Page 3 of 11 results (0.008 seconds)

CVSS: 4.3EPSS: 2%CPEs: 17EXPL: 0

Directory traversal vulnerability in the Send Screen Capture implementation in Cisco Jabber 9.2(.1) and earlier on Windows allows remote attackers to upload arbitrary types of files, and consequently execute arbitrary code, via modified packets, aka Bug ID CSCug48056. Vulnerbailidad d erecorrido de directorios en la implementación de Send Screen Capture de Cisco Jabber 9.2(.1) y anteriores en Windows permite a atacantes remotos subir tipos de archivo arbitrarios, y consecuentemente ejecutar código de forma arbitraria, a través de paquetes modificados, tambien conocido como Bug ID CSCug48056. • http://osvdb.org/102122 http://secunia.com/advisories/56331 http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0666 http://tools.cisco.com/security/center/viewAlert.x?alertId=32451 http://www.securityfocus.com/bid/64965 http://www.securitytracker.com/id/1029635 https://exchange.xforce.ibmcloud.com/vulnerabilities/90435 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •