cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-31488,https://securityvulnerability.io/vulnerability/CVE-2023-31488,Segmentation Fault Vulnerability in Hyland Perceptive Filters for Cisco Products,"A vulnerability has been identified in Hyland Perceptive Filters versions prior to December 8, 2023. This issue affects products like Cisco IronPort Email Security Appliance Software and Cisco Secure Email Gateway, along with several non-Cisco products. Attackers can exploit this flaw by crafting specific documents that trigger a segmentation fault, potentially allowing the execution of arbitrary code on affected systems. Organizations using these products should implement immediate mitigations and updates to safeguard their environments.",Cisco,Ironport Email Security Appliance,9.8,CRITICAL,0.0025100000202655792,false,,false,false,false,,,false,false,,2024-01-10T00:00:00.000Z,0 CVE-2014-8016,https://securityvulnerability.io/vulnerability/CVE-2014-8016,,"The Cisco IronPort Email Security Appliance (ESA) allows remote attackers to cause a denial of service (CPU consumption) via long Subject headers in e-mail messages, aka Bug ID CSCzv93864.",Cisco,Ironport Email Security Appliances,,,0.0018700000364333391,false,,false,false,false,,,false,false,,2014-12-19T02:00:00.000Z,0 CVE-2009-1162,https://securityvulnerability.io/vulnerability/CVE-2009-1162,,"Cross-site scripting (XSS) vulnerability in the Spam Quarantine login page in Cisco IronPort AsyncOS before 6.5.2 on Series C, M, and X appliances allows remote attackers to inject arbitrary web script or HTML via the referrer parameter.",Cisco,"Ironport Asyncos,Ironport Email Security Appliances",,,0.00279000005684793,false,,false,false,false,,,false,false,,2009-06-05T15:25:00.000Z,0