The vulnerability is due to insufficient input validation of a user-supplied value. An attacker could exploit this vulnerability by convincing a user to click a specific link. A successful exploit could allow the attacker to submit arbitrary requests to the affected system via a web browser with the privileges of the user.
Additional information about XSS attacks and potential mitigations can be found at:
http://ift.tt/1NgIYUj
http://ift.tt/MiRF7O
Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.
This advisory is available at the following link: http://ift.tt/2dtPrCW
The vulnerability is due to insufficient input validation of a user-supplied value. An attacker could exploit this vulnerability by convincing a user to click a specific link. A successful exploit could allow the attacker to submit arbitrary requests to the affected system via a web browser with the privileges of the user.
Additional information about XSS attacks and potential mitigations can be found at:
http://ift.tt/1NgIYUj
http://ift.tt/MiRF7O
Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.
This advisory is available at the following link: http://ift.tt/2dtPrCW
Security Impact Rating: Medium
CVE: CVE-2016-6425
from Cisco Security Advisory http://ift.tt/2dtPrCW
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.