Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
meeting exchange vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2015-1631
Microsoft Exchange Server 2013 SP1 and Cumulative Update 7 allows remote malicious users to spoof meeting organizers via unspecified vectors, aka "Exchange Forged Meeting Request Spoofing Vulnerability."
Microsoft Exchange Server 2013
4.3
CVSSv2
CVE-2016-3379
Cross-site scripting (XSS) vulnerability in Microsoft Exchange Server 2016 Cumulative Update 1 and 2 allows remote malicious users to inject arbitrary web script or HTML via a meeting-invitation request, aka "Microsoft Exchange Elevation of Privilege Vulnerability."
Microsoft Exchange Server 2016
7.2
CVSSv2
CVE-2008-2812
The Linux kernel prior to 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio...
Linux Linux Kernel
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 8.04
Novell Linux Desktop 9
Opensuse Opensuse 11.0
Opensuse Opensuse 10.3
Suse Suse Linux Enterprise Server 10
Suse Suse Linux Enterprise Desktop 10
Debian Debian Linux 4.0
Avaya Message Networking 3.1
Avaya Sip Enablement Services 4.0
Avaya Messaging Storage Server 4.0
Avaya Proactive Contact 4.0
Avaya Meeting Exchange 5.0
Avaya Expanded Meet-me Conferencing
Avaya Intuity Audix Lx 2.0
Avaya Sip Enablement Services -
Avaya Communication Manager
7.2
CVSSv2
CVE-2011-1229
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a...
Microsoft Windows 2003 Server -
Microsoft Windows 7 -
Microsoft Windows Server 2003 -
Microsoft Windows Server 2008 -
Microsoft Windows Server 2008 R2
Microsoft Windows Vista -
Microsoft Windows Xp -
Avaya Agent Access
Avaya Aura Conferencing Standard Edition 6.0.0
Avaya Basic Call Management System Reporting Desktop
Avaya Call Management Server Supervisor
Avaya Callpilot
Avaya Callvisor Asai Lan
Avaya Communication Server 1000 Telephony Manager
Avaya Computer Telephony
Avaya Contact Center Express
Avaya Customer Interaction Express
Avaya Enterprise Manager
Avaya Integrated Management
Avaya Interaction Center
Avaya Ip Agent
Avaya Ip Softphone
4.3
CVSSv2
CVE-2017-12373
A vulnerability in the TLS protocol implementation of legacy Cisco ASA 5500 Series (ASA 5505, 5510, 5520, 5540, and 5550) devices could allow an unauthenticated, remote malicious user to access sensitive information, aka a Return of Bleichenbacher's Oracle Threat (ROBOT) att...
Cisco Adaptive Security Appliance 5505 Firmware -
Cisco Adaptive Security Appliance 5510 Firmware -
Cisco Adaptive Security Appliance 5520 Firmware -
Cisco Adaptive Security Appliance 5540 Firmware -
Cisco Adaptive Security Appliance 5550 Firmware -
4.3
CVSSv2
CVE-2017-15533
Symantec SSL Visibility (SSLV) 3.8.4FC, 3.10 before 3.10.4.1, 3.11, and 3.12 before 3.12.2.1 are vulnerable to the Return of the Bleichenbacher Oracle Threat (ROBOT) attack. All affected SSLV versions act as weak oracles according the oracle classification used in the ROBOT resea...
Broadcom Ssl Visibility Appliance 3.10
Broadcom Ssl Visibility Appliance 3.12
Broadcom Ssl Visibility Appliance 3.8.4fc
Broadcom Ssl Visibility Appliance 3.11
7.1
CVSSv2
CVE-2017-17428
Cavium Nitrox SSL, Nitrox V SSL, and TurboSSL software development kits (SDKs) allow remote malicious users to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.
Cavium Octeon Sdk
Cavium Nitrox V Ssl Sdk
Cavium Nitrox Ssl Sdk
Cavium Octeon Ssl Sdk
Cavium Turbossl Sdk
Cisco Webex Meetings T31
Cisco Webex Conect Im 7.24.1
Cisco Webex Meetings T32
Cisco Ace4710 Application Control Engine Firmware 3.0\\(0\\)a5\\(3.0\\)
Cisco Ace4710 Application Control Engine Firmware 3.0\\(0\\)a5\\(3.5\\)
Cisco Ace4710 Application Control Engine Firmware 3.0\\(0\\)a5\\(2.0\\)
Cisco Ace30 Application Control Engine Module Firmware 3.0\\(0\\)a5\\(3.0\\)
Cisco Ace30 Application Control Engine Module Firmware 3.0\\(0\\)a5\\(3.5\\)
Cisco Ace30 Application Control Engine Module Firmware 3.0\\(0\\)a5\\(2.0\\)
Cisco Adaptive Security Appliance 5520 Firmware 9.1\\(7.16\\)
Cisco Adaptive Security Appliance 5540 Firmware 9.1\\(7.16\\)
Cisco Adaptive Security Appliance 5550 Firmware 9.1\\(7.16\\)
Cisco Adaptive Security Appliance 5510 Firmware 9.1\\(7.16\\)
Cisco Adaptive Security Appliance 5505 Firmware 9.1\\(7.16\\)
5
CVSSv2
CVE-2017-3730
In OpenSSL 1.1.0 prior to 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack.
Openssl Openssl 1.1.0c
Openssl Openssl 1.1.0
Openssl Openssl 1.1.0b
Openssl Openssl 1.1.0a
Oracle Agile Engineering Data Management 6.2.0
Oracle Jd Edwards World Security A9.2
Oracle Communications Eagle Lnp Application Processor 10.1
Oracle Communications Application Session Controller 3.7.1
Oracle Jd Edwards World Security A9.4
Oracle Jd Edwards Enterpriseone Tools 9.2
Oracle Communications Operations Monitor 3.4
Oracle Communications Operations Monitor 4.0
Oracle Agile Engineering Data Management 6.1.3
Oracle Jd Edwards World Security A9.1
Oracle Jd Edwards World Security A9.3
Oracle Communications Eagle Lnp Application Processor 10.0
Oracle Communications Eagle Lnp Application Processor 10.2
Oracle Communications Application Session Controller 3.8.0
1 EDB exploit
1 Github repository
1 Article
6.8
CVSSv2
CVE-2015-0209
Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL prior to 0.9.8zf, 1.0.0 prior to 1.0.0r, 1.0.1 prior to 1.0.1m, and 1.0.2 prior to 1.0.2a might allow remote malicious users to cause a denial of service (memory corruption and applica...
Openssl Openssl 1.0.1j
Openssl Openssl 1.0.0n
Openssl Openssl 1.0.0c
Openssl Openssl 1.0.0i
Openssl Openssl 1.0.1h
Openssl Openssl 1.0.0m
Openssl Openssl 1.0.1c
Openssl Openssl 1.0.1g
Openssl Openssl 1.0.0h
Openssl Openssl 1.0.0e
Openssl Openssl 1.0.0f
Openssl Openssl 1.0.0d
Openssl Openssl 1.0.0j
Openssl Openssl 1.0.0p
Openssl Openssl 1.0.1a
Openssl Openssl 1.0.0o
Openssl Openssl 1.0.1d
Openssl Openssl 1.0.0k
Openssl Openssl 1.0.1k
Openssl Openssl 1.0.0
Openssl Openssl 1.0.1b
Openssl Openssl 1.0.1e
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started