First published: Fri Jun 05 2009(Updated: )
Cross-site scripting (XSS) vulnerability in the Spam Quarantine login page in Cisco IronPort AsyncOS before 6.5.2 on Series C, M, and X appliances allows remote attackers to inject arbitrary web script or HTML via the referrer parameter.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IronPort AsyncOS | =6.0.0-754 | |
Cisco IronPort AsyncOS | =6.0.0-757 | |
Cisco IronPort AsyncOS | =6.1.0-301 | |
Cisco IronPort AsyncOS | =6.1.0-304 | |
Cisco IronPort AsyncOS | =6.1.0-306 | |
Cisco IronPort AsyncOS | =6.1.0-307 | |
Cisco IronPort AsyncOS | =6.1.5-110 | |
Cisco IronPort AsyncOS | =6.1.6-003 | |
Cisco IronPort AsyncOS | =6.3.5-003 | |
Cisco IronPort AsyncOS | =6.3.6-003 | |
Cisco IronPort AsyncOS | =6.5.0-405 | |
Cisco IronPort AsyncOS | =6.5.1-005 | |
Cisco IronPort AsyncOS | =6.6.4.0-273 | |
Cisco Ironport Email Security Appliances | =c | |
Cisco Ironport Email Security Appliances | =m | |
Cisco Ironport Email Security Appliances | =x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.