Show filters
57 Total Results
Displaying 51-57 of 57
Sort by:
Attacker Value
Unknown

CVE-2013-5534

Disclosure Date: October 19, 2013 (last updated October 05, 2023)
Directory traversal vulnerability in the attachment service in the Voice Message Web Service (aka VMWS or Cisco Unity Web Service) in Cisco Unity Connection allows remote authenticated users to create files, and consequently execute arbitrary JSP code, via a crafted pathname for a file that is not a valid audio file, aka Bug ID CSCuj22948.
0
Attacker Value
Unknown

CVE-2013-1129

Disclosure Date: February 19, 2013 (last updated October 05, 2023)
Memory leak in Cisco Unity Connection 9.x allows remote attackers to cause a denial of service (memory consumption and process crash) by sending many TCP requests, aka Bug ID CSCud59736.
0
Attacker Value
Unknown

CVE-2012-3060

Disclosure Date: September 16, 2012 (last updated October 05, 2023)
Cisco Unity Connection (UC) 8.6, 9.0, and 9.5 allows remote attackers to cause a denial of service (CPU consumption) via malformed UDP packets, aka Bug ID CSCtz76269.
0
Attacker Value
Unknown

CVE-2012-3096

Disclosure Date: September 16, 2012 (last updated October 05, 2023)
Cisco Unity Connection (UC) 7.1, 8.0, and 8.5 allows remote authenticated users to cause a denial of service (resource consumption and administration outage) via extended use of the product, aka Bug ID CSCtd79132.
0
Attacker Value
Unknown

CVE-2012-0366

Disclosure Date: March 01, 2012 (last updated October 04, 2023)
Cisco Unity Connection before 7.1.3b(Su2) allows remote authenticated users to change the administrative password by leveraging the Help Desk Administrator role, aka Bug ID CSCtd45141.
0
Attacker Value
Unknown

CVE-2012-0367

Disclosure Date: March 01, 2012 (last updated October 04, 2023)
Cisco Unity Connection before 7.1.5b(Su5), 8.0 and 8.5 before 8.5.1(Su3), and 8.6 before 8.6.2 allows remote attackers to cause a denial of service (services crash) via a series of crafted TCP segments, aka Bug ID CSCtq67899.
0
Attacker Value
Unknown

CVE-2005-0356

Disclosure Date: May 31, 2005 (last updated February 22, 2025)
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.
0