CVE-2016-1423 (CNNVD-201610-751)
中文标题:
Cisco AsyncOS for Cisco Email Security Appliances 安全漏洞
英文标题:
A vulnerability in the display of email messages in the Messages in Quarantine (MIQ) view in Cisco A...
漏洞描述
中文描述:
Cisco AsyncOS for Cisco Email Security Appliances(ESA)是美国思科(Cisco)公司的一套使用在电子邮件安全设备(ESA)和网络安全设备(WSA)中的操作系统。 Cisco AsyncOS for Cisco Email ESA 8.0.2-069版本中的Messages in Quarantine中的邮件信息显示存在安全漏洞。远程攻击者可通过诱使用户点击MIQ中的恶意链接利用该漏洞实施跨站脚本攻击或HTML注入攻击。
英文描述:
A vulnerability in the display of email messages in the Messages in Quarantine (MIQ) view in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a user to click a malicious link in the MIQ view. The malicious link could be used to facilitate a cross-site scripting (XSS) or HTML injection attack. More Information: CSCuz02235. Known Affected Releases: 8.0.2-069. Known Fixed Releases: 9.1.1-038 9.7.2-047.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| cisco | email_security_appliance | 8.9.0 | - | - |
cpe:2.3:a:cisco:email_security_appliance:8.9.0:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 8.9.1-000 | - | - |
cpe:2.3:a:cisco:email_security_appliance:8.9.1-000:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 8.9.2-032 | - | - |
cpe:2.3:a:cisco:email_security_appliance:8.9.2-032:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.0.0 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.0.0:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.0.0-212 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.0.0-212:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.0.0-461 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.0.0-461:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.0.5-000 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.0.5-000:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.1.0 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.1.0:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.1.0-011 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.1.0-011:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.1.0-032 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.1.0-032:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.1.0-101 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.1.0-101:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2016-1423 |
2025-11-11 15:19:05 | 2025-11-11 07:34:15 |
| NVD | nvd_CVE-2016-1423 |
2025-11-11 14:55:09 | 2025-11-11 07:42:56 |
| CNNVD | cnnvd_CNNVD-201610-751 |
2025-11-11 15:09:43 | 2025-11-11 07:52:45 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 跨站脚本
- cnnvd_id: 未提取 -> CNNVD-201610-751
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 6.1
- cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- cvss_version: NOT_EXTRACTED -> 3.0
- affected_products_count: 0 -> 11
- data_sources: ['cve'] -> ['cve', 'nvd']