CVE-2013-6972

Cisco WebEx Training Center allows remote attackers to discover session numbers, and bypass host approval for audio-conference attendance, by reading HTML source code, aka Bug ID CSCul57126.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:webex_training_center:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:00

Type Values Removed Values Added
References () http://osvdb.org/100914 - () http://osvdb.org/100914 -
References () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6972 - Vendor Advisory () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6972 - Vendor Advisory
References () http://tools.cisco.com/security/center/viewAlert.x?alertId=32145 - Vendor Advisory () http://tools.cisco.com/security/center/viewAlert.x?alertId=32145 - Vendor Advisory
References () http://www.securityfocus.com/bid/64282 - () http://www.securityfocus.com/bid/64282 -
References () http://www.securitytracker.com/id/1029492 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1029492 - Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/89652 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/89652 -

Information

Published : 2013-12-14 22:55

Updated : 2024-11-21 02:00


NVD link : CVE-2013-6972

Mitre link : CVE-2013-6972

CVE.ORG link : CVE-2013-6972


JSON object : View

Products Affected

cisco

  • webex_training_center
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor