Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA), allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCus22925 and CSCup08113.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Asyncos | - |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/62289
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0577Vendor Advisory
- http://www.securityfocus.com/bid/72056
- http://www.securitytracker.com/id/1031544
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100556
- http://secunia.com/advisories/62289
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0577Vendor Advisory
- http://www.securityfocus.com/bid/72056
- http://www.securitytracker.com/id/1031544
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100556
FAQ
What is CVE-2015-0577?
CVE-2015-0577 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management App...
How severe is CVE-2015-0577?
CVE-2015-0577 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-0577?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Asyncos.