Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
rooms vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2009-0208
Unspecified vulnerability in HP Virtual Rooms Client prior to 7.0.1, when running on Windows, allows remote malicious users to execute arbitrary code via unknown vectors.
Hp Virtual Rooms
Hp Virtual Rooms 6.0
10
CVSSv2
CVE-2008-0437
Multiple buffer overflows in the WebHPVCInstall.HPVirtualRooms14 ActiveX control in HPVirtualRooms14.dll 1.0.0.100, as used in the installation process for HP Virtual Rooms, allow remote malicious users to execute arbitrary code via a long (1) AuthenticationURL, (2) PortalAPIURL,...
Hp Virtual Rooms 1.0.0.100
Microsoft Activex
1 EDB exploit
9
CVSSv2
CVE-2019-16005
A vulnerability in the web-based management interface of Cisco Webex Video Mesh could allow an authenticated, remote malicious user to execute arbitrary commands on the affected system. The vulnerability is due to improper validation of user-supplied input by the web-based manage...
Cisco Collaboration Meeting Rooms 2.0
Cisco Webex Video Mesh
1 Article
7.5
CVSSv2
CVE-2021-34423
A buffer overflow vulnerability exists in Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) bef...
Zoom Meetings
Zoom Meetings For Blackberry
Zoom Meetings For Intune
Zoom Meetings For Chrome Os
Zoom Rooms For Conference Rooms
Zoom Controllers For Zoom Rooms
Zoom Virtual Desktop Infrastructure
Zoom Windows Meeting Sdk
Zoom Macos Meeting Sdk
Zoom Iphone Os Meeting Sdk
Zoom Android Meeting Sdk
Zoom Windows Video Sdk
Zoom Iphone Os Video Sdk
Zoom Macos Video Sdk
Zoom Android Video Sdk
Zoom Hybrid Mmr
Zoom Hybrid Zproxy
Zoom Zoom On-premise Meeting Connector Controller
Zoom Zoom On-premise Virtual Room Connector
Zoom Zoom On-premise Recording Connector
Zoom Zoom On-premise Virtual Room Connector Load Balancer
Zoom Zoom On-premise Meeting Connector Mmr
2 Github repositories
7.5
CVSSv2
CVE-2018-18800
The Tubigan "Welcome to our Resort" 1.0 software allows SQL Injection via index.php?p=accomodation&q=[SQL], index.php?p=rooms&q=[SQL], or admin/login.php.
Tubigan Welcome To Our Resort 1.0
1 EDB exploit
7.5
CVSSv2
CVE-2009-4670
admin/delitem.php in RoomPHPlanning 1.6 does not require authentication, which allows remote malicious users to (1) delete arbitrary users via the user parameter or (2) delete arbitrary rooms via the room parameter.
Beaussier Roomphplanning 1.6
1 EDB exploit
7.5
CVSSv2
CVE-2008-7047
NatterChat 1.1 allows remote malicious users to bypass authentication and gain administrator privileges to read or delete rooms and messages via a direct request to admin/home.asp.
Natterchat Natterchat 1.1
1 EDB exploit
7.5
CVSSv2
CVE-2008-5070
SQL injection vulnerability in Pro Chat Rooms 3.0.3, when magic_quotes_gpc is disabled, allows remote malicious users to execute arbitrary SQL commands via the gud parameter to (1) profiles/index.php and (2) profiles/admin.php.
Pro Chat Rooms Pro Chat Rooms 3.0.3
1 EDB exploit
7.5
CVSSv2
CVE-2008-0213
Unspecified vulnerability in a certain ActiveX control for HP Virtual Rooms (HPVR) 6 and previous versions allows remote malicious users to execute arbitrary code via unknown vectors.
Hp Virtual Rooms
7.5
CVSSv2
CVE-2002-0155
Buffer overflow in Microsoft MSN Chat ActiveX Control, as used in MSN Messenger 4.5 and 4.6, and Exchange Instant Messenger 4.5 and 4.6, allows remote malicious users to execute arbitrary code via a long ResDLL parameter in the MSNChat OCX.
Microsoft Msn Messenger 4.6
Microsoft Msn Messenger Service For Exchange 4.6
Microsoft Msn Chat Control
Microsoft Msn Messenger 4.5
Microsoft Msn Messenger Service For Exchange 4.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »