Show filters
321 Total Results
Displaying 51-60 of 321
Sort by:
Attacker Value
Unknown
CVE-2024-22229
Disclosure Date: January 24, 2024 (last updated February 06, 2024)
Dell Unity, versions prior to 5.4, contain a vulnerability whereby log messages can be spoofed by an authenticated attacker. An attacker could exploit this vulnerability to forge log entries, create false alarms, and inject malicious content into logs that compromise logs integrity. A malicious attacker could also prevent the product from logging information while malicious actions are performed or implicate an arbitrary user for malicious activities.
0
Attacker Value
Unknown
CVE-2024-20272
Disclosure Date: January 17, 2024 (last updated January 25, 2024)
A vulnerability in the web-based management interface of Cisco Unity Connection could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system and execute commands on the underlying operating system. This vulnerability is due to a lack of authentication in a specific API and improper validation of user-supplied data. An attacker could exploit this vulnerability by uploading arbitrary files to an affected system. A successful exploit could allow the attacker to store malicious files on the system, execute arbitrary commands on the operating system, and elevate privileges to root.
0
Attacker Value
Unknown
CVE-2023-43082
Disclosure Date: November 22, 2023 (last updated November 30, 2023)
Dell Unity prior to 5.3 contains a 'man in the middle' vulnerability in the vmadapter component. If a customer has a certificate signed by a third-party public Certificate Authority, the vCenter CA could be spoofed by an attacker who can obtain a CA-signed certificate.
0
Attacker Value
Unknown
CVE-2023-4804
Disclosure Date: November 10, 2023 (last updated November 17, 2023)
An unauthorized user could access debug features in Quantum HD Unity products that were accidentally exposed.
0
Attacker Value
Unknown
CVE-2023-37635
Disclosure Date: October 23, 2023 (last updated October 31, 2023)
UVDesk Community Skeleton v1.1.1 allows unauthenticated attackers to perform brute force attacks on the login page to gain access to the application.
0
Attacker Value
Unknown
CVE-2023-43067
Disclosure Date: October 23, 2023 (last updated October 28, 2023)
Dell Unity prior to 5.3 contains an XML External Entity injection vulnerability. An XXE attack could potentially exploit this vulnerability disclosing local files in the file system.
0
Attacker Value
Unknown
CVE-2023-43066
Disclosure Date: October 23, 2023 (last updated October 28, 2023)
Dell Unity prior to 5.3 contains a Restricted Shell Bypass vulnerability. This could allow an authenticated, local attacker to exploit this vulnerability by authenticating to the device CLI and issuing certain commands.
0
Attacker Value
Unknown
CVE-2023-43074
Disclosure Date: October 23, 2023 (last updated October 28, 2023)
Dell Unity 5.3 contain(s) an Arbitrary File Creation vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by crafting arbitrary files through a request to the server.
0
Attacker Value
Unknown
CVE-2023-43065
Disclosure Date: October 23, 2023 (last updated October 28, 2023)
Dell Unity prior to 5.3 contains a Cross-site scripting vulnerability. A low-privileged authenticated attacker can exploit these issues to obtain escalated privileges.
0
Attacker Value
Unknown
CVE-2023-20259
Disclosure Date: October 04, 2023 (last updated October 18, 2023)
A vulnerability in an API endpoint of multiple Cisco Unified Communications Products could allow an unauthenticated, remote attacker to cause high CPU utilization, which could impact access to the web-based management interface and cause delays with call processing. This API is not used for device management and is unlikely to be used in normal operations of the device.
This vulnerability is due to improper API authentication and incomplete validation of the API request. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to high CPU utilization, which could negatively impact user traffic and management access. When the attack stops, the device will recover without manual intervention.
0