VUPEN", "x_transferred"], "url": "http://www.vupen.com/english/advisories/2007/2154"}, {"name": "HPSBST02231", "tags": ["vendor-advisory", "x_refsource_HP", "x_transferred"], "url": "http://www.securityfocus.com/archive/1/471947/100/0/threaded"}]}]}, "cveMetadata": {"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2007-2225", "datePublished": "2007-06-12T20:00:00", "dateReserved": "2007-04-24T00:00:00", "dateUpdated": "2024-08-07T13:23:51.107Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}