CVE-2016-1423
Published Oct 28, 2016
Last updated 7 years ago
Overview
- Description
- A vulnerability in the display of email messages in the Messages in Quarantine (MIQ) view in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a user to click a malicious link in the MIQ view. The malicious link could be used to facilitate a cross-site scripting (XSS) or HTML injection attack. More Information: CSCuz02235. Known Affected Releases: 8.0.2-069. Known Fixed Releases: 9.1.1-038 9.7.2-047.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A4A2C13-FB68-4DAD-AC0E-A90260655F33" }, { "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.9.1-000:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B574E66D-783A-48E6-A04A-16E0B1A56EBD" }, { "criteria": "cpe:2.3:a:cisco:email_security_appliance:8.9.2-032:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE973E6A-4BE5-44D7-9E66-B966377F2315" }, { "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE6412D3-E788-45F8-B4E5-4795CD88F3C9" }, { "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-212:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79408E18-14BE-486A-AAD1-95A3871CCD21" }, { "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.0.0-461:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44F4ABDB-16DC-4D8F-B2D8-9724133F40BB" }, { "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.0.5-000:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8A2F388-FFE1-43BD-A9B6-D21043F86AA2" }, { "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57F398CF-66B8-4BE1-8586-1DCD1FF8C3C7" }, { "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-011:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EF05089-FDC2-4D78-9949-B313A11A3FF2" }, { "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-032:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22602224-5873-4B62-A3B4-66B9E590B73E" }, { "criteria": "cpe:2.3:a:cisco:email_security_appliance:9.1.0-101:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C301DE3-99C7-415A-9D1B-8DDD00E4E5D5" } ], "operator": "OR" } ] } ]