4.3
CVSSv3

CVE-2019-1680

Published: 07/02/2019 Updated: 24/03/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

A vulnerability in Cisco Webex Business Suite could allow an unauthenticated, remote malicious user to inject arbitrary text into a user's browser. The vulnerability is due to improper validation of input. An attacker could exploit this vulnerability by convincing a targeted user to view a malicious URL. A successful exploit could allow the malicious user to inject arbitrary text into the user's browser. The attacker could use the content injection to conduct spoofing attacks. Versions prior than 3.0.9 are affected.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco webex business suite

cisco webex meetings online

Vendor Advisories

A vulnerability in Cisco Webex Meetings Online could allow an unauthenticated, remote attacker to inject arbitrary text into a user’s browser The vulnerability is due to improper validation of input An attacker could exploit this vulnerability by convincing a targeted user to view a malicious URL A successful exploit could allow the attacker t ...

Recent Articles

Alleged SIM swapping crypto-crooks cuffed, iOS app snooping, ad-fraud botnets, and more
The Register • Iain Thomson in San Francisco • 09 Feb 2019

All your extra bits and bytes of this week's infosec news in less than 5 minutes

Roundup Here's a summary of more infosec news beyond what we've already reported this week – enjoy. Beware of pretend Italian plumbers bearing gifts: Mario, the beloved video game plumber with a porn-star mustache, should be treated with caution, according to security shop Bromium. Well, at least images of him. Engineer Matthew Rowen was investigating a Windows Trojan that has an unusual pattern of behavior. The malware's PowerShell commands are hidden in a picture of Nintendo's Mario, which i...