- WEBEX CLIENT PLUGIN FOR INTERNET EXPLORER DOWNLOAD UPDATE
- WEBEX CLIENT PLUGIN FOR INTERNET EXPLORER DOWNLOAD SOFTWARE
- WEBEX CLIENT PLUGIN FOR INTERNET EXPLORER DOWNLOAD CODE
- WEBEX CLIENT PLUGIN FOR INTERNET EXPLORER DOWNLOAD DOWNLOAD
Select either Download Manager or GpcContainer Class add-on under Cisco WebEx LLC.Select All add-ons from the Show drop-down menu.In Internet Explorer, select the Tools button.Internet Explorer users can ensure they are using the fixed version of the plugin for Internet Explorer by:
WEBEX CLIENT PLUGIN FOR INTERNET EXPLORER DOWNLOAD UPDATE
The update may have been applied either via the web when joining a WebEx meeting or by a local update of the client via an MSI file. The fixed version of the plugin depends on the version of Cisco WebEx that provided the update. The registered name of the plugin in Internet Explorer may differ based on the installation method used for the plugin. Versions of the Cisco WebEx Plugin for Microsoft Internet Explorer were released on January 28, 2017, and contain a fix for this vulnerability. The Cisco WebEx NPAPI Plugin for Mozilla Firefox identification string, which organizations can use to identify hosts that contain the plugin, is the following:
WEBEX CLIENT PLUGIN FOR INTERNET EXPLORER DOWNLOAD SOFTWARE
There are no workarounds that address this vulnerability.
WEBEX CLIENT PLUGIN FOR INTERNET EXPLORER DOWNLOAD CODE
If successful, the attacker could execute arbitrary code with the privileges of the affected browser.Ĭisco has released software updates for Google Chrome, Firefox, and Internet Explorer that address this vulnerability. An attacker that can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. The vulnerability is due to a design defect in an application programing interface (API) response parser within the plugin. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server and Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center) when they are running on Microsoft Windows. A vulnerability in Cisco WebEx browser extensions could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system.