CVE-2017-12358
https://notcve.org/view.php?id=CVE-2017-12358
A vulnerability in the web-based management interface of Cisco Jabber for Windows, Mac, Android, and iOS could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvf79080, CSCvf79088. • http://www.securityfocus.com/bid/101992 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-jabber1 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2017-12286
https://notcve.org/view.php?id=CVE-2017-12286
A vulnerability in the web interface of Cisco Jabber could allow an authenticated, local attacker to retrieve user profile information from the affected software, which could lead to the disclosure of confidential information. The vulnerability is due to a lack of input and validation checks in the affected software. An attacker could exploit this vulnerability by authenticating locally to an affected system and then issuing specific commands to the affected software. A successful exploit could allow the attacker to view all profile information for a user instead of only certain Jabber parameters that should be visible. This vulnerability affects all releases of Cisco Jabber prior to Release 1.9.31. • http://www.securityfocus.com/bid/101515 http://www.securitytracker.com/id/1039625 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-jab1 • CWE-20: Improper Input Validation •
CVE-2017-12284
https://notcve.org/view.php?id=CVE-2017-12284
A vulnerability in the web interface of Cisco Jabber for Windows Client could allow an authenticated, local attacker to retrieve user profile information, which could lead to the disclosure of confidential information. The vulnerability is due to a lack of input- and validation-checking mechanisms in the system. An attacker could exploit this vulnerability by issuing specific commands after authenticating to the system. A successful exploit could allow the attacker to view profile information where only certain parameters should be visible. Cisco Bug IDs: CSCve14401. • http://www.securityfocus.com/bid/101501 http://www.securitytracker.com/id/1039624 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-jab • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2015-6409
https://notcve.org/view.php?id=CVE-2015-6409
Cisco Jabber 10.6.x, 11.0.x, and 11.1.x on Windows allows man-in-the-middle attackers to conduct STARTTLS downgrade attacks and trigger cleartext XMPP sessions via unspecified vectors, aka Bug ID CSCuw87419. Cisco Jabber 10.6.x, 11.0.x y 11.1.x en Windows permite a atacantes man-in-the-middle llevar a cabo ataques de reducción de versión STARTTLS y desencadenar sesiones XMPP en texto plano a través de vectores no especificados, también conocida como Bug ID CSCuw87419. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151224-jab http://www.securityfocus.com/bid/79678 http://www.securitytracker.com/id/1034540 http://www.synacktiv.com/ressources/cisco_jabber_starttls_downgrade.pdf • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2015-4218
https://notcve.org/view.php?id=CVE-2015-4218
The web-based user interface in Cisco Jabber through 9.6(3) and 9.7 through 9.7(5) on Windows allows remote attackers to obtain sensitive information via a crafted value in a GET request, aka Bug IDs CSCuu65622 and CSCuu70858. La interfaz de usuario basada en web en Cisco Jabber hasta 9.6(3) y 9.7 hasta 9.7(5) en Windows permite a atacantes remotos obtener información sensible a través de un valor manipulado en una solicitud GET, también conocido como Bug IDs CSCuu65622 y CSCuu70858. • http://tools.cisco.com/security/center/viewAlert.x?alertId=39494 http://www.securityfocus.com/bid/75377 http://www.securitytracker.com/id/1032711 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •