Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco emergency responder 2.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-1154
The Disaster Recovery Framework (DRF) master server in Cisco Unified Communications products, including Unified Communications Manager (CUCM) 5.x and 6.x, Unified Presence 1.x and 6.x, Emergency Responder 2.x, and Mobility Manager 2.x, does not require authentication for requests...
Cisco Mobility Manager 2.0
Cisco Unified Communications Manager 5.0
Cisco Unified Presence 1.0
Cisco Unified Presence 6.0
Cisco Unified Communications Manager 6.1
Cisco Emergency Responder 2.0
Cisco Unified Communications Manager 6.0
Cisco Unified Communications Manager 5.1
NA
CVE-2004-1759
Cisco voice products, when running the IBM Director Agent on IBM servers before OS 2000.2.6, allows remote malicious users to cause a denial of service (CPU consumption) via arbitrary packets to TCP port 14247, as demonstrated using port scanning.
Cisco Personal Assistant 1.3(2)
Cisco Ip Interactive Voice Response 3.0
Cisco Personal Assistant 1.3(4)
Cisco Ip Call Center Express Standard 3.0
Cisco Call Manager 3.0
Cisco Call Manager 3.1(3a)
Cisco Call Manager 1.0
Cisco Personal Assistant 1.3(3)
Cisco Call Manager 3.2
Cisco Call Manager 3.1(2)
Cisco Personal Assistant 1.4(2)
Cisco Call Manager 3.3
Cisco Call Manager 2.0
Cisco Internet Service Node
Cisco Personal Assistant 1.4(1)
Cisco Call Manager 3.1
Ibm Director Agent 3.11
Ibm Director Agent 2.2
Cisco Ip Call Center Express Enhanced 3.0
Cisco Call Manager 4.0
Cisco Call Manager 3.3(3)
Cisco Emergency Responder 1.1
NA
CVE-2004-1760
The default installation of Cisco voice products, when running the IBM Director Agent on IBM servers before OS 2000.2.6, does not require authentication, which allows remote malicious users to gain administrator privileges by connecting to TCP port 14247.
Cisco Personal Assistant 1.3(2)
Cisco Ip Interactive Voice Response 3.0
Cisco Personal Assistant 1.3(4)
Cisco Ip Call Center Express Standard 3.0
Cisco Call Manager 3.0
Cisco Call Manager 3.1(3a)
Cisco Call Manager 1.0
Cisco Personal Assistant 1.3(3)
Cisco Call Manager 3.2
Cisco Call Manager 3.1(2)
Cisco Personal Assistant 1.4(2)
Cisco Call Manager 3.3
Cisco Call Manager 2.0
Cisco Internet Service Node
Cisco Personal Assistant 1.4(1)
Cisco Call Manager 3.1
Ibm Director Agent 3.11
Ibm Director Agent 2.2
Cisco Ip Call Center Express Enhanced 3.0
Cisco Call Manager 4.0
Cisco Call Manager 3.3(3)
Cisco Emergency Responder 1.1
10
CVSSv3
CVE-2021-44228
Apache Log4j2 2.0-beta9 up to and including 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can contr...
Apache Log4j 2.0
Apache Log4j
Siemens Sppa-t3000 Ses3000 Firmware
Siemens Logo! Soft Comfort
Siemens Spectrum Power 4 4.70
Siemens Spectrum Power 4
Siemens Siveillance Control Pro
Siemens Energyip Prepay 3.7
Siemens Energyip Prepay 3.8
Siemens Siveillance Identity 1.6
Siemens Siveillance Identity 1.5
Siemens Siveillance Command
Siemens Sipass Integrated 2.85
Siemens Sipass Integrated 2.80
Siemens Head-end System Universal Device Integration System
Siemens Gma-manager
Siemens Energyip 8.5
Siemens Energyip 8.6
Siemens Energyip 8.7
Siemens Energyip 9.0
Siemens Energy Engage 3.1
Siemens E-car Operation Center
2 Metasploit modules
1185 Github repositories
28 Articles
NA
CVE-2005-0356
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote malicious users to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard late...
Cisco Secure Access Control Server 3.2
Cisco Mgx 8230 1.2.11
Cisco Mgx 8250 1.2.10
Cisco Secure Access Control Server 3.2.2
Cisco Personal Assistant 1.3(2)
Cisco Unity Server 2.2
Cisco Secure Access Control Server 2.4
Cisco Secure Access Control Server 3.1.1
Cisco Personal Assistant 1.3(4)
Cisco Unity Server 3.0
Cisco Secure Access Control Server 2.6.3
Cisco Interactive Voice Response
Cisco Secure Access Control Server 2.42
Cisco Call Manager 3.0
Cisco Call Manager 3.1(3a)
Cisco Secure Access Control Server 3.3.2
Cisco Unity Server 3.1
Cisco Call Manager 1.0
Cisco Unity Server 3.3
Cisco Personal Assistant 1.3(3)
Cisco Secure Access Control Server 2.1
Cisco Secure Access Control Server 3.3(1)
1 EDB exploit
5.3
CVSSv3
CVE-2015-8139
ntpq in NTP prior to 4.2.8p7 allows remote malicious users to obtain origin timestamps and then impersonate peers via unspecified vectors.
Ntp Ntp
4.8
CVSSv3
CVE-2015-8140
The ntpq protocol in NTP prior to 4.2.8p7 allows remote malicious users to conduct replay attacks by sniffing the network.
Ntp Ntp
7.5
CVSSv3
CVE-2015-7848
An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP dae...
Ntp Ntp-dev 4.3.70
8.8
CVSSv3
CVE-2015-7849
Use-after-free vulnerability in ntpd in NTP 4.2.x prior to 4.2.8p4, and 4.3.x prior to 4.3.77 allows remote authenticated users to possibly execute arbitrary code or cause a denial of service (crash) via crafted packets.
Ntp Ntp 4.2.8
Ntp Ntp
Netapp Oncommand Balance -
Netapp Clustered Data Ontap -
Netapp Data Ontap -
Netapp Oncommand Unified Manager -
Netapp Oncommand Performance Manager -
6.5
CVSSv3
CVE-2015-7851
Directory traversal vulnerability in the save_config function in ntpd in ntp_control.c in NTP prior to 4.2.8p4, when used on systems that do not use '\' or '/' characters for directory separation such as OpenVMS, allows remote authenticated users to overwrite ...
Ntp Ntp 4.2.8
Ntp Ntp
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-0044
client side
CVE-2021-47601
deserialization
CVE-2024-34994
encryption
CVE-2021-47609
CVE-2024-37079
CVE-2024-38608
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »