Page 2 of 7 results (0.005 seconds)

CVSS: 9.0EPSS: 0%CPEs: 5EXPL: 0

Unspecified vulnerability in Cisco Unified Intelligent Contact Management Enterprise (ICME), Unified ICM Hosted (ICMH), Unified Contact Center Enterprise (UCCE), Unified Contact Center Hosted (UCCH), and System Unified Contact Center Enterprise (SUCCE) 7.1(5) allows remote authenticated users to gain privileges, and read reports or change the SUCCE configuration, via certain web interfaces, aka CSCsj55686. Una vulnerabilidad no especificada en Cisco Unified Intelligent Contact Management Enterprise (ICME), Unified ICM Hosted (ICMH), Unified Contact Center Enterprise (UCCE), Unified Contact Center Hosted (UCCH) y System Unified Contact Center Enterprise (SUCCE) versión 7.1 (5), permite a usuarios autenticados remotos alcanzar privilegios y leer reportes o cambiar la configuración de SUCCE, por medio de ciertas interfaces web, también se conoce como CSCsj55686. • http://osvdb.org/37938 http://secunia.com/advisories/27214 http://www.cisco.com/en/US/products/products_security_advisory09186a00808dda12.shtml http://www.securityfocus.com/bid/26106 http://www.securitytracker.com/id?1018829 http://www.vupen.com/english/advisories/2007/3533 https://exchange.xforce.ibmcloud.com/vulnerabilities/37248 •

CVSS: 5.0EPSS: 2%CPEs: 8EXPL: 0

The JTapi Gateway process in Cisco Unified Contact Center Enterprise, Unified Contact Center Hosted, IP Contact Center Enterprise, and Cisco IP Contact Center Hosted 5.0 through 7.1 allows remote attackers to cause a denial of service (repeated process restart) via a certain TCP session on the JTapi server port. El proceso JTapi Gateway en Cisco Unified Contact Center Enterprise, Unified Contact Center Hosted, IP Contact Center Enterprise, y Cisco IP Contact Center Hosted 5.0 hasta 7.1 permite a atacantes remotos provocar una denegación de servicio (repetición de reinicio de proceso) mediante sesiones concretas TCP en el puerto de servidor JTapi. • http://osvdb.org/32682 http://secunia.com/advisories/23710 http://securitytracker.com/id?1017499 http://www.cisco.com/warp/public/707/cisco-sa-20070110-jtapi.shtml http://www.securityfocus.com/bid/21988 http://www.vupen.com/english/advisories/2007/0138 •