A vulnerability in the display of email messages in the Messages in Quarantine (MIQ) view in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a user to click a malicious link in the MIQ view. The malicious link could be used to facilitate a cross-site scripting (XSS) or HTML injection attack. More Information: CSCuz02235. Known Affected Releases: 8.0.2-069. Known Fixed Releases: 9.1.1-038 9.7.2-047.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/93912 - | |
References | () http://www.securitytracker.com/id/1037113 - | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa4 - Vendor Advisory |
Information
Published : 2016-10-28 10:59
Updated : 2024-11-21 02:46
NVD link : CVE-2016-1423
Mitre link : CVE-2016-1423
CVE.ORG link : CVE-2016-1423
JSON object : View
Products Affected
cisco
- email_security_appliance
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')