![]() A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Ĭisco has released software updates that address this vulnerability. An attacker could exploit this vulnerability by persuading a user to click a malicious link during the session. This vulnerability exists because the web interface does not properly validate user-supplied input during a webinar event practice session. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.ĭetails about the vulnerabilities are as follows:ĬVE-2023-20132: Cisco Webex Meetings Stored Cross-Site Scripting VulnerabilityĪ vulnerability in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. The vulnerabilities are not dependent on one another.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |