A vulnerability in the display of email messages in the Messages in Quarantine (MIQ) view in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a user to click a malicious link in the MIQ view. The malicious link could be used to facilitate a cross-site scripting (XSS) or HTML injection attack. More Information: CSCuz02235. Known Affected Releases: 8.0.2-069. Known Fixed Releases: 9.1.1-038 9.7.2-047.
2016-10-28T10:59:00.213
2025-04-12T10:46:40.837
Deferred
CVSSv3.0: 6.1 (MEDIUM)
AV:N/AC:M/Au:N/C:N/I:P/A:N
8.6
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | cisco | email_security_appliance | 8.9.0 | Yes |
Application | cisco | email_security_appliance | 8.9.1-000 | Yes |
Application | cisco | email_security_appliance | 8.9.2-032 | Yes |
Application | cisco | email_security_appliance | 9.0.0 | Yes |
Application | cisco | email_security_appliance | 9.0.0-212 | Yes |
Application | cisco | email_security_appliance | 9.0.0-461 | Yes |
Application | cisco | email_security_appliance | 9.0.5-000 | Yes |
Application | cisco | email_security_appliance | 9.1.0 | Yes |
Application | cisco | email_security_appliance | 9.1.0-011 | Yes |
Application | cisco | email_security_appliance | 9.1.0-032 | Yes |
Application | cisco | email_security_appliance | 9.1.0-101 | Yes |