Get Mystery Box with random crypto!

Cisco Channel

Logo of telegram channel cisco — Cisco Channel C
Logo of telegram channel cisco — Cisco Channel
Channel address: @cisco
Categories: Technologies
Language: English
Subscribers: 13.07K
Description from channel

Cisco News and Vulnerabilities
More:
@Rcall
@PopPolls
@QubesOS 💻
@CiscoChat
@CiscoLog
t.me/Cisco/22556
This channel is not official

Ratings & Reviews

4.00

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

2

4 stars

0

3 stars

0

2 stars

1

1 stars

0


The latest Messages 15

2022-05-18 19:49:10 Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-strd-xss-BqFXO9D2?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Enterprise%20Chat%20and%20Email%20Stored%20Cross-Site%20Scripting%20Vulnerability&vs_k=1

A vulnerability in the web interface of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user-supplied input that is processed by the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-strd-xss-BqFXO9D2



Security Impact Rating: Medium



CVE: CVE-2022-20802
74 views16:49
Open / Comment
2022-05-18 19:48:11 Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-bsFVwueV?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Expressway%20Series%20and%20Cisco%20TelePresence%20Video%20Communication%20Server%20Vulnerabilities&vs_k=1

Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to write files or disclose sensitive information on an affected device.
For more information about these vulnerabilities, see the Details (#details) section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-bsFVwueV


Security Impact Rating: Medium



CVE: CVE-2022-20806,CVE-2022-20807,CVE-2022-20809
72 views16:48
Open / Comment
2022-05-18 19:47:10 Cisco Secure Network Analytics Remote Code Execution Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-stealth-rce-2hYb9KFK?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Secure%20Network%20Analytics%20Remote%20Code%20Execution%20Vulnerability&vs_k=1

A vulnerability in the web-based management interface of Cisco Secure Network Analytics, formerly Cisco Stealthwatch Enterprise, could allow an authenticated, remote attacker to execute arbitrary commands as an administrator on the underlying operating system.
This vulnerability is due to insufficient user input validation by the web-based management interface of the affected software. An attacker could exploit this vulnerability by injecting arbitrary commands in the web-based management interface. A successful exploit could allow the attacker to make configuration changes on the affected device or cause certain services to restart unexpectedly.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-stealth-rce-2hYb9KFK
Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see Meet Cisco Secure (https://www.cisco.com/c/en/us/products/security/secure-names.html).



Security Impact Rating: Medium



CVE: CVE-2022-20797
76 views16:47
Open / Comment
2022-05-18 19:46:10 Cisco UCS Director JavaScript Cross-Site Scripting Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-UCS-XSS-uQSME3L7?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20UCS%20Director%20JavaScript%20Cross-Site%20Scripting%20Vulnerability&vs_k=1

A vulnerability in the web applications of Cisco UCS Director could allow an authenticated, remote attacker to conduct a cross-site scripting attack on an affected system.
This vulnerability is due to unsanitized user input. An attacker could exploit this vulnerability by submitting custom JavaScript to affected web applications. A successful exploit could allow the attacker to rewrite web page content, access sensitive information stored in the applications, and alter data by submitting forms.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-UCS-XSS-uQSME3L7



Security Impact Rating: Medium



CVE: CVE-2022-20765
105 views16:46
Open / Comment
2022-05-17 06:01:54 Join Cisco at KubeCon + CloudNativeCon Europe 2022 where the Emerging Technologies & Incubation team will be meeting with modern app developers, security and DevOps engineers.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
142 views03:01
Open / Comment
2022-05-17 06:01:53
147 views03:01
Open / Comment
2022-05-17 06:01:51 Developers experience enterprise-ready cloud-native solutions for app security, monitoring, and lifecycle management
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2022/m05/developers-experience-enterprise-ready-cloud-native-solutions-for-application-security-monitoring-and-lifecycle-management.html?source=rss
147 views03:01
Open / Comment
2022-05-14 09:52:25 For more polls and quizzes go to @poppolls
372 views06:52
Open / Comment
2022-05-14 09:52:17
How often do you drink alcohol?
Anonymous Poll
48%
I don't drink alcohol
3%
I'm a workaholic
0%
All day everyday
0%
Once a day
5%
Once a week
13%
Few times a week
3%
Once a month
8%
A few times a month
18%
A few times a year
15%
Go fuck yourself
40 voters377 views06:52
Open / Comment
2022-05-14 09:45:46 For more polls and quizzes go to @poppolls
342 views06:45
Open / Comment