Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
aura conferencing vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-7007
A directory traversal vulnerability has been found in the Avaya Equinox Management(iView)versions R9.1.9.0 and previous versions. Successful exploitation could potentially allow an unauthenticated malicious user to access files that are outside the restricted directory on the rem...
Avaya Aura Conferencing
5.8
CVSSv2
CVE-2019-7000
A Cross-Site Scripting (XSS) vulnerability in the Web UI of Avaya Aura Conferencing may allow code execution and potentially disclose sensitive information. Affected versions of Avaya Aura Conferencing include all 8.x versions before 8.0 SP14 (8.0.14). Prior versions not listed w...
Avaya Aura Conferencing 8.0
Avaya Aura Conferencing
7.2
CVSSv2
CVE-2011-1229
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a...
Microsoft Windows 2003 Server -
Microsoft Windows 7 -
Microsoft Windows Server 2003 -
Microsoft Windows Server 2008 -
Microsoft Windows Server 2008 R2
Microsoft Windows Vista -
Microsoft Windows Xp -
Avaya Agent Access
Avaya Aura Conferencing Standard Edition 6.0.0
Avaya Basic Call Management System Reporting Desktop
Avaya Call Management Server Supervisor
Avaya Callpilot
Avaya Callvisor Asai Lan
Avaya Communication Server 1000 Telephony Manager
Avaya Computer Telephony
Avaya Contact Center Express
Avaya Customer Interaction Express
Avaya Enterprise Manager
Avaya Integrated Management
Avaya Interaction Center
Avaya Ip Agent
Avaya Ip Softphone
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-38298
CVE-2024-20356
CVE-2023-21987
CVE-2024-33217
bypass
CVE-2024-31804
CVE-2024-32660
unauthorized
SSRF
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started