Логотип exploitDog
bind:CVE-2014-2119
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-2119

Количество 3

Количество 3

nvd логотип

CVE-2014-2119

больше 11 лет назад

The End User Safelist/Blocklist (aka SLBL) service in Cisco AsyncOS Software for Email Security Appliance (ESA) before 7.6.3-023 and 8.x before 8.0.1-023 and Cisco Content Security Management Appliance (SMA) before 7.9.1-110 and 8.x before 8.1.1-013 allows remote authenticated users to execute arbitrary code with root privileges via an FTP session that uploads a modified SLBL database file, aka Bug IDs CSCug79377 and CSCug80118.

CVSS2: 8.5
EPSS: Низкий
github логотип

GHSA-7m9c-8f2j-35mp

больше 3 лет назад

The End User Safelist/Blocklist (aka SLBL) service in Cisco AsyncOS Software for Email Security Appliance (ESA) before 7.6.3-023 and 8.x before 8.0.1-023 and Cisco Content Security Management Appliance (SMA) before 7.9.1-110 and 8.x before 8.1.1-013 allows remote authenticated users to execute arbitrary code with root privileges via an FTP session that uploads a modified SLBL database file, aka Bug IDs CSCug79377 and CSCug80118.

EPSS: Низкий
fstec логотип

BDU:2015-00187

больше 11 лет назад

Уязвимость программного обеспечения Cisco IronPort Email Security Appliance, позволяющая злоумышленнику выполнить произвольный код

CVSS2: 8.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2014-2119

The End User Safelist/Blocklist (aka SLBL) service in Cisco AsyncOS Software for Email Security Appliance (ESA) before 7.6.3-023 and 8.x before 8.0.1-023 and Cisco Content Security Management Appliance (SMA) before 7.9.1-110 and 8.x before 8.1.1-013 allows remote authenticated users to execute arbitrary code with root privileges via an FTP session that uploads a modified SLBL database file, aka Bug IDs CSCug79377 and CSCug80118.

CVSS2: 8.5
1%
Низкий
больше 11 лет назад
github логотип
GHSA-7m9c-8f2j-35mp

The End User Safelist/Blocklist (aka SLBL) service in Cisco AsyncOS Software for Email Security Appliance (ESA) before 7.6.3-023 and 8.x before 8.0.1-023 and Cisco Content Security Management Appliance (SMA) before 7.9.1-110 and 8.x before 8.1.1-013 allows remote authenticated users to execute arbitrary code with root privileges via an FTP session that uploads a modified SLBL database file, aka Bug IDs CSCug79377 and CSCug80118.

1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2015-00187

Уязвимость программного обеспечения Cisco IronPort Email Security Appliance, позволяющая злоумышленнику выполнить произвольный код

CVSS2: 8.5
1%
Низкий
больше 11 лет назад

Уязвимостей на страницу