Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Cisco Systems, Inc
  4. Cisco Email Security Appliance
  5. -

Known Vulnerabilities in Cisco Email Security Appliance -

Show more ↓
14.3.0-032
14.2.1-020
14.02.0-020
14.0.1-033
14.0.1-020
14.0
13.5.4-038
13.5.2
13.5.1
13.0.5-007
13.0.1
13.0
12.5.4-041
12.0.0-281
12.0.0
11.1.2-0232
11.1.2-023
11.1.1-042
11.1.1-037
11.1.0-135
11.1.0-131
11.0.2-044
11.0.2-037
11.0.0-274
11.0.0-264
11.0.0-105
11.0
11-0-1-401
10.0.9-015
10.0.3-004
10.0.2-020
10.0.1-087
10.0.0-203
10.0.0-125
10.0.0-124
10.0.0-085
10.0.0-082
9.9.6-026
9.8.0-112
9.7.2-065
9.7.2-047
9.7.2-046
9.7.1-066
9.7.1-000
9.7.0-125
9.7-2-054
9.6.0-051
9.6.0-042
9.1.2-036
9.1.2-028
9.1.2-023
9.1.1-038
9.1.0-042
9.1.0-032
9.0.0-000
8.5.6-106
8.5.5-280
8.5
8.0.2-069
8.0.0-000
8.0
-



URL filtering bypass in Cisco Email Security Appliance18 Jan, 2023
Medium Patched
Information disclosure in Cisco Email Security Appliance and Cisco Secure Email and Web Manager16 Jun, 2022
Medium Patched
Open redirect in Cisco Content Security Management Appliance17 Jul, 2020
Low Patched
Security restrictions bypass in Cisco Email Security Appliance01 Dec, 2017
Low Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Cyber Security Week in Review: May 23, 2025
  • Russian GRU hackers accused of massive espionage campaign across NATO and allied nations
  • Chinese-speaking threat actors exploit Cityworks zero-day to hack into US govt agencies
  • Infamous Lumma stealer malware disrupted in global takedown
  • Hazy Hawk hijacks abandoned cloud resources of global orgs to spread scams and malware
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.