Логотип exploitDog
bind:CVE-2019-12706
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-12706

Количество 3

Количество 3

nvd логотип

CVE-2019-12706

больше 6 лет назад

A vulnerability in the Sender Policy Framework (SPF) functionality of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the configured user filters on an affected device. The vulnerability exists because the affected software insufficiently validates certain incoming SPF messages. An attacker could exploit this vulnerability by sending a custom SPF packet to an affected device. A successful exploit could allow the attacker to bypass the configured header filters, which could allow malicious content to pass through the device.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-4xfr-4873-x36j

больше 3 лет назад

A vulnerability in the Sender Policy Framework (SPF) functionality of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the configured user filters on an affected device. The vulnerability exists because the affected software insufficiently validates certain incoming SPF messages. An attacker could exploit this vulnerability by sending a custom SPF packet to an affected device. A successful exploit could allow the attacker to bypass the configured header filters, which could allow malicious content to pass through the device.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2019-04123

больше 6 лет назад

Уязвимость компонента Sender Policy Framework (SPF) операционной системы Cisco AsyncOS для Сisco Email Security Appliance, позволяющая нарушителю обойти настроенные пользовательские фильтры на уязвимом устройстве

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-12706

A vulnerability in the Sender Policy Framework (SPF) functionality of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the configured user filters on an affected device. The vulnerability exists because the affected software insufficiently validates certain incoming SPF messages. An attacker could exploit this vulnerability by sending a custom SPF packet to an affected device. A successful exploit could allow the attacker to bypass the configured header filters, which could allow malicious content to pass through the device.

CVSS3: 7.5
0%
Низкий
больше 6 лет назад
github логотип
GHSA-4xfr-4873-x36j

A vulnerability in the Sender Policy Framework (SPF) functionality of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the configured user filters on an affected device. The vulnerability exists because the affected software insufficiently validates certain incoming SPF messages. An attacker could exploit this vulnerability by sending a custom SPF packet to an affected device. A successful exploit could allow the attacker to bypass the configured header filters, which could allow malicious content to pass through the device.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-04123

Уязвимость компонента Sender Policy Framework (SPF) операционной системы Cisco AsyncOS для Сisco Email Security Appliance, позволяющая нарушителю обойти настроенные пользовательские фильтры на уязвимом устройстве

CVSS3: 6.5
0%
Низкий
больше 6 лет назад

Уязвимостей на страницу