3.5
CVSSv2

CVE-2019-1777

Published: 18/04/2019 Updated: 01/03/2023
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 5.4 | Impact Score: 2.7 | Exploitability Score: 2.3
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

A vulnerability in the web-based interface of the Cisco Registered Envelope Service could allow an authenticated, remote malicious user to conduct a cross-site scripting (XSS) attack against another user of the service. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected software. An attacker could exploit this vulnerability by sending an email with a malicious payload to another user. A successful exploit could allow the malicious user to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. This vulnerability affects software versions 5.3.4.x.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco registered envelope service 5.3.4-027

Vendor Advisories

A vulnerability in the web-based interface of the Cisco Registered Envelope Service could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against another user of the service The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected software An atta ...