vulnerability
Microsoft Windows: CVE-2017-8602: Microsoft Browser Spoofing Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Jul 11, 2017 | Jul 11, 2017 | Sep 10, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Jul 11, 2017
Added
Jul 11, 2017
Modified
Sep 10, 2025
Description
Microsoft browsers on Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow a spoofing vulnerability in the way they parse HTTP content, aka "Microsoft Browser Spoofing Vulnerability."
Solutions
microsoft-windows-windows_10-1507-kb4025338microsoft-windows-windows_10-1511-kb4025344microsoft-windows-windows_10-1607-kb4025339microsoft-windows-windows_10-1703-kb4025342microsoft-windows-windows_server_2012_r2-kb4025336microsoft-windows-windows_server_2016-1607-kb4025339msft-kb4025252-0560e935-d1e8-4ba3-994c-ad4c9fbba193msft-kb4025252-0fbcc431-af61-46fe-9e46-43148b2b4858msft-kb4025252-13f093d6-1214-437e-a50d-d93ad3930726msft-kb4025252-1a89b6e6-9946-4f18-9426-5736b831024cmsft-kb4025252-1d7ccb76-11aa-4d27-8f43-bb0cc197e878msft-kb4025252-28c3a340-a3cb-415e-8c4b-5e3aa02f960fmsft-kb4025252-40e0bc36-0f49-4fae-bd3e-b39209fbe5b9msft-kb4025252-92358781-468f-4e44-ac39-7b4cd45f3523msft-kb4025252-971d0291-5650-47f0-977d-7f120a2ad93fmsft-kb4025252-9d898637-87b8-42d2-851b-a6a4929ff4e2msft-kb4025252-bfd6cbcd-0b71-4fd4-9150-d0a51185cec6msft-kb4025252-d8ed3f28-404c-4d7f-be83-70259a0af517
References
- BID-99390
- CVE-2017-8602
- https://attackerkb.com/topics/CVE-2017-8602
- CWE-20
- URL-https://support.microsoft.com/help/4025252
- URL-https://support.microsoft.com/help/4025336
- URL-https://support.microsoft.com/help/4025338
- URL-https://support.microsoft.com/help/4025339
- URL-https://support.microsoft.com/help/4025342
- URL-https://support.microsoft.com/help/4025344
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.