The vulnerability is due to insufficient client-side validation checks. An attacker could exploit this vulnerability by submitting a malicious POST request to the affected system. An exploit could allow the attacker to implant arbitrary files onto the affected system.
Workarounds that address this vulnerability are not available.
This advisory is available at the following link: http://ift.tt/2gCAkXh
The vulnerability is due to insufficient client-side validation checks. An attacker could exploit this vulnerability by submitting a malicious POST request to the affected system. An exploit could allow the attacker to implant arbitrary files onto the affected system.
Workarounds that address this vulnerability are not available.
This advisory is available at the following link: http://ift.tt/2gCAkXh
Security Impact Rating: Medium
CVE: CVE-2016-9210
from Cisco Security Advisory http://ift.tt/2gCAkXh
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.