Логотип exploitDog
bind:CVE-2019-1933
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1933

Количество 3

Количество 3

nvd логотип

CVE-2019-1933

больше 6 лет назад

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device. The vulnerability is due to improper input validation of certain email fields. An attacker could exploit this vulnerability by sending a crafted email message to a recipient protected by the ESA. A successful exploit could allow the attacker to bypass configured message filters and inject arbitrary scripting code inside the email body. The malicious code is not executed by default unless the recipient's email client is configured to execute scripts contained in emails.

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-wh6w-g2c8-6w6p

больше 3 лет назад

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device. The vulnerability is due to improper input validation of certain email fields. An attacker could exploit this vulnerability by sending a crafted email message to a recipient protected by the ESA. A successful exploit could allow the attacker to bypass configured message filters and inject arbitrary scripting code inside the email body. The malicious code is not executed by default unless the recipient's email client is configured to execute scripts contained in emails.

CVSS3: 7.4
EPSS: Низкий
fstec логотип

BDU:2019-02543

больше 6 лет назад

Уязвимость функции сканирования сообщений электронной почты систем обеспечения безопасности электронной почты Cisco Email Security Appliance (ESA), позволяющая нарушителю внедрить произвольный код сценария в электронное сообщение

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-1933

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device. The vulnerability is due to improper input validation of certain email fields. An attacker could exploit this vulnerability by sending a crafted email message to a recipient protected by the ESA. A successful exploit could allow the attacker to bypass configured message filters and inject arbitrary scripting code inside the email body. The malicious code is not executed by default unless the recipient's email client is configured to execute scripts contained in emails.

CVSS3: 5.8
0%
Низкий
больше 6 лет назад
github логотип
GHSA-wh6w-g2c8-6w6p

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device. The vulnerability is due to improper input validation of certain email fields. An attacker could exploit this vulnerability by sending a crafted email message to a recipient protected by the ESA. A successful exploit could allow the attacker to bypass configured message filters and inject arbitrary scripting code inside the email body. The malicious code is not executed by default unless the recipient's email client is configured to execute scripts contained in emails.

CVSS3: 7.4
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-02543

Уязвимость функции сканирования сообщений электронной почты систем обеспечения безопасности электронной почты Cisco Email Security Appliance (ESA), позволяющая нарушителю внедрить произвольный код сценария в электронное сообщение

CVSS3: 5.8
0%
Низкий
больше 6 лет назад

Уязвимостей на страницу