diff --git a/ms-exchange-versions-cves-dict.json b/ms-exchange-versions-cves-dict.json index 4382eed..30695bd 100644 --- a/ms-exchange-versions-cves-dict.json +++ b/ms-exchange-versions-cves-dict.json @@ -5621,7 +5621,16 @@ }, "15.1.1034.33": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_6:*:*:*:*:*:*", - "cves": [] + "cves": [ + { + "cvss": 5.8, + "cvss-time": "2018-01-02T17:25:00", + "cwe": "CWE-20", + "id": "CVE-2017-11932", + "last-modified": "2018-01-02T17:25:00", + "summary": "Microsoft Exchange Server 2016 CU5 and Microsoft Exchange Server 2016 CU5 allow a spoofing vulnerability due to the way Outlook Web Access (OWA) validates web requests, aka \"Microsoft Exchange Spoofing Vulnerability\"." + } + ] }, "15.1.1261.35": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_7:*:*:*:*:*:*", @@ -7344,14 +7353,6 @@ "15.1.2044.12": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_17:*:*:*:*:*:*", "cves": [ - { - "cvss": 9.0, - "cvss-time": "2023-12-30T00:15:00", - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2020-17117", - "last-modified": "2023-12-30T00:15:00", - "summary": "Microsoft Exchange Remote Code Execution Vulnerability" - }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -7383,38 +7384,6 @@ "id": "CVE-2021-27065", "last-modified": "2024-07-25T17:34:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" - }, - { - "cvss": 6.5, - "cvss-time": "2023-12-30T00:15:00", - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2020-17132", - "last-modified": "2023-12-30T00:15:00", - "summary": "Microsoft Exchange Remote Code Execution Vulnerability" - }, - { - "cvss": 6.5, - "cvss-time": "2023-12-30T00:15:00", - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2020-17142", - "last-modified": "2023-12-30T00:15:00", - "summary": "Microsoft Exchange Remote Code Execution Vulnerability" - }, - { - "cvss": 6.5, - "cvss-time": "2023-12-30T00:15:00", - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2020-17143", - "last-modified": "2023-12-30T00:15:00", - "summary": "Microsoft Exchange Server Information Disclosure Vulnerability" - }, - { - "cvss": 6.0, - "cvss-time": "2023-12-30T00:15:00", - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2020-17141", - "last-modified": "2023-12-30T00:15:00", - "summary": "Microsoft Exchange Remote Code Execution Vulnerability" } ] }, @@ -7558,14 +7527,6 @@ "last-modified": "2023-12-31T19:15:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" }, - { - "cvss": 9.0, - "cvss-time": "2023-12-31T22:15:00", - "cwe": "CWE-269", - "id": "CVE-2020-16875", - "last-modified": "2023-12-31T22:15:00", - "summary": "
A remote code execution vulnerability exists in Microsoft Exchange server due to improper validation of cmdlet arguments.
\nAn attacker who successfully exploited the vulnerability could run arbitrary code in the context of the System user. Exploitation of the vulnerability requires an authenticated user in a certain Exchange role to be compromised.
\nThe security update addresses the vulnerability by correcting how Microsoft Exchange handles cmdlet arguments.
\n" - }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -7739,14 +7700,6 @@ "last-modified": "2023-12-30T00:15:00", "summary": "Microsoft Exchange Remote Code Execution Vulnerability" }, - { - "cvss": 4.3, - "cvss-time": "2023-12-31T20:15:00", - "cwe": "NVD-CWE-Other", - "id": "CVE-2020-16969", - "last-modified": "2023-12-31T20:15:00", - "summary": "An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages. An attacker who successfully exploited the vulnerability could use this to gain further information from a user.
\nTo exploit the vulnerability, an attacker could include specially crafted OWA messages that could be loaded, without warning or filtering, from the attacker-controlled URL. This callback vector provides an information disclosure tactic used in web beacons and other types of tracking systems.
\nThe security update corrects the way that Exchange handles these token validations.
\n" - }, { "cvss": 4.0, "cvss-time": "2023-12-31T19:15:00", @@ -7776,14 +7729,6 @@ "last-modified": "2023-12-30T00:15:00", "summary": "Microsoft Exchange Remote Code Execution Vulnerability" }, - { - "cvss": 9.0, - "cvss-time": "2023-12-31T19:15:00", - "cwe": "CWE-120", - "id": "CVE-2020-17084", - "last-modified": "2023-12-31T19:15:00", - "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" - }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -7847,22 +7792,6 @@ "id": "CVE-2020-17141", "last-modified": "2023-12-30T00:15:00", "summary": "Microsoft Exchange Remote Code Execution Vulnerability" - }, - { - "cvss": 4.0, - "cvss-time": "2023-12-31T19:15:00", - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2020-17085", - "last-modified": "2023-12-31T19:15:00", - "summary": "Microsoft Exchange Server Denial of Service Vulnerability" - }, - { - "cvss": 3.5, - "cvss-time": "2023-12-31T19:15:00", - "cwe": "CWE-79", - "id": "CVE-2020-17083", - "last-modified": "2023-12-31T19:15:00", - "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" } ] }, @@ -8142,14 +8071,6 @@ "last-modified": "2023-12-29T17:15:00", "summary": "A spoofing vulnerability exists in Microsoft Exchange Server which could result in an attack that would allow a malicious actor to impersonate the user.
\nThis update addresses this vulnerability.
\nTo prevent these types of attacks, Microsoft recommends customers to download inline images from different DNSdomains than the rest of OWA. Please see further instructions in the FAQ to put in place this mitigations.
\n" }, - { - "cvss": 4.3, - "cvss-time": "2023-12-31T20:15:00", - "cwe": "NVD-CWE-Other", - "id": "CVE-2020-16969", - "last-modified": "2023-12-31T20:15:00", - "summary": "An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages. An attacker who successfully exploited the vulnerability could use this to gain further information from a user.
\nTo exploit the vulnerability, an attacker could include specially crafted OWA messages that could be loaded, without warning or filtering, from the attacker-controlled URL. This callback vector provides an information disclosure tactic used in web beacons and other types of tracking systems.
\nThe security update corrects the way that Exchange handles these token validations.
\n" - }, { "cvss": 4.0, "cvss-time": "2023-12-31T19:15:00", @@ -8179,14 +8100,6 @@ "last-modified": "2023-12-30T00:15:00", "summary": "Microsoft Exchange Remote Code Execution Vulnerability" }, - { - "cvss": 9.0, - "cvss-time": "2023-12-31T19:15:00", - "cwe": "CWE-120", - "id": "CVE-2020-17084", - "last-modified": "2023-12-31T19:15:00", - "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" - }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -8290,36 +8203,12 @@ "id": "CVE-2021-1730", "last-modified": "2023-12-29T17:15:00", "summary": "A spoofing vulnerability exists in Microsoft Exchange Server which could result in an attack that would allow a malicious actor to impersonate the user.
\nThis update addresses this vulnerability.
\nTo prevent these types of attacks, Microsoft recommends customers to download inline images from different DNSdomains than the rest of OWA. Please see further instructions in the FAQ to put in place this mitigations.
\n" - }, - { - "cvss": 4.0, - "cvss-time": "2023-12-31T19:15:00", - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2020-17085", - "last-modified": "2023-12-31T19:15:00", - "summary": "Microsoft Exchange Server Denial of Service Vulnerability" - }, - { - "cvss": 3.5, - "cvss-time": "2023-12-31T19:15:00", - "cwe": "CWE-79", - "id": "CVE-2020-17083", - "last-modified": "2023-12-31T19:15:00", - "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" } ] }, "15.1.2106.6": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_18:*:*:*:*:*:*", "cves": [ - { - "cvss": 9.0, - "cvss-time": "2023-12-30T00:15:00", - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2020-17117", - "last-modified": "2023-12-30T00:15:00", - "summary": "Microsoft Exchange Remote Code Execution Vulnerability" - }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -8376,30 +8265,6 @@ "last-modified": "2023-12-29T17:16:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" }, - { - "cvss": 6.5, - "cvss-time": "2023-12-30T00:15:00", - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2020-17132", - "last-modified": "2023-12-30T00:15:00", - "summary": "Microsoft Exchange Remote Code Execution Vulnerability" - }, - { - "cvss": 6.5, - "cvss-time": "2023-12-30T00:15:00", - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2020-17142", - "last-modified": "2023-12-30T00:15:00", - "summary": "Microsoft Exchange Remote Code Execution Vulnerability" - }, - { - "cvss": 6.5, - "cvss-time": "2023-12-30T00:15:00", - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2020-17143", - "last-modified": "2023-12-30T00:15:00", - "summary": "Microsoft Exchange Server Information Disclosure Vulnerability" - }, { "cvss": 6.0, "cvss-time": "2023-12-29T17:15:00", @@ -8408,14 +8273,6 @@ "last-modified": "2023-12-29T17:15:00", "summary": "Microsoft Exchange Server Spoofing Vulnerability" }, - { - "cvss": 6.0, - "cvss-time": "2023-12-30T00:15:00", - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2020-17141", - "last-modified": "2023-12-30T00:15:00", - "summary": "Microsoft Exchange Remote Code Execution Vulnerability" - }, { "cvss": 5.8, "cvss-time": "2023-12-29T17:15:00", @@ -8485,14 +8342,6 @@ "last-modified": "2023-12-29T17:16:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" }, - { - "cvss": 6.0, - "cvss-time": "2023-12-29T17:15:00", - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2021-24085", - "last-modified": "2023-12-29T17:15:00", - "summary": "Microsoft Exchange Server Spoofing Vulnerability" - }, { "cvss": 5.8, "cvss-time": "2023-12-29T17:15:00", @@ -8506,22 +8355,6 @@ "15.1.2176.12": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:*", "cves": [ - { - "cvss": 10.0, - "cvss-time": "2024-07-26T19:26:00", - "cwe": "CWE-918", - "id": "CVE-2021-34473", - "last-modified": "2024-07-26T19:26:00", - "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" - }, - { - "cvss": 7.5, - "cvss-time": "2024-02-13T17:20:00", - "cwe": "CWE-287", - "id": "CVE-2021-34523", - "last-modified": "2024-02-13T17:20:00", - "summary": "Microsoft Exchange Server Elevation of Privilege Vulnerability" - }, { "cvss": 6.8, "cvss-time": "2023-08-02T00:15:00", @@ -8553,45 +8386,12 @@ "id": "CVE-2021-31209", "last-modified": "2023-08-02T00:15:00", "summary": "Microsoft Exchange Server Spoofing Vulnerability" - }, - { - "cvss": 5.0, - "cvss-time": "2024-07-24T16:45:00", - "cwe": "CWE-287", - "id": "CVE-2021-33766", - "last-modified": "2024-07-24T16:45:00", - "summary": "Microsoft Exchange Server Information Disclosure Vulnerability" } ] }, "15.1.2176.14": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:*", - "cves": [ - { - "cvss": 10.0, - "cvss-time": "2024-07-26T19:26:00", - "cwe": "CWE-918", - "id": "CVE-2021-34473", - "last-modified": "2024-07-26T19:26:00", - "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" - }, - { - "cvss": 7.5, - "cvss-time": "2024-02-13T17:20:00", - "cwe": "CWE-287", - "id": "CVE-2021-34523", - "last-modified": "2024-02-13T17:20:00", - "summary": "Microsoft Exchange Server Elevation of Privilege Vulnerability" - }, - { - "cvss": 5.0, - "cvss-time": "2024-07-24T16:45:00", - "cwe": "CWE-287", - "id": "CVE-2021-33766", - "last-modified": "2024-07-24T16:45:00", - "summary": "Microsoft Exchange Server Information Disclosure Vulnerability" - } - ] + "cves": [] }, "15.1.2176.2": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:*", @@ -8881,14 +8681,6 @@ "last-modified": "2024-07-26T19:25:00", "summary": "Microsoft Exchange Server Security Feature Bypass Vulnerability" }, - { - "cvss": 6.0, - "cvss-time": "2023-12-29T17:15:00", - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2021-24085", - "last-modified": "2023-12-29T17:15:00", - "summary": "Microsoft Exchange Server Spoofing Vulnerability" - }, { "cvss": 5.8, "cvss-time": "2023-08-02T00:15:00", @@ -9003,14 +8795,6 @@ "15.1.2242.10": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_20:*:*:*:*:*:*", "cves": [ - { - "cvss": 10.0, - "cvss-time": "2024-07-26T19:26:00", - "cwe": "CWE-918", - "id": "CVE-2021-34473", - "last-modified": "2024-07-26T19:26:00", - "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" - }, { "cvss": 7.9, "cvss-time": "2023-12-28T23:15:00", @@ -9019,14 +8803,6 @@ "last-modified": "2023-12-28T23:15:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" }, - { - "cvss": 7.5, - "cvss-time": "2024-02-13T17:20:00", - "cwe": "CWE-287", - "id": "CVE-2021-34523", - "last-modified": "2024-02-13T17:20:00", - "summary": "Microsoft Exchange Server Elevation of Privilege Vulnerability" - }, { "cvss": 6.5, "cvss-time": "2024-08-22T14:13:00", @@ -9042,14 +8818,6 @@ "id": "CVE-2021-33768", "last-modified": "2023-12-28T23:15:00", "summary": "Microsoft Exchange Server Elevation of Privilege Vulnerability" - }, - { - "cvss": 5.0, - "cvss-time": "2024-07-24T16:45:00", - "cwe": "CWE-287", - "id": "CVE-2021-33766", - "last-modified": "2024-07-24T16:45:00", - "summary": "Microsoft Exchange Server Information Disclosure Vulnerability" } ] }, @@ -9177,14 +8945,6 @@ "15.1.2242.8": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_20:*:*:*:*:*:*", "cves": [ - { - "cvss": 10.0, - "cvss-time": "2024-07-26T19:26:00", - "cwe": "CWE-918", - "id": "CVE-2021-34473", - "last-modified": "2024-07-26T19:26:00", - "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" - }, { "cvss": 7.9, "cvss-time": "2023-12-28T23:15:00", @@ -9193,14 +8953,6 @@ "last-modified": "2023-12-28T23:15:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" }, - { - "cvss": 7.5, - "cvss-time": "2024-02-13T17:20:00", - "cwe": "CWE-287", - "id": "CVE-2021-34523", - "last-modified": "2024-02-13T17:20:00", - "summary": "Microsoft Exchange Server Elevation of Privilege Vulnerability" - }, { "cvss": 6.8, "cvss-time": "2023-08-02T00:15:00", @@ -9248,14 +9000,6 @@ "id": "CVE-2021-33768", "last-modified": "2023-12-28T23:15:00", "summary": "Microsoft Exchange Server Elevation of Privilege Vulnerability" - }, - { - "cvss": 5.0, - "cvss-time": "2024-07-24T16:45:00", - "cwe": "CWE-287", - "id": "CVE-2021-33766", - "last-modified": "2024-07-24T16:45:00", - "summary": "Microsoft Exchange Server Information Disclosure Vulnerability" } ] }, @@ -12028,38 +11772,6 @@ "15.1.2507.32": { "cpe": "cpe:/a:microsoft:exchange_server:2016:cumulative_update_23:*:*:*:*:*:*", "cves": [ - { - "cvss": 8.0, - "cvss-time": null, - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2023-36744", - "last-modified": "2023-09-15T16:30:00", - "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" - }, - { - "cvss": 8.0, - "cvss-time": null, - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2023-36756", - "last-modified": "2023-09-15T14:15:00", - "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" - }, - { - "cvss": 8.0, - "cvss-time": null, - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2023-36745", - "last-modified": "2023-09-15T16:28:00", - "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" - }, - { - "cvss": 8.0, - "cvss-time": null, - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2023-36757", - "last-modified": "2023-09-14T22:37:00", - "summary": "Microsoft Exchange Server Spoofing Vulnerability" - }, { "cvss": 8.0, "cvss-time": null, @@ -15989,14 +15701,6 @@ "id": "CVE-2019-1266", "last-modified": "2020-08-24T17:37:00", "summary": "A spoofing vulnerability exists in Microsoft Exchange Server when Outlook Web App (OWA) fails to properly handle web requests, aka 'Microsoft Exchange Spoofing Vulnerability'." - }, - { - "cvss": 3.5, - "cvss-time": "2020-04-09T13:19:00", - "cwe": "CWE-79", - "id": "CVE-2019-1137", - "last-modified": "2020-04-09T13:19:00", - "summary": "A cross-site-scripting (XSS) vulnerability exists when Microsoft Exchange Server does not properly sanitize a specially crafted web request to an affected Exchange server, aka 'Microsoft Exchange Server Spoofing Vulnerability'." } ] }, @@ -16165,14 +15869,6 @@ "last-modified": "2024-02-13T17:23:00", "summary": "A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'." }, - { - "cvss": 7.5, - "cvss-time": "2019-11-14T19:34:00", - "cwe": "CWE-502", - "id": "CVE-2019-1373", - "last-modified": "2019-11-14T19:34:00", - "summary": "A remote code execution vulnerability exists in Microsoft Exchange through the deserialization of metadata via PowerShell, aka 'Microsoft Exchange Remote Code Execution Vulnerability'." - }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -16291,14 +15987,6 @@ "15.2.529.8": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_4:*:*:*:*:*:*", "cves": [ - { - "cvss": 9.0, - "cvss-time": "2024-02-13T17:23:00", - "cwe": "CWE-287", - "id": "CVE-2020-0688", - "last-modified": "2024-02-13T17:23:00", - "summary": "A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'." - }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -16307,14 +15995,6 @@ "last-modified": "2024-02-15T20:18:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" }, - { - "cvss": 6.8, - "cvss-time": "2021-07-21T11:39:00", - "cwe": "NVD-CWE-noinfo", - "id": "CVE-2020-0692", - "last-modified": "2021-07-21T11:39:00", - "summary": "An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka 'Microsoft Exchange Server Elevation of Privilege Vulnerability'." - }, { "cvss": 6.8, "cvss-time": "2024-07-25T17:53:00", @@ -16397,14 +16077,6 @@ "15.2.595.6": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_5:*:*:*:*:*:*", "cves": [ - { - "cvss": 9.0, - "cvss-time": "2023-12-31T22:15:00", - "cwe": "CWE-269", - "id": "CVE-2020-16875", - "last-modified": "2023-12-31T22:15:00", - "summary": "A remote code execution vulnerability exists in Microsoft Exchange server due to improper validation of cmdlet arguments.
\nAn attacker who successfully exploited the vulnerability could run arbitrary code in the context of the System user. Exploitation of the vulnerability requires an authenticated user in a certain Exchange role to be compromised.
\nThe security update addresses the vulnerability by correcting how Microsoft Exchange handles cmdlet arguments.
\n" - }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -17244,14 +16916,6 @@ "last-modified": "2023-12-29T17:15:00", "summary": "A spoofing vulnerability exists in Microsoft Exchange Server which could result in an attack that would allow a malicious actor to impersonate the user.
\nThis update addresses this vulnerability.
\nTo prevent these types of attacks, Microsoft recommends customers to download inline images from different DNSdomains than the rest of OWA. Please see further instructions in the FAQ to put in place this mitigations.
\n" }, - { - "cvss": 4.3, - "cvss-time": "2023-12-31T20:15:00", - "cwe": "NVD-CWE-Other", - "id": "CVE-2020-16969", - "last-modified": "2023-12-31T20:15:00", - "summary": "An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages. An attacker who successfully exploited the vulnerability could use this to gain further information from a user.
\nTo exploit the vulnerability, an attacker could include specially crafted OWA messages that could be loaded, without warning or filtering, from the attacker-controlled URL. This callback vector provides an information disclosure tactic used in web beacons and other types of tracking systems.
\nThe security update corrects the way that Exchange handles these token validations.
\n" - }, { "cvss": 4.0, "cvss-time": "2023-12-31T19:15:00",