Page 3 of 15 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 0

The Tomcat Web Management feature in Cisco Unified Customer Voice Portal (CVP) Software before 9.0.1 ES 11 does not properly configure Tomcat components, which allows remote attackers to launch arbitrary custom web applications via a crafted (1) HTTP or (2) HTTPS request, aka Bug ID CSCub38379. La característica Tomcat Web Management en Cisco Unified Customer Voice Portal (CVP) Software antes de v9.0.1 ES v11 no configura correctamente los componentes Tomcat, lo que permite a atacantes remotos lanzar aplciaciones web a través de peticiones modificadas (1) HTTP ó (2) HTTPS, también conocido como Bug ID CSCub38379. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130508-cvp • CWE-16: Configuration •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 0

The log viewer in Cisco Unified Customer Voice Portal (CVP) Software before 9.0.1 ES 11 does not properly validate an unspecified parameter, which allows remote attackers to read arbitrary files via a crafted (1) HTTP or (2) HTTPS request, aka Bug ID CSCub38372. El lector de log en Cisco Unified Customer Voice Portal (CVP) Software antes de v9.0.1 ES v11 no valida correctamente un parámetro sin especificar, lo que permite a atacantes remotos leer ficheros arbitrarios a través de peticiones modificadas (1) HTTP ó (2) HTTPS, también conocido como Bug ID CSCub38372. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130508-cvp • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 0

Directory traversal vulnerability in the Resource Manager in Cisco Unified Customer Voice Portal (CVP) Software before 9.0.1 ES 11 allows remote attackers to overwrite arbitrary files via a crafted (1) HTTP or (2) HTTPS request that triggers incorrect parameter validation, aka Bug ID CSCub38369. Vulnerabilidad de salto de directorio en el Resource Manager en Cisco Unified Customer Voice Protal (CVP) Software antes de v9.0.1 ES v11 que permite a atacantes remotos sobrescribir ficheros arbitrarios a través de peticiones manipuladas (1) HTTP ó (2) HTTPS que disparan parámetros incorrectos de validación, también conocido como Bug ID CSCub38369. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130508-cvp • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 0

Cisco Unified Customer Voice Portal (CVP) Software before 9.0.1 ES 11 allows remote attackers to read arbitrary files via a Resource Manager (1) HTTP or (2) HTTPS request containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, aka Bug ID CSCub38366. Cisco Unified Customer Voice Portal (CVP) Software anterior a v9.0.1 ES v11 permite a atacantes remotos leer ficheros arbitrarios a través de peticiones Resource Manager (1) HTTP ó (2) HTTPS que contienen una entidad externa junto con una referencia declarada, relacionada con un asunto XML External Entity (XEE), también conocido como Bug ID CSCub38366. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130508-cvp • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 0

Unspecified vulnerability in Cisco Unified Customer Voice Portal (CVP) 4.0.x before 4.0(2)_ES14, 4.1.x before 4.1(1)_ES11, and 7.x before 7.0(1) allows remote authenticated users with administrator role privileges to create, modify, or delete a superuser account. Vulnerabilidad sin especificar en Cisco Unified Customer Voice Portal (CVP) 4.0.x anterior a 4.0(2)_ES14, 4.1.x anterior a 4.1(1)_ES11 y 7.x anterior 7.0(1), permite a usuarios autenticados remotamente con privilegios del rol de administrador el crear, modificar o eliminar cuentas de superusuario. • http://secunia.com/advisories/30289 http://securitytracker.com/id?1020080 http://www.cisco.com/en/US/products/products_security_advisory09186a008099beae.shtml http://www.securityfocus.com/bid/29315 http://www.vupen.com/english/advisories/2008/1603/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42564 •