Show filters
63 Total Results
Displaying 51-60 of 63
Sort by:
Attacker Value
Unknown

CVE-2017-12269

Disclosure Date: October 05, 2017 (last updated November 26, 2024)
A vulnerability in the web UI of Cisco Spark Messaging Software could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack. The vulnerability is due to insufficient input validation by the web UI of the affected software. An attacker could exploit this vulnerability by injecting XSS content into the web UI of the affected software. A successful exploit could allow the attacker to force a user to execute code of the attacker's choosing or allow the attacker to retrieve sensitive information from the user. Cisco Bug IDs: CSCvf70587, CSCvf70592.
0
Attacker Value
Unknown

CVE-2017-12612

Disclosure Date: September 13, 2017 (last updated November 26, 2024)
In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received by its socket. This makes applications launched programmatically using the launcher API potentially vulnerable to arbitrary code execution by an attacker with access to any user account on the local machine. It does not affect apps run by spark-submit or spark-shell. The attacker would be able to execute code as the user that ran the Spark application. Users are encouraged to update to version 2.2.0 or later.
0
Attacker Value
Unknown

CVE-2017-7678

Disclosure Date: July 12, 2017 (last updated November 26, 2024)
In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflected back to the user and could be evaluated and executed by MS Windows-based clients. It is not an attack on Spark itself, but on the user, who may then execute the script inadvertently when viewing elements of the Spark web UIs.
0
Attacker Value
Unknown

CVE-2016-7838

Disclosure Date: June 09, 2017 (last updated November 26, 2024)
Untrusted search path vulnerability in WinSparkle versions prior to 0.5.3 allows remote attackers to execute arbitrary code via a specially crafted executable file in an unspecified directory.
0
Attacker Value
Unknown

CVE-2016-9177

Disclosure Date: November 04, 2016 (last updated November 25, 2024)
Directory traversal vulnerability in Spark 2.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the URI.
0
Attacker Value
Unknown

CVE-2016-1323

Disclosure Date: February 12, 2016 (last updated November 25, 2024)
The REST interface in Cisco Spark 2015-06 allows remote authenticated users to obtain sensitive information via a request for an unspecified file, aka Bug ID CSCuv84048.
0
Attacker Value
Unknown

CVE-2016-1322

Disclosure Date: February 12, 2016 (last updated November 25, 2024)
The REST interface in Cisco Spark 2015-07-04 allows remote attackers to bypass intended access restrictions and create arbitrary user accounts via unspecified web requests, aka Bug ID CSCuv72584.
0
Attacker Value
Unknown

CVE-2016-1324

Disclosure Date: February 12, 2016 (last updated November 25, 2024)
The REST interface in Cisco Spark 2015-06 allows remote attackers to cause a denial of service (resource outage) by accessing an administrative page, aka Bug ID CSCuv84125.
0
Attacker Value
Unknown

CVE-2015-6303

Disclosure Date: September 24, 2015 (last updated October 05, 2023)
The Cisco Spark application 2015-07-04 for mobile operating systems does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate, aka Bug IDs CSCut36742 and CSCut36844.
0
Attacker Value
Unknown

CVE-2014-5867

Disclosure Date: September 11, 2014 (last updated October 05, 2023)
The Capital One Spark Pay (aka com.capitalone.sparkpay) application 0.9.81 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0