Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
email security vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-4586
McAfee Email and Web Security (EWS) 5.x prior to 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, accesses files with the privileges of the root user, which allows remote authenticated users to bypass intended permission settings by requestin...
Mcafee Email And Web Security 5.0
Mcafee Email And Web Security 5.6
Mcafee Email Gateway 7.0
Mcafee Email And Web Security 5.5
NA
CVE-2012-4014
Unspecified vulnerability in McAfee Email Anti-virus (formerly WebShield SMTP) allows remote malicious users to cause a denial of service via unknown vectors.
Mcafee Email And Web Security 5.5
Mcafee Email And Web Security 5.6
Mcafee Email And Web Security 5.0
NA
CVE-2009-5130
The Rules Service in Websense Email Security prior to 7.1 allows remote malicious users to cause a denial of service (service crash) via an attachment with a crafted size.
Websense Websense Email Security 6.1
Websense Websense Email Security
NA
CVE-2009-5131
The Receive Service in Websense Email Security prior to 7.1 does not recognize domain extensions in the blacklist, which allows remote malicious users to bypass intended access restrictions and send e-mail messages via an SMTP session.
Websense Websense Email Security
Websense Websense Email Security 6.1
5.8
CVSSv3
CVE-2017-3800
A vulnerability in the content scanning engine of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote malicious user to bypass configured message or content filters on the device. Affected Products: This vulnerability affects al...
Cisco Email Security Appliance 9.8.5-085
Cisco Email Security Appliance 9.7.1-066
Cisco Email Security Appliance 9.7.1-hp2-207
7.5
CVSSv3
CVE-2016-6372
A vulnerability in the email message and content filtering for malformed Multipurpose Internet Mail Extensions (MIME) headers of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote malicious use...
Cisco Web Security Appliance 9.1.0-000
Cisco Email Security Appliance 9.9 Base
Cisco Email Security Appliance 8.9.1-000
Cisco Web Security Appliance 7.1.0
Cisco Email Security Appliance 9.6.0-051
Cisco Email Security Appliance 9.7.1-066
Cisco Web Security Appliance 8.5.2-024
Cisco Web Security Appliance 9.5.0-235
Cisco Email Security Appliance 9.0.0
Cisco Email Security Appliance 8.5.7-042
Cisco Email Security Appliance 8.5.0-000
Cisco Web Security Appliance 8.0.5 Hot Patch 1
Cisco Email Security Appliance 8.0 Base
Cisco Web Security Appliance 7.1.2
Cisco Email Security Appliance 9.1.0-032
Cisco Web Security Appliance 8.5.2-027
Cisco Web Security Appliance 7.1.1
Cisco Web Security Appliance 8.8.0-085
Cisco Web Security Appliance 8.0.7-142
Cisco Email Security Appliance 8.9.0
Cisco Email Security Appliance 9.7.0-125
Cisco Email Security Appliance 8.5.6-074
NA
CVE-2015-6285
Format string vulnerability in Cisco Email Security Appliance (ESA) 7.6.0 and 8.0.0 allows remote malicious users to cause a denial of service (memory overwrite or service outage) via format string specifiers in an HTTP request, aka Bug ID CSCug21497.
Cisco Email Security Appliance 7.6.0
Cisco Email Security Appliance 8.0.0
NA
CVE-2015-4236
Cisco AsyncOS on Email Security Appliance (ESA) devices with software 8.5.6-073, 8.5.6-074, and 9.0.0-461, when clustering is enabled, allows remote malicious users to cause a denial of service (clustering and SSH outage) via a packet flood, aka Bug IDs CSCur13704 and CSCuq05636.
Cisco Email Security Appliance Firmware 8.5.6-073
Cisco Email Security Appliance Firmware 9.0.0-461
Cisco Email Security Appliance 8.5.6-074
6.1
CVSSv3
CVE-2019-6142
It has been reported that XSS is possible in Forcepoint Email Security, versions 8.5 and 8.5.3. It is strongly recommended that you apply the relevant hotfix in order to remediate this issue.
Forcepoint Email Security 8.5
Forcepoint Security Manager 8.5
Forcepoint Security Manager 8.5.3
Forcepoint Email Security 8.5.3
NA
CVE-2012-4595
McAfee Email and Web Security (EWS) 5.5 through Patch 6 and 5.6 through Patch 3, and McAfee Email Gateway (MEG) 7.0.0 and 7.0.1, allows remote malicious users to bypass authentication and obtain an admin session ID via unspecified vectors.
Mcafee Email And Web Security 5.5
Mcafee Email And Web Security 5.6
Mcafee Email Gateway 7.0.0
Mcafee Email Gateway 7.0.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-38002
CVE-2006-4304
CVE-2024-4336
CVE-2024-33437
CVE-2024-4340
CVE-2024-27956
privilege
insecure direct object reference
XSS
item search icon">CVE-2024-25938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »