Page 2 of 10 results (0.028 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in Unified Web Interaction Manager in Cisco Unified Web and E-Mail Interaction Manager allows remote attackers to inject arbitrary web script or HTML via vectors related to a POST request, aka Bug ID CSCus74184. Vulnerabilidad de XSS en Unified Web Interaction Manager en Cisco Unified Web y E-Mail Interaction Manager permite a atacantes remotos inyectar secuencias de comandos web arbitrarios o HTML a través de vectores relacionados con una solicitud POST, también conocido como Bug ID CSCus74184. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0655 http://www.securityfocus.com/bid/72824 http://www.securitytracker.com/id/1031820 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

system/egain/chat/entrypoint in Cisco Unified Web and E-mail Interaction Manager 9.0(2) allows remote attackers to have an unspecified impact by injecting a spoofed XML external entity. system/egain/chat/entrypoint en Cisco Unified Web and E-mail Interaction Manager 9.0(2) permite a atacantes remotos tener un impacto no especificado mediante la inyección de una entidad externa XML falsificada. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2194 http://tools.cisco.com/security/center/viewAlert.x?alertId=34270 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cisco Unified Web and E-Mail Interaction Manager places session identifiers in GET requests, which allows remote attackers to inject conversation text by obtaining a valid identifier, aka Bug ID CSCuj43084. Cisco Unified Web and E-Mail Interaction Manager coloca identificadores de sesión en solicitudes GET, lo que permite a atacantes remotos inyectar texto de conversación mediante la obtención de un identificador válido, también conocido como Bug ID CSCuj43084. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2193 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in Cisco Unified Web and E-mail Interaction Manager 9.0(2) allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCuj43033. Vulnerabilidad de XSS en Cisco Unified Web and E-mail Interaction Manager 9.0(2) permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de un parámetro no especificado, también conocido como Bug ID CSCuj43033. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2192 http://tools.cisco.com/security/center/viewAlert.x?alertId=34269 http://www.securityfocus.com/bid/67464 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 93%CPEs: 296EXPL: 2

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. • https://www.exploit-db.com/exploits/1008 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:15.tcp.asc ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.64/SCOSA-2005.64.txt http://secunia.com/advisories/15393 http://secunia.com/advisories/15417 http://secunia.com/advisories/18222 http://secunia.com/advisories/18662 http://support.avaya.com/elmodocs2/security/ASA-2006-032.htm http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml http:/& •