Логотип exploitDog
bind:CVE-2020-3133
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3133

Количество 3

Количество 3

nvd логотип

CVE-2020-3133

больше 5 лет назад

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device. The vulnerability is due to improper validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email message to a recipient protected by the ESA. A successful exploit could allow the attacker to bypass the configured content filters, which could allow malicious content to pass through the device.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-g479-6ppw-v22h

больше 3 лет назад

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device. The vulnerability is due to improper validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email message to a recipient protected by the ESA. A successful exploit could allow the attacker to bypass the configured content filters, which could allow malicious content to pass through the device.

EPSS: Низкий
fstec логотип

BDU:2020-00878

около 6 лет назад

Уязвимость систем обеспечения безопасности электронной почты Cisco Email Security Appliance, позволяющая нарушителю обойти настроенные фильтры на устройстве и оказать воздействие на целостность защищаемой информации

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3133

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device. The vulnerability is due to improper validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email message to a recipient protected by the ESA. A successful exploit could allow the attacker to bypass the configured content filters, which could allow malicious content to pass through the device.

CVSS3: 7.5
0%
Низкий
больше 5 лет назад
github логотип
GHSA-g479-6ppw-v22h

A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device. The vulnerability is due to improper validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email message to a recipient protected by the ESA. A successful exploit could allow the attacker to bypass the configured content filters, which could allow malicious content to pass through the device.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-00878

Уязвимость систем обеспечения безопасности электронной почты Cisco Email Security Appliance, позволяющая нарушителю обойти настроенные фильтры на устройстве и оказать воздействие на целостность защищаемой информации

CVSS3: 5.8
0%
Низкий
около 6 лет назад

Уязвимостей на страницу