CVE-2016-9202 (CNNVD-201612-270)
MEDIUM
中文标题:
Cisco AsyncOS Software for Email Security Appliances 跨站脚本漏洞
英文标题:
A vulnerability in the web-based management interface of Cisco Email Security Appliance (ESA) Switch...
CVSS分数:
6.1
发布时间:
2016-12-14 00:37:00
漏洞类型:
跨站脚本
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
Cisco AsyncOS Software for Email Security Appliances(ESA)是美国思科(Cisco)公司的一套使用在电子邮件安全设备(ESA)的操作系统。 Cisco AsyncOS Software for ESA中存在跨站脚本漏洞,该漏洞源于没有充分的过滤用户提交的输入。攻击者可利用该漏洞在用户的浏览器中执行任意脚本代码。
英文描述:
A vulnerability in the web-based management interface of Cisco Email Security Appliance (ESA) Switches could allow an unauthenticated, remote attacker to conduct a persistent cross-site scripting (XSS) attack against a user of the affected interface on an affected device. More Information: CSCvb37346. Known Affected Releases: 9.1.1-036 9.7.1-066.
CWE类型:
CWE-79
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| cisco | email_security_appliance | 9.1.1-036 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.1.1-036:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.1.2-023 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.1.2-023:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.1.2-028 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.1.2-028:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.1.2-036 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.1.2-036:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.4.0 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.4.0:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.4.4-000 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.4.4-000:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.5.0-000 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.5.0-000:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.5.0-201 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.5.0-201:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.6.0-000 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.6.0-000:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.6.0-042 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.6.0-051 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.6.0-051:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.7.0-125 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.7.0-125:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.7.1-066 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.7.1-066:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.7.2-046 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.7.2-046:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.7.2-047 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.7.2-047:*:*:*:*:*:*:*
|
| cisco | email_security_appliance | 9.7.2-054 | - | - |
cpe:2.3:a:cisco:email_security_appliance:9.7.2-054:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
CVSS评分详情
6.1
MEDIUM
CVSS向量:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS版本:
3.0
机密性
LOW
完整性
LOW
可用性
NONE
时间信息
发布时间:
2016-12-14 00:37:00
修改时间:
2024-08-06 02:42:11
创建时间:
2025-11-11 15:34:27
更新时间:
2025-11-11 15:52:48
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2016-9202 |
2025-11-11 15:19:13 | 2025-11-11 07:34:27 |
| NVD | nvd_CVE-2016-9202 |
2025-11-11 14:55:10 | 2025-11-11 07:43:06 |
| CNNVD | cnnvd_CNNVD-201612-270 |
2025-11-11 15:09:44 | 2025-11-11 07:52:48 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:52:48
vulnerability_type: 未提取 → 跨站脚本; cnnvd_id: 未提取 → CNNVD-201612-270; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 跨站脚本
- cnnvd_id: 未提取 -> CNNVD-201612-270
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:43:06
cvss_score: 未提取 → 6.1; cvss_vector: NOT_EXTRACTED → CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N; cvss_version: NOT_EXTRACTED → 3.0; affected_products_count: 0 → 16; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 6.1
- cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- cvss_version: NOT_EXTRACTED -> 3.0
- affected_products_count: 0 -> 16
- data_sources: ['cve'] -> ['cve', 'nvd']