The vulnerability is due to insufficient input validation for some of the parameters that are passed to the web server. An attacker could exploit this vulnerability by persuading a user to follow a malicious link or by intercepting and injecting malicious code into a user request. A successful exploit could allow the attacker to execute arbitrary script in the context of the affected site or access sensitive browser-based information.
Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link: http://ift.tt/1Sy5RIs
from Cisco Security Advisory http://ift.tt/1Sy5RIs
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.