Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco telepresence video communication server vulnerabilities and exploits
(subscribe to this query)
4
CVSSv2
CVE-2015-6413
Cisco TelePresence Video Communication Server (VCS) Expressway X8.6 allows remote authenticated users to bypass intended read-only restrictions and upload Tandberg Linux Package (TLP) files by visiting an administrative page, aka Bug ID CSCuw55651.
Cisco Telepresence Video Communication Server Software X8.6
6.5
CVSSv2
CVE-2018-15430
A vulnerability in the administrative web interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote malicious user to execute code with user-level privileges on the underlying operating system. The vulnerabil...
Cisco Telepresence Video Communication Server X8.9.2
Cisco Telepresence Video Communication Server X8.10.4
Cisco Telepresence Video Communication Server X7.2.4
9
CVSSv2
CVE-2011-2538
Cisco Video Communications Server (VCS) before X7.0.3 contains a command injection vulnerability which allows remote, authenticated malicious users to execute arbitrary commands.
Cisco Telepresence Video Communication Server
6.4
CVSSv2
CVE-2020-3482
A vulnerability in the Traversal Using Relays around NAT (TURN) server component of Cisco Expressway software could allow an unauthenticated, remote malicious user to bypass security controls and send network traffic to restricted destinations. The vulnerability is due to imprope...
Cisco Expressway
Cisco Telepresence Video Communication Server
7.8
CVSSv2
CVE-2015-0652
The Session Description Protocol (SDP) implementation in Cisco TelePresence Video Communication Server (VCS) and Cisco Expressway before X8.2 and Cisco TelePresence Conductor before XC2.4 allows remote malicious users to cause a denial of service (mishandled exception and device ...
Cisco Telepresence Video Communication Server Software
Cisco Expressway Software
Cisco Telepresence Conductor
10
CVSSv2
CVE-2015-0653
The management interface in Cisco TelePresence Video Communication Server (VCS) and Cisco Expressway before X7.2.4, X8 before X8.1.2, and X8.2 before X8.2.2 and Cisco TelePresence Conductor before X2.3.1 and XC2.4 before XC2.4.1 allows remote malicious users to bypass authenticat...
Cisco Telepresence Conductor
Cisco Telepresence Video Communication Server Software
Cisco Expressway Software
6.5
CVSSv2
CVE-2015-4303
Cisco TelePresence Video Communication Server (VCS) X8.5.2 allows remote authenticated users to execute arbitrary commands in the context of the nobody user account via an unspecified web-page parameter, aka Bug ID CSCuv12333.
Cisco Telepresence Video Communication Server Software X8.5.2
4
CVSSv2
CVE-2015-4314
The System Snapshot feature in Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.1 allows remote authenticated users to obtain sensitive password-hash information by reading the snapshot file, aka Bug ID CSCuv40422.
Cisco Telepresence Video Communication Server Software X8.5.1
5.5
CVSSv2
CVE-2015-4315
The Call Policy Configuration page in Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.3 improperly validates external DTDs, which allows remote authenticated users to read arbitrary files or cause a denial of service via a crafted XML document, aka Bug ID CSCu...
Cisco Telepresence Video Communication Server Software X8.5.3
5.5
CVSSv2
CVE-2015-4316
The Mobile and Remote Access (MRA) endpoint-validation feature in Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 improperly validates the phone line used for registration, which allows remote authenticated users to conduct impersonation attacks via a crafte...
Cisco Telepresence Video Communication Server Software X8.5.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32886
insecure direct object reference
CVE-2024-34342
file inclusion
CVE-2024-34562
CVE-2024-34347
CVE-2024-26026
CVE-2024-4647
unprivileged
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »