CVE-2015-0605
https://notcve.org/view.php?id=CVE-2015-0605
The uuencode inspection engine in Cisco AsyncOS on Cisco Email Security Appliance (ESA) devices 8.5 and earlier allows remote attackers to bypass intended content restrictions via a crafted e-mail attachment with uuencode encoding, aka Bug ID CSCzv54343. El motor de inspección uuencode en Cisco AsyncOS en los dispositivos Cisco Email Security Appliance (ESA) 8.5 y anteriores permite a atacantes remotos evadir las restricciones de contenido a través de un adjunto de email manipulado con cifrado uuencode, también conocido como Bug ID CSCzv54343. • http://secunia.com/advisories/62829 http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0605 http://tools.cisco.com/security/center/viewAlert.x?alertId=37384 http://www.securityfocus.com/bid/72528 https://exchange.xforce.ibmcloud.com/vulnerabilities/100695 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2015-0577
https://notcve.org/view.php?id=CVE-2015-0577
Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA), allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCus22925 and CSCup08113. Múltiples vulnerabilidades de XSS en la página IronPort Spam Quarantine (ISQ) en Cisco AsyncOS, utilizado en Cisco Email Security Appliance (ESA) y Content Security Management Appliance (SMA), permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de parámetro no especificados, también conocido como Bug IDs CSCus22925 y CSCup08113. • http://secunia.com/advisories/62289 http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0577 http://www.securityfocus.com/bid/72056 http://www.securitytracker.com/id/1031544 https://exchange.xforce.ibmcloud.com/vulnerabilities/100556 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2014-3381
https://notcve.org/view.php?id=CVE-2014-3381
The ZIP inspection engine in Cisco AsyncOS 8.5 and earlier on the Cisco Email Security Appliance (ESA) does not properly analyze ZIP archives, which allows remote attackers to bypass malware filtering via a crafted archive, aka Bug ID CSCup07934. El motor de inspección ZIP en Cisco AsyncOS 8.5 y anteriores en Cisco Email Security Appliance (ESA) no analiza correctamente los archivos ZIP, lo que permite a atacantes remotos evadir la filtración de malware a través de un archivo manipulado, también conocido como Bug ID CSCup07934. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3381 http://tools.cisco.com/security/center/viewAlert.x?alertId=36062 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2014-3289
https://notcve.org/view.php?id=CVE-2014-3289
Cross-site scripting (XSS) vulnerability in the web management interface in Cisco AsyncOS on the Email Security Appliance (ESA) 8.0, Web Security Appliance (WSA) 8.0 (.5 Hot Patch 1) and earlier, and Content Security Management Appliance (SMA) 8.3 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, as demonstrated by the date_range parameter to monitor/reports/overview on the IronPort ESA, aka Bug IDs CSCun07998, CSCun07844, and CSCun07888. Vulnerabilidad de XSS en la interfaz de gestión web en Cisco AsyncOS en Email Security Appliance (ESA) 8.0, Web Security Appliance (WSA) 8.0 (.5 Hot Patch 1) y anteriores y Content Security Management Appliance (SMA) 8.3 y anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de un parámetro manipulado, tal y como fue demostrado por el parámetro date_range en monitor/reports/overview en IronPort ESA, también conocido como Bug IDs CSCun07998, CSCun07844 y CSCun07888. • http://packetstormsecurity.com/files/127004/Cisco-Ironport-Email-Security-Virtual-Appliance-8.0.0-671-XSS.html http://seclists.org/fulldisclosure/2014/Jun/57 http://secunia.com/advisories/58296 http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3289 http://tools.cisco.com/security/center/viewAlert.x?alertId=34569 http://www.kb.cert.org/vuls/id/613308 http://www.securityfocus.com/bid/67943 http://www.securitytracker.com/id/1030407 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2014-2195
https://notcve.org/view.php?id=CVE-2014-2195
Cisco AsyncOS on Email Security Appliance (ESA) and Content Security Management Appliance (SMA) devices, when Active Directory is enabled, does not properly handle group names, which allows remote attackers to gain role privileges by leveraging group-name similarity, aka Bug ID CSCum86085. Cisco AsyncOS en dispositivos Email Security Appliance (ESA) y Content Security Management Appliance (SMA), cuando Active Directory está habilitado, no maneja debidamente nombres de grupos, lo que permite a atacantes remotos ganar privilegios de rol mediante el aprovechamiento de similaridades entre nombres de grupos, también conocido como Bug ID CSCum86085. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195 http://www.securitytracker.com/id/1030258 • CWE-20: Improper Input Validation •