First published: Wed Jan 14 2015(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA), allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCus22925 and CSCup08113.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AsyncOS Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0577 is rated as a medium severity vulnerability.
To mitigate CVE-2015-0577, upgrade your Cisco AsyncOS to a version that includes patches for this vulnerability.
CVE-2015-0577 affects Cisco AsyncOS used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA).
CVE-2015-0577 allows remote attackers to perform cross-site scripting (XSS) attacks.
Yes, CVE-2015-0577 is a publicly disclosed vulnerability.