Vulnerability Description
Cisco WebEx Training Center allows remote attackers to discover session numbers, and bypass host approval for audio-conference attendance, by reading HTML source code, aka Bug ID CSCul57126.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Webex Training Center | - |
Related Weaknesses (CWE)
References
- http://osvdb.org/100914
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6972Vendor Advisory
- http://tools.cisco.com/security/center/viewAlert.x?alertId=32145Vendor Advisory
- http://www.securityfocus.com/bid/64282
- http://www.securitytracker.com/id/1029492Third Party AdvisoryVDB Entry
- https://exchange.xforce.ibmcloud.com/vulnerabilities/89652
- http://osvdb.org/100914
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6972Vendor Advisory
- http://tools.cisco.com/security/center/viewAlert.x?alertId=32145Vendor Advisory
- http://www.securityfocus.com/bid/64282
- http://www.securitytracker.com/id/1029492Third Party AdvisoryVDB Entry
- https://exchange.xforce.ibmcloud.com/vulnerabilities/89652
FAQ
What is CVE-2013-6972?
CVE-2013-6972 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Cisco WebEx Training Center allows remote attackers to discover session numbers, and bypass host approval for audio-conference attendance, by reading HTML source code, aka Bug ID CSCul57126.
How severe is CVE-2013-6972?
CVE-2013-6972 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6972?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Webex Training Center.