Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
avaya ip office 10.1 vulnerabilities and exploits
(subscribe to this query)
801
VMScore
CVE-2018-15610
A vulnerability in the one-X Portal component of Avaya IP Office allows an authenticated malicious user to read and delete arbitrary files on the system. Affected versions of Avaya IP Office include 9.1 up to and including 9.1 SP12, 10.0 up to and including 10.0 SP7, and 10.1 up ...
Avaya Ip Office 9.1
Avaya Ip Office 10.0
Avaya Ip Office 10.1
312
VMScore
CVE-2018-15614
A vulnerability in the one-x Portal component of IP Office could allow an authenticated user to perform stored cross site scripting attacks via fields in the Conference Scheduler Service that could affect other application users. Affected versions of IP Office include 10.0 up to ...
Avaya Ip Office 10.0
Avaya Ip Office 10.1
Avaya Ip Office 11.0
685
VMScore
CVE-2017-12969
Buffer overflow in the ViewerCtrlLib.ViewerCtrl ActiveX control in Avaya IP Office Contact Center prior to 10.1.1 allows remote malicious users to cause a denial of service (heap corruption and crash) or execute arbitrary code via a long string to the open method.
Avaya Ip Office Contact Center 9.1.0
Avaya Ip Office Contact Center 9.1.0.2209.1540
Avaya Ip Office Contact Center 9.1.6
Avaya Ip Office Contact Center 9.1.7
Avaya Ip Office Contact Center 9.1.8
Avaya Ip Office Contact Center 9.1.9
Avaya Ip Office Contact Center 9.1
Avaya Ip Office Contact Center 10.0
Avaya Ip Office Contact Center 10.0.0.3-8600.1705
Avaya Ip Office Contact Center 10.1
1 EDB exploit
685
VMScore
CVE-2017-11309
Buffer overflow in the SoftConsole client in Avaya IP Office prior to 10.1.1 allows remote servers to execute arbitrary code via a long response.
Avaya Ip Office
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started