Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco meeting vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2020-3471
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote malicious user to maintain bidirectional audio despite being expelled from an active Webex session. The vulnerability is due to a synchronization issue between meeting a...
Cisco Webex Meetings Server
Cisco Webex Meetings Server 3.0
Cisco Webex Meetings Server 4.0
4.3
CVSSv2
CVE-2020-3116
A vulnerability in the way Cisco Webex applications process Universal Communications Format (UCF) files could allow an malicious user to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of UCF media files. An attacker could exploit th...
Cisco Webex Meetings Online 1.3.43
Cisco Webex Meetings Server 4.0
4
CVSSv2
CVE-2020-3542
A vulnerability in Cisco Webex Training could allow an authenticated, remote malicious user to join a password-protected meeting without providing the meeting password. The vulnerability is due to improper validation of input to API requests that are a part of meeting join flow. ...
Cisco Webex Training
4
CVSSv2
CVE-2020-3412
A vulnerability in the scheduled meeting template feature of Cisco Webex Meetings could allow an authenticated, remote malicious user to create a scheduled meeting template that would belong to another user in their organization. The vulnerability is due to insufficient authoriza...
Cisco Webex Meetings Online
4
CVSSv2
CVE-2020-3413
A vulnerability in the scheduled meeting template feature of Cisco Webex Meetings could allow an authenticated, remote malicious user to delete a scheduled meeting template that belongs to another user in their organization. The vulnerability is due to insufficient authorization ...
Cisco Webex Meetings Online
5
CVSSv2
CVE-2020-3197
A vulnerability in the API subsystem of Cisco Meetings App could allow an unauthenticated, remote malicious user to retain and reuse the Traversal Using Relay NAT (TURN) server credentials that are configured in an affected system. The vulnerability is due to insufficient protect...
Cisco Meeting Server
2.1
CVSSv2
CVE-2020-3347
A vulnerability in Cisco Webex Meetings Desktop App for Windows could allow an authenticated, local malicious user to gain access to sensitive information on an affected system. The vulnerability is due to unsafe usage of shared memory that is used by the affected software. An at...
Cisco Webex Meetings
Cisco Webex Meetings 40.6.0
2 Articles
5.8
CVSSv2
CVE-2020-3155
A vulnerability in the SSL implementation of the Cisco Intelligent Proximity solution could allow an unauthenticated, remote malicious user to view or alter information shared on Cisco Webex video devices and Cisco collaboration endpoints if the products meet the conditions descr...
Cisco Intelligence Proximity
Cisco Jabber
Cisco Meeting
Cisco Webex Meetings
Cisco Webex Teams
Cisco Telepresence Codec C40 Firmware -
Cisco Telepresence Codec C60 Firmware -
Cisco Telepresence Codec C90 Firmware -
4.3
CVSSv2
CVE-2020-3160
A vulnerability in the Extensible Messaging and Presence Protocol (XMPP) feature of Cisco Meeting Server software could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition for users of XMPP conferencing applications. Other applications and...
Cisco Meeting Server
9
CVSSv2
CVE-2019-16005
A vulnerability in the web-based management interface of Cisco Webex Video Mesh could allow an authenticated, remote malicious user to execute arbitrary commands on the affected system. The vulnerability is due to improper validation of user-supplied input by the web-based manage...
Cisco Collaboration Meeting Rooms 2.0
Cisco Webex Video Mesh
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »