Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco webex meetings - vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-8031
Cross-site request forgery (CSRF) vulnerability in Cisco WebEx Meetings Server allows remote malicious users to hijack the authentication of arbitrary users, aka Bug ID CSCuj40456.
Cisco Webex Meetings Server -
1 Article
NA
CVE-2014-3286
The web framework in Cisco WebEx Meeting Server does not properly restrict the content of reply messages, which allows remote malicious users to obtain sensitive information via a crafted URL, aka Bug IDs CSCuj81685, CSCuj81688, CSCuj81665, CSCuj81744, and CSCuj81661.
Cisco Webex Meetings Server -
NA
CVE-2014-3294
Cisco WebEx Meeting Server does not properly restrict the content of URLs, which allows remote authenticated users to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history, aka Bug ID CSCuj81691.
Cisco Webex Meetings Server -
5.3
CVSSv3
CVE-2020-3441
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote malicious user to view sensitive information from the meeting room lobby. This vulnerability is due to insufficient protection of sensitive participant information. An a...
Cisco Webex Meetings Server
Cisco Webex Meetings Server 3.0
Cisco Webex Meetings Server 4.0
Cisco Webex Meetings
4.3
CVSSv3
CVE-2021-1517
A vulnerability in the multimedia viewer feature of Cisco Webex Meetings and Cisco Webex Meetings Server could allow an authenticated, remote malicious user to bypass security protections. This vulnerability is due to unsafe handling of shared content within the multimedia viewer...
Cisco Webex Meetings Server
Cisco Webex Meetings Server 3.0
Cisco Webex Meetings Server 4.0
Cisco Webex Meetings Online 41.3.5
6.1
CVSSv3
CVE-2021-1525
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote malicious user to redirect users to a malicious file. This vulnerability is due to improper validation of URL paths in the application interface. An attacker could explo...
Cisco Webex Meetings Server
Cisco Webex Meetings Server 3.0
Cisco Webex Meetings Server 4.0
Cisco Webex Meetings Online 41.3.5
7.8
CVSSv3
CVE-2019-1771
A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an malicious user to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly valid...
Cisco Webex Meetings Online
Cisco Webex Business Suite
Cisco Webex Business Suite Lockdown
Cisco Webex Meetings Server 3.0\\(1\\)
Cisco Webex Meetings Server 2.8\\(1\\)
7.8
CVSSv3
CVE-2019-1772
A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an malicious user to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly valid...
Cisco Webex Meetings Online
Cisco Webex Business Suite Lockdown
Cisco Webex Meetings Server 3.0\\(1\\)
Cisco Webex Meetings Server 2.8\\(1\\)
Cisco Webex Business Suite
NA
CVE-2013-1205
The Event Center module in Cisco WebEx Meetings Server does not perform request authentication in all intended circumstances, which allows remote malicious users to discover host keys and event passwords via crafted URLs, aka Bug ID CSCue62485.
Cisco Webex Meetings Server -
7.3
CVSSv3
CVE-2014-0691
Cisco WebEx Meetings Server prior to 1.1 uses meeting IDs with insufficient entropy, which makes it easier for remote malicious users to bypass authentication and join arbitrary meetings without a password, aka Bug ID CSCuc79643.
Cisco Webex Meetings Server
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »