The vulnerability is due to insufficient input validation of some parameters passed via HTTP GET or POST methods. An attacker may be able to exploit this vulnerability by intercepting the user packets and injecting the malicious code.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2hgWqTt
The vulnerability is due to insufficient input validation of some parameters passed via HTTP GET or POST methods. An attacker may be able to exploit this vulnerability by intercepting the user packets and injecting the malicious code.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2hgWqTt
Security Impact Rating: Medium
CVE: CVE-2016-9214
from Cisco Security Advisory http://ift.tt/2hgWqTt
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.