cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2012-0334,https://securityvulnerability.io/vulnerability/CVE-2012-0334,,Cisco IronPort Web Security Appliance AsyncOS software prior to 7.5 has a SSL Certificate Caching vulnerability which could allow man-in-the-middle attacks,Cisco,Ironport Web Security Appliance Asyncos,6.4,MEDIUM,0.0005600000149570405,false,,false,false,false,,,false,false,,2020-01-15T12:49:13.000Z,0 CVE-2018-0410,https://securityvulnerability.io/vulnerability/CVE-2018-0410,,"A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliances could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected system. The vulnerability exists because the affected software improperly manages memory resources for TCP connections to a targeted device. An attacker could exploit this vulnerability by establishing a high number of TCP connections to the data interface of an affected device via IPv4 or IPv6. A successful exploit could allow the attacker to exhaust system memory, which could cause the system to stop processing new connections and result in a DoS condition. System recovery may require manual intervention. Cisco Bug IDs: CSCvf36610.",Cisco,Asyncos Software For Cisco Web Security Appliances,8.6,HIGH,0.003000000026077032,false,,false,false,false,,,false,false,,2018-08-15T00:00:00.000Z,0 CVE-2017-3827,https://securityvulnerability.io/vulnerability/CVE-2017-3827,,"A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA or services scanning content of web access on the WSA. More Information: SCvb91473, CSCvc76500. Known Affected Releases: 10.0.0-203 9.9.9-894 WSA10.0.0-233.",Cisco,Cisco Asyncos Software For Cisco Esa And Cisco Wsa,5.8,MEDIUM,0.00279000005684793,false,,false,false,false,,,false,false,,2017-02-22T02:00:00.000Z,0 CVE-2017-3818,https://securityvulnerability.io/vulnerability/CVE-2017-3818,,"A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device, aka a Malformed MIME Header Filtering Bypass. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. More Information: CSCvb65245. Known Affected Releases: 9.7.1-066. Known Fixed Releases: 9.8.0-092.",Cisco,Cisco Asyncos 9.7.1-066,5.8,MEDIUM,0.0013099999632686377,false,,false,false,false,,,false,false,,2017-02-03T07:24:00.000Z,0 CVE-2017-3800,https://securityvulnerability.io/vulnerability/CVE-2017-3800,,"A vulnerability in the content scanning engine of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured message or content filters on the device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. More Information: CSCuz16076. Known Affected Releases: 9.7.1-066 9.7.1-HP2-207 9.8.5-085. Known Fixed Releases: 10.0.1-083 10.0.1-087.",Cisco,Cisco Asyncos,5.8,MEDIUM,0.0013099999632686377,false,,false,false,false,,,false,false,,2017-01-26T07:45:00.000Z,0 CVE-2016-1411,https://securityvulnerability.io/vulnerability/CVE-2016-1411,,"A vulnerability in the update functionality of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Content Management Security Appliance (SMA) could allow an unauthenticated, remote attacker to impersonate the update server. More Information: CSCul88715, CSCul94617, CSCul94627. Known Affected Releases: 7.5.2-201 7.6.3-025 8.0.1-023 8.5.0-000 8.5.0-ER1-198 7.5.2-HP2-303 7.7.0-608 7.7.5-835 8.5.1-021 8.8.0-000 7.9.1-102 8.0.0-404 8.1.1-013 8.2.0-222. Known Fixed Releases: 8.0.2-069 8.0.2-074 8.5.7-042 9.1.0-032 8.5.2-027 9.6.1-019.",Cisco,Cisco AsyncOS,5.9,MEDIUM,0.0011500000255182385,false,,false,false,false,,,false,false,,2016-12-14T00:37:00.000Z,0 CVE-2016-6465,https://securityvulnerability.io/vulnerability/CVE-2016-6465,,"A vulnerability in the content filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances and Cisco Web Security Appliances could allow an unauthenticated, remote attacker to bypass user filters that are configured for an affected device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for both virtual and hardware versions of the following Cisco products: Cisco Email Security Appliances (ESAs) that are configured to use message or content filters that scan incoming email attachments; Cisco Web Security Appliances (WSAs) that are configured to use services that scan accessed web content. More Information: CSCva90076, CSCvb06764. Known Affected Releases: 10.0.0-125 8.5.7-042 9.7.2-047.",Cisco,Cisco Asyncos,4.3,MEDIUM,0.0011699999449774623,false,,false,false,false,,,false,false,,2016-12-14T00:37:00.000Z,0 CVE-2016-6463,https://securityvulnerability.io/vulnerability/CVE-2016-6463,,"A vulnerability in the email filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass Advanced Malware Protection (AMP) filters that are configured for an affected device. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for both virtual and hardware versions of Cisco Email Security Appliances, if the AMP feature is configured to scan incoming email attachments. More Information: CSCuz85823. Known Affected Releases: 10.0.0-082 9.7.0-125 9.7.1-066. Known Fixed Releases: 10.0.0-203 9.7.2-131.",Cisco,Cisco Asyncos 9.7.1-066 Through 10.0.0-082,5.3,MEDIUM,0.0013200000394135714,false,,false,false,false,,,false,false,,2016-11-19T02:45:00.000Z,0 CVE-2016-6458,https://securityvulnerability.io/vulnerability/CVE-2016-6458,,"A vulnerability in the content filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass content filters configured on an affected device. Email that should have been filtered could instead be forwarded by the device. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to use a content filter for email attachments that are protected or encrypted. More Information: CSCva52546. Known Affected Releases: 10.0.0-125 9.7.1-066.",Cisco,Cisco Asyncos 10.0.0-125 And 9.7.1-066,7.5,HIGH,0.0027600000612437725,false,,false,false,false,,,false,false,,2016-11-19T02:45:00.000Z,0 CVE-2016-6462,https://securityvulnerability.io/vulnerability/CVE-2016-6462,,"A vulnerability in the email filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass Advanced Malware Protection (AMP) filters that are configured for an affected device. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for both virtual and hardware versions of Cisco Email Security Appliances, if the AMP feature is configured to scan incoming email attachments. More Information: CSCva13456. Known Affected Releases: 10.0.0-082 10.0.0-125 9.7.1-066. Known Fixed Releases: 10.0.0-203 9.7.2-131.",Cisco,Cisco Asyncos 9.7.1-066 Through 10.0.0-125,5.3,MEDIUM,0.002420000033453107,false,,false,false,false,,,false,false,,2016-11-19T02:45:00.000Z,0 CVE-2016-1481,https://securityvulnerability.io/vulnerability/CVE-2016-1481,,"A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter that contains certain rules. More Information: CSCux59873. Known Affected Releases: 8.5.6-106 9.1.0-032 9.7.0-125. Known Fixed Releases: 9.1.1-038 9.7.1-066.",Cisco,Cisco AsyncOS through 9.7.0-125,7.5,HIGH,0.005630000028759241,false,,false,false,false,,,false,false,,2016-10-28T10:00:00.000Z,0 CVE-2016-1486,https://securityvulnerability.io/vulnerability/CVE-2016-1486,,"A vulnerability in the email attachment scanning functionality of the Advanced Malware Protection (AMP) feature of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to cause an affected device to stop scanning and forwarding email messages due to a denial of service (DoS) condition. Affected Products: This vulnerability affects Cisco AsyncOS Software releases 9.7.1 and later, prior to the first fixed release, for both virtual and hardware Cisco Email Security Appliances, if the AMP feature is configured to scan incoming email attachments. More Information: CSCuy99453. Known Affected Releases: 9.7.1-066. Known Fixed Releases: 10.0.0-125 9.7.1-207 9.7.2-047.",Cisco,Cisco AsyncOS through 9.7.1-066,7.5,HIGH,0.005630000028759241,false,,false,false,false,,,false,false,,2016-10-28T10:00:00.000Z,0 CVE-2016-6360,https://securityvulnerability.io/vulnerability/CVE-2016-6360,,"A vulnerability in Advanced Malware Protection (AMP) for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition due to the AMP process unexpectedly restarting. Affected Products: Cisco AsyncOS Software for Email Security Appliances (ESA) versions 9.5 and later up to the first fixed release, Cisco AsyncOS Software for Web Security Appliances (WSA) all versions prior to the first fixed release. More Information: CSCux56406, CSCux59928. Known Affected Releases: 9.6.0-051 9.7.0-125 8.8.0-085 9.5.0-444 WSA10.0.0-000. Known Fixed Releases: 9.7.1-066 WSA10.0.0-233.",Cisco,Cisco Asyncos Through Wsa10.0.0-000,7.5,HIGH,0.003120000008493662,false,,false,false,false,,,false,false,,2016-10-28T10:00:00.000Z,0 CVE-2016-1480,https://securityvulnerability.io/vulnerability/CVE-2016-1480,,"A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. Affected Products: all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA, both virtual and hardware appliances, if the software is configured with message or content filters to scan incoming email attachments. More Information: CSCuw03606, CSCux59734. Known Affected Releases: 8.0.0-000 8.5.6-106 9.0.0-000 9.1.0-032 9.6.0-042 9.5.0-444 WSA10.0.0-000. Known Fixed Releases: 9.1.1-038 9.7.1-066.",Cisco,Cisco AsyncOS through WSA10.0.0-000,7.5,HIGH,0.0027699999045580626,false,,false,false,false,,,false,false,,2016-10-28T10:00:00.000Z,0 CVE-2016-6372,https://securityvulnerability.io/vulnerability/CVE-2016-6372,,"A vulnerability in the email message and content filtering for malformed Multipurpose Internet Mail Extensions (MIME) headers of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass the filtering functionality of the targeted device. Emails that should have been quarantined could instead be processed. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA on both virtual and hardware appliances that are configured with message or content filters to scan incoming email attachments. More Information: CSCuy54740, CSCuy75174. Known Affected Releases: 9.7.1-066 9.5.0-575 WSA10.0.0-000. Known Fixed Releases: 10.0.0-125 9.1.1-038 9.7.2-047.",Cisco,Cisco Asyncos Through Wsa10.0.0-000,7.5,HIGH,0.0027699999045580626,false,,false,false,false,,,false,false,,2016-10-28T10:00:00.000Z,0 CVE-2016-1423,https://securityvulnerability.io/vulnerability/CVE-2016-1423,,"A vulnerability in the display of email messages in the Messages in Quarantine (MIQ) view in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a user to click a malicious link in the MIQ view. The malicious link could be used to facilitate a cross-site scripting (XSS) or HTML injection attack. More Information: CSCuz02235. Known Affected Releases: 8.0.2-069. Known Fixed Releases: 9.1.1-038 9.7.2-047.",Cisco,Cisco AsyncOS 8.0.2-069,6.1,MEDIUM,0.0020099999383091927,false,,false,false,false,,,false,false,,2016-10-28T10:00:00.000Z,0 CVE-2016-6357,https://securityvulnerability.io/vulnerability/CVE-2016-6357,,"A vulnerability in the configured security policies, including drop email filtering, in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass a configured drop filter by using an email with a corrupted attachment. More Information: CSCuz01651. Known Affected Releases: 10.0.9-015 9.7.1-066 9.9.6-026.",Cisco,Cisco Asyncos Through 9.9.6-026,7.5,HIGH,0.002420000033453107,false,,false,false,false,,,false,false,,2016-10-28T10:00:00.000Z,0 CVE-2016-6356,https://securityvulnerability.io/vulnerability/CVE-2016-6356,,"A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to cause an affected device to stop scanning and forwarding email messages due to a denial of service (DoS) condition. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. More Information: CSCuz63143. Known Affected Releases: 8.5.7-042 9.7.0-125. Known Fixed Releases: 10.0.0-125 9.1.1-038 9.7.2-047.",Cisco,Cisco Asyncos Through 9.7.0-125,7.5,HIGH,0.005630000028759241,false,,false,false,false,,,false,false,,2016-10-28T10:00:00.000Z,0 CVE-2016-1461,https://securityvulnerability.io/vulnerability/CVE-2016-1461,,"Cisco AsyncOS on Email Security Appliance (ESA) devices through 9.7.0-125 allows remote attackers to bypass malware detection via a crafted attachment in an e-mail message, aka Bug ID CSCuz14932.",Cisco,Asyncos,7.5,HIGH,0.0014900000533089042,false,,false,false,false,,,false,false,,2016-08-01T01:00:00.000Z,0 CVE-2016-1438,https://securityvulnerability.io/vulnerability/CVE-2016-1438,,"Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass intended spam filtering via crafted executable content in a ZIP archive, aka Bug ID CSCuy39210.",Cisco,Asyncos,7.5,HIGH,0.0014400000218302011,false,,false,false,false,,,false,false,,2016-06-23T00:00:00.000Z,0 CVE-2015-0605,https://securityvulnerability.io/vulnerability/CVE-2015-0605,,"The uuencode inspection engine in Cisco AsyncOS on Cisco Email Security Appliance (ESA) devices 8.5 and earlier allows remote attackers to bypass intended content restrictions via a crafted e-mail attachment with uuencode encoding, aka Bug ID CSCzv54343.",Cisco,Asyncos,,,0.004490000195801258,false,,false,false,false,,,false,false,,2015-02-07T02:00:00.000Z,0 CVE-2015-0577,https://securityvulnerability.io/vulnerability/CVE-2015-0577,,"Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA), allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCus22925 and CSCup08113.",Cisco,Asyncos,,,0.002529999939724803,false,,false,false,false,,,false,false,,2015-01-14T19:00:00.000Z,0 CVE-2014-3381,https://securityvulnerability.io/vulnerability/CVE-2014-3381,,"The ZIP inspection engine in Cisco AsyncOS 8.5 and earlier on the Cisco Email Security Appliance (ESA) does not properly analyze ZIP archives, which allows remote attackers to bypass malware filtering via a crafted archive, aka Bug ID CSCup07934.",Cisco,Asyncos,,,0.00203999993391335,false,,false,false,false,,,false,false,,2014-10-19T01:00:00.000Z,0 CVE-2014-3289,https://securityvulnerability.io/vulnerability/CVE-2014-3289,,"Cross-site scripting (XSS) vulnerability in the web management interface in Cisco AsyncOS on the Email Security Appliance (ESA) 8.0, Web Security Appliance (WSA) 8.0 (.5 Hot Patch 1) and earlier, and Content Security Management Appliance (SMA) 8.3 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, as demonstrated by the date_range parameter to monitor/reports/overview on the IronPort ESA, aka Bug IDs CSCun07998, CSCun07844, and CSCun07888.",Cisco,"Ironport Asyncos,Web Security Appliance",,,0.058820001780986786,false,,false,false,false,,,false,false,,2014-06-10T10:00:00.000Z,0 CVE-2014-2195,https://securityvulnerability.io/vulnerability/CVE-2014-2195,,"Cisco AsyncOS on Email Security Appliance (ESA) and Content Security Management Appliance (SMA) devices, when Active Directory is enabled, does not properly handle group names, which allows remote attackers to gain role privileges by leveraging group-name similarity, aka Bug ID CSCum86085.",Cisco,"Asyncos,Content Security Management Appliance,Email Security Appliance Firmware",,,0.0016400000313296914,false,,false,false,false,,,false,false,,2014-05-20T10:00:00.000Z,0