脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
N/A
脆弱性説明
An issue was discovered in the Cisco WebEx Extension before 1.0.7 on Google Chrome, the ActiveTouch General Plugin Container before 106 on Mozilla Firefox, the GpcContainer Class ActiveX control plugin before 10031.6.2017.0126 on Internet Explorer, and the Download Manager ActiveX control plugin before 2.1.0.10 on Internet Explorer. A vulnerability in these Cisco WebEx browser extensions could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server and Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center) when they are running on Microsoft Windows. The vulnerability is a design defect in an application programing interface (API) response parser within the extension. An attacker that can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. If successful, the attacker could execute arbitrary code with the privileges of the affected browser.
CVSS情報
N/A
脆弱性タイプ
内存缓冲区边界内操作的限制不恰当
脆弱性タイトル
Cisco WebEx extensions和plugins 安全漏洞
脆弱性説明
Cisco WebEx是美国思科(Cisco)公司的一套Web会议工具,该工具可协助异地办公人员进行协调合作。WebEx服务包括Web会议、网真视频会议和企业即时消息(IM)等。 Cisco WebEx extensions和plugins存在安全漏洞。远程攻击者可通过诱使用户打开恶意的网页或链接利用该漏洞执行任意代码。以下产品和版本受到影响:基于Google Chrome平台的Cisco WebEx Extension 1.0.7之前的版本;基于Mozilla Firefox平台的ActiveTouch
CVSS情報
N/A
脆弱性タイプ
N/A