All the vulnerabilites related to sophos - es4000
cve-2008-0838
Vulnerability from cvelistv5
Published
2008-02-20 21:00
Modified
2024-08-07 08:01
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the web administration interface in Sophos ES1000 and ES4000 Email Security Appliance 2.1.0.0 allow remote attackers to inject arbitrary web script or HTML via the (1) error and (2) go parameters to the login page.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/488206/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id?1019427 | vdb-entry, x_refsource_SECTRACK | |
http://www.sophos.com/support/knowledgebase/article/34733.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/27813 | vdb-entry, x_refsource_BID | |
http://securityreason.com/securityalert/3673 | third-party-advisory, x_refsource_SREASON | |
http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-02-13 | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2008/0574 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/28961 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:01:39.350Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20080215 [INFIGO-2008-02-13]: SOPHOS Email Security Appliance Cross Site Scripting Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488206/100/0/threaded" }, { "name": "1019427", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019427" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/support/knowledgebase/article/34733.html" }, { "name": "27813", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27813" }, { "name": "3673", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3673" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-02-13" }, { "name": "ADV-2008-0574", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0574" }, { "name": "28961", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28961" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the web administration interface in Sophos ES1000 and ES4000 Email Security Appliance 2.1.0.0 allow remote attackers to inject arbitrary web script or HTML via the (1) error and (2) go parameters to the login page." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20080215 [INFIGO-2008-02-13]: SOPHOS Email Security Appliance Cross Site Scripting Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488206/100/0/threaded" }, { "name": "1019427", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019427" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/support/knowledgebase/article/34733.html" }, { "name": "27813", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27813" }, { "name": "3673", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3673" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-02-13" }, { "name": "ADV-2008-0574", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0574" }, { "name": "28961", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28961" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0838", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the web administration interface in Sophos ES1000 and ES4000 Email Security Appliance 2.1.0.0 allow remote attackers to inject arbitrary web script or HTML via the (1) error and (2) go parameters to the login page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20080215 [INFIGO-2008-02-13]: SOPHOS Email Security Appliance Cross Site Scripting Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/488206/100/0/threaded" }, { "name": "1019427", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019427" }, { "name": "http://www.sophos.com/support/knowledgebase/article/34733.html", "refsource": "CONFIRM", "url": "http://www.sophos.com/support/knowledgebase/article/34733.html" }, { "name": "27813", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27813" }, { "name": "3673", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3673" }, { "name": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-02-13", "refsource": "MISC", "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-02-13" }, { "name": "ADV-2008-0574", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0574" }, { "name": "28961", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28961" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0838", "datePublished": "2008-02-20T21:00:00", "dateReserved": "2008-02-20T00:00:00", "dateUpdated": "2024-08-07T08:01:39.350Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3177
Vulnerability from cvelistv5
Published
2008-07-15 18:03
Modified
2024-08-07 09:28
Severity ?
EPSS score ?
Summary
Sophos virus detection engine 2.75 on Linux and Unix, as used in Sophos Email Appliance, Pure Message for Unix, and Sophos Anti-Virus Interface (SAVI), allows remote attackers to cause a denial of service (engine crash) via zero-length MIME attachments.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1020462 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/30110 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2008/2053/references | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/43703 | vdb-entry, x_refsource_XF | |
http://www.sophos.com/support/knowledgebase/article/42245.html?_log_from=rss | x_refsource_CONFIRM | |
http://secunia.com/advisories/31037 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:28:41.794Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1020462", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020462" }, { "name": "30110", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30110" }, { "name": "ADV-2008-2053", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2053/references" }, { "name": "sophos-mime-dos(43703)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43703" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/support/knowledgebase/article/42245.html?_log_from=rss" }, { "name": "31037", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31037" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Sophos virus detection engine 2.75 on Linux and Unix, as used in Sophos Email Appliance, Pure Message for Unix, and Sophos Anti-Virus Interface (SAVI), allows remote attackers to cause a denial of service (engine crash) via zero-length MIME attachments." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1020462", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020462" }, { "name": "30110", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30110" }, { "name": "ADV-2008-2053", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2053/references" }, { "name": "sophos-mime-dos(43703)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43703" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/support/knowledgebase/article/42245.html?_log_from=rss" }, { "name": "31037", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31037" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3177", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sophos virus detection engine 2.75 on Linux and Unix, as used in Sophos Email Appliance, Pure Message for Unix, and Sophos Anti-Virus Interface (SAVI), allows remote attackers to cause a denial of service (engine crash) via zero-length MIME attachments." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1020462", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020462" }, { "name": "30110", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30110" }, { "name": "ADV-2008-2053", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2053/references" }, { "name": "sophos-mime-dos(43703)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43703" }, { "name": "http://www.sophos.com/support/knowledgebase/article/42245.html?_log_from=rss", "refsource": "CONFIRM", "url": "http://www.sophos.com/support/knowledgebase/article/42245.html?_log_from=rss" }, { "name": "31037", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31037" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3177", "datePublished": "2008-07-15T18:03:00", "dateReserved": "2008-07-15T00:00:00", "dateUpdated": "2024-08-07T09:28:41.794Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2008-07-15 18:41
Modified
2024-11-21 00:48
Severity ?
Summary
Sophos virus detection engine 2.75 on Linux and Unix, as used in Sophos Email Appliance, Pure Message for Unix, and Sophos Anti-Virus Interface (SAVI), allows remote attackers to cause a denial of service (engine crash) via zero-length MIME attachments.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sophos | email_appliance | es1000 | |
sophos | email_appliance | es4000 | |
sophos | es1000 | * | |
sophos | es4000 | * | |
sophos | sophos_anti-virus | * | |
sophos | sophos_puremessage_anti-virus | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:sophos:email_appliance:es1000:*:*:*:*:*:*:*", "matchCriteriaId": "8B03E1F8-1ED6-40C5-A164-0581A75634F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:sophos:email_appliance:es4000:*:*:*:*:*:*:*", "matchCriteriaId": "881E76E2-3049-49F1-B1FD-322BDBE3C1B8", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:es1000:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B7EE749-CA5F-4348-B39B-E8AA0E61EE0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:es4000:*:*:*:*:*:*:*:*", "matchCriteriaId": "29C6192D-4E59-4663-9612-0286CD8AF9C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CCF6E5F-DF9F-4B6A-A826-1268E0EAD4FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_puremessage_anti-virus:*:*:*:*:*:*:*:*", "matchCriteriaId": "E44BBA71-625A-4D39-A35F-A87EBE16C95C", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sophos virus detection engine 2.75 on Linux and Unix, as used in Sophos Email Appliance, Pure Message for Unix, and Sophos Anti-Virus Interface (SAVI), allows remote attackers to cause a denial of service (engine crash) via zero-length MIME attachments." }, { "lang": "es", "value": "El motor de detecci\u00f3n de Sophos 2.75 en Linux y Unix, descubierto en Sophos Email Appliance, Pure Message para Unix y Sophos Anti-Virus Interface (SAVI), permite a los atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del engine) a trav\u00e9s del adjunto MIME de longitud cero" } ], "id": "CVE-2008-3177", "lastModified": "2024-11-21T00:48:37.867", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-07-15T18:41:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31037" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/30110" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1020462" }, { "source": "cve@mitre.org", "url": "http://www.sophos.com/support/knowledgebase/article/42245.html?_log_from=rss" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2053/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43703" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.sophos.com/support/knowledgebase/article/42245.html?_log_from=rss" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2053/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43703" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-16" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-02-20 21:44
Modified
2024-11-21 00:43
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the web administration interface in Sophos ES1000 and ES4000 Email Security Appliance 2.1.0.0 allow remote attackers to inject arbitrary web script or HTML via the (1) error and (2) go parameters to the login page.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:es1000:2.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3861A46C-8232-40A6-B2A8-478609609F3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:es4000:2.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1ED78684-051E-4052-B251-E241CC53C6B8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the web administration interface in Sophos ES1000 and ES4000 Email Security Appliance 2.1.0.0 allow remote attackers to inject arbitrary web script or HTML via the (1) error and (2) go parameters to the login page." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en la interfaz de administraci\u00f3n web de Sophos ES1000 y ES4000 Email Security Appliance 2.1.0.0 permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de los par\u00e1metros (1) error y (2) go a la p\u00e1gina de validaci\u00f3n." } ], "id": "CVE-2008-0838", "lastModified": "2024-11-21T00:43:01.617", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-02-20T21:44:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28961" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3673" }, { "source": "cve@mitre.org", "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-02-13" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/488206/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/27813" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019427" }, { "source": "cve@mitre.org", "url": "http://www.sophos.com/support/knowledgebase/article/34733.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0574" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28961" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3673" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-02-13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/488206/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/27813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.sophos.com/support/knowledgebase/article/34733.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0574" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }