Max CVSS | 7.5 | Min CVSS | 6.5 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2013-4869 | 0.0 |
Cisco Unified Communications Manager (CUCM) 7.1(x) through 9.1(2) and the IM & Presence Service in Cisco Unified Presence Server through 9.1(2) use the same CTI and database-encryption key across different customers' installations, which makes it eas
|
08-12-2020 - 16:50 | 18-07-2013 - 12:48 | |
CVE-2013-3433 | 6.8 |
Untrusted search path vulnerability in Cisco Unified Communications Manager (CUCM) 7.1(x) through 9.1(1a) allows local users to gain privileges by leveraging unspecified file-permission and environment-variable issues for privileged programs, aka Bug
|
18-11-2017 - 02:29 | 18-07-2013 - 12:48 | |
CVE-2013-3434 | 6.8 |
Untrusted search path vulnerability in Cisco Unified Communications Manager (CUCM) 7.1(x) through 9.1(1a) allows local users to gain privileges by leveraging unspecified file-permission and environment-variable issues for privileged programs, aka Bug
|
18-11-2017 - 02:29 | 18-07-2013 - 12:48 | |
CVE-2013-3402 | 6.5 |
An unspecified function in Cisco Unified Communications Manager (CUCM) 7.1(x) through 9.1(2) allows remote authenticated users to execute arbitrary commands via unknown vectors, aka Bug ID CSCuh73440.
|
20-08-2013 - 03:23 | 18-07-2013 - 12:48 | |
CVE-2013-3403 | 6.8 |
Multiple untrusted search path vulnerabilities in Cisco Unified Communications Manager (CUCM) 7.1(x) through 9.1(1a) allow local users to gain privileges by leveraging unspecified file-permission and environment-variable issues for privileged program
|
20-08-2013 - 03:23 | 18-07-2013 - 12:48 | |
CVE-2013-3412 | 6.5 |
SQL injection vulnerability in Cisco Unified Communications Manager (CUCM) 7.1(x) through 9.1(2) allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCuh81766.
|
20-08-2013 - 03:23 | 18-07-2013 - 12:48 | |
CVE-2013-3404 | 7.5 |
SQL injection vulnerability in Cisco Unified Communications Manager (CUCM) 7.1(x) through 9.1(1a) allows remote attackers to execute arbitrary SQL commands via unspecified vectors, leading to discovery of encrypted credentials by leveraging metadata,
|
20-08-2013 - 03:23 | 18-07-2013 - 12:48 |