Page 6 of 32 results (0.013 seconds)

CVSS: 8.5EPSS: 0%CPEs: 4EXPL: 0

MeetingTime in Cisco Unified MeetingPlace 6 before MR5, and possibly 5, allows remote authenticated users to gain privileges via a modified authentication sequence, aka Bug ID CSCsv66530. MeetingTime en Cisco Unified MeetingPlace v6 anteriores a MR5, y posiblemente v5, permite a usuarios remotos autenticados ganar privilegios a través de una secuencia modificada de autenticación, también conocido como bug ID CSCsv66530. • http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1490b.shtml http://www.securityfocus.com/bid/37965 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 3.5EPSS: 0%CPEs: 2EXPL: 1

Cross-site scripting (XSS) vulnerability in the edit account page in the Web Server in Cisco Unified MeetingPlace Web Conferencing 6.0 before 6.0(517.0) (aka 6.0 MR4) and 7.0 before 7.0(2) (aka 7.0 MR1) allows remote authenticated users to inject arbitrary web script or HTML via the E-mail Address field. Vulnerabilidad Cross-site scripting (XSS), en la página de editar cuentas en el servidor Web de Cisco MeetingPlace Web Conferencing 6.0 anteriores a v6.0(517,0) (también conocido como v6.0 MR4) y v7.0 antes de v7.0(2) (también conocido como 7,0 MR1) permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML de su elección a través del campo E-mail Address. • http://www.cisco.com/en/US/products/products_security_response09186a0080a7bc61.html http://www.securityfocus.com/archive/1/501251/30/0/threaded http://www.securityfocus.com/bid/33915 http://www.securitytracker.com/id?1021778 https://exchange.xforce.ibmcloud.com/vulnerabilities/48965 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in the Web Server in Cisco Unified MeetingPlace Web Conferencing 6.0 before 6.0(517.0) (aka 6.0 MR4) and 7.0 before 7.0(2) (aka 7.0 MR1) allows remote attackers to bypass authentication and obtain administrative access via a crafted URL. Una vulnerabilidad no especificada en Cisco Unified MeetingPlace Web Conferencing Web 6.0 antes de 6.0(517.0) (alias 6.0 MR4) y 7.0 antes de 7.0 (2) (alias 7.0 MR1) permite a atacantes remotos eludir la autenticación y obtener acceso administrativo a través de una URL modificada. • http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc86.shtml http://www.securityfocus.com/bid/33901 https://exchange.xforce.ibmcloud.com/vulnerabilities/48888 • CWE-287: Improper Authentication •

CVSS: 4.3EPSS: 1%CPEs: 8EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in mpweb/scripts/mpx.dll in Cisco Unified MeetingPlace 5.4 and earlier and 6.0 allow remote attackers to inject arbitrary web script or HTML via the (1) FirstName and (2) LastName parameters. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en mpweb/scripts/mpx.dll de Cisco Unified MeetingPlace 5.4 y anteriores y 6.0 permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través de los parámetros (1) FirstName y (2) LastName. • http://secunia.com/advisories/26462 http://securitytracker.com/id?1018904 http://www.cisco.com/warp/public/707/cisco-sr-20071107-mp.shtml http://www.securityfocus.com/bid/26364 http://www.vupen.com/english/advisories/2007/3772 https://exchange.xforce.ibmcloud.com/vulnerabilities/38298 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in Cisco Unified MeetingPlace Web Conferencing (MP) 5.3.235.0 and earlier allow remote attackers to inject arbitrary HTML and web script via the (1) Success Template (STPL) and (2) Failure Template (FTPL) parameters, which are not properly handled in an error message. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Cisco Unified MeetingPlace Web Conferencing (MP) 5.3.235.0 y versiones anteriores permite a atacantes remotos inyectar scripts web o HTML de su elección mediante los parámetros (1) Success Template (STPL) y (2) Failure Template (FTPL), que no son gestionados apropiadamente en un mensaje de error. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065134.html http://secunia.com/advisories/26376 http://securityreason.com/securityalert/2990 http://www.cisco.com/en/US/products/products_security_response09186a008089969e.html http://www.securityfocus.com/archive/1/475840/100/0/threaded http://www.securityfocus.com/archive/1/475845/100/0/threaded http://www.securityfocus.com/bid/25237 http://www.securitytracker.com/id?1018537 http://www.vupen.com/english/advisories/2007/281 •