![]() ![]() The affected browsers are Google Chrome, Mozilla Firefox, and Internet Explorer for Windows. This vulnerability affects Cisco WebEx extensions and plugins for Windows when running on most supported browsers. This advisory is available at the following link: There are no workarounds that address this vulnerability. ![]() If successful, the attacker could execute arbitrary code with the privileges of the affected browser.Ĭisco has released software updates for Google Chrome, Firefox, and Internet Explorer that address this vulnerability. An attacker that can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. The vulnerability is due to a design defect in an application programing interface (API) response parser within the plugin. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server and Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center) when they are running on Microsoft Windows. ![]() A vulnerability in Cisco WebEx browser extensions could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |