mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
74 lines
2.2 KiB
JSON
74 lines
2.2 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "secure@microsoft.com",
|
|
"DATE_PUBLIC" : "2017-07-11T00:00:00",
|
|
"ID" : "CVE-2017-8621",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "Microsoft Exchange Server 2010 SP3, Exchange Server 2013 SP3, Exchange Server 2013 CU16, and Exchange Server 2016 CU5.",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "Microsoft Exchange"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "Microsoft Corporation"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Microsoft Exchange Server 2010 SP3, Exchange Server 2013 SP3, Exchange Server 2013 CU16, and Exchange Server 2016 CU5 allows an open redirect vulnerability that could lead to spoofing, aka \"Microsoft Exchange Open Redirect Vulnerability\"."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Spoofing"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8621",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8621"
|
|
},
|
|
{
|
|
"name" : "99533",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/99533"
|
|
},
|
|
{
|
|
"name" : "1038852",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://www.securitytracker.com/id/1038852"
|
|
}
|
|
]
|
|
}
|
|
}
|