The vulnerability is due to insufficient input validation by the affected framework. An attacker could exploit this vulnerability by submitting specific, crafted input to the affected framework on a targeted system. A successful exploit could allow the attacker to read arbitrary files on the targeted system.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2gCsgG9
The vulnerability is due to insufficient input validation by the affected framework. An attacker could exploit this vulnerability by submitting specific, crafted input to the affected framework on a targeted system. A successful exploit could allow the attacker to read arbitrary files on the targeted system.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2gCsgG9
Security Impact Rating: Medium
CVE: CVE-2016-9199
from Cisco Security Advisory http://ift.tt/2gCsgG9
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.