Page 3 of 13 results (0.005 seconds)

CVSS: 4.0EPSS: 0%CPEs: 2EXPL: 0

The Document Management component in Cisco Unified Contact Center Express does not properly validate a parameter, which allows remote authenticated users to upload files to arbitrary pathnames via a crafted HTTP request, aka Bug ID CSCun74133. El componente Document Management en Cisco Unified Contact Center Express no valida debidamente un parámetro, lo que permite a usuarios remotos autenticados subir archivos a través de una solicitud HTTP manipulado, también conocido como Bug ID CSCun74133. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2180 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 0%CPEs: 5EXPL: 0

Unspecified vulnerability in Cisco Unified Intelligent Contact Management Enterprise (ICME), Unified ICM Hosted (ICMH), Unified Contact Center Enterprise (UCCE), Unified Contact Center Hosted (UCCH), and System Unified Contact Center Enterprise (SUCCE) 7.1(5) allows remote authenticated users to gain privileges, and read reports or change the SUCCE configuration, via certain web interfaces, aka CSCsj55686. Una vulnerabilidad no especificada en Cisco Unified Intelligent Contact Management Enterprise (ICME), Unified ICM Hosted (ICMH), Unified Contact Center Enterprise (UCCE), Unified Contact Center Hosted (UCCH) y System Unified Contact Center Enterprise (SUCCE) versión 7.1 (5), permite a usuarios autenticados remotos alcanzar privilegios y leer reportes o cambiar la configuración de SUCCE, por medio de ciertas interfaces web, también se conoce como CSCsj55686. • http://osvdb.org/37938 http://secunia.com/advisories/27214 http://www.cisco.com/en/US/products/products_security_advisory09186a00808dda12.shtml http://www.securityfocus.com/bid/26106 http://www.securitytracker.com/id?1018829 http://www.vupen.com/english/advisories/2007/3533 https://exchange.xforce.ibmcloud.com/vulnerabilities/37248 •

CVSS: 5.0EPSS: 2%CPEs: 8EXPL: 0

The JTapi Gateway process in Cisco Unified Contact Center Enterprise, Unified Contact Center Hosted, IP Contact Center Enterprise, and Cisco IP Contact Center Hosted 5.0 through 7.1 allows remote attackers to cause a denial of service (repeated process restart) via a certain TCP session on the JTapi server port. El proceso JTapi Gateway en Cisco Unified Contact Center Enterprise, Unified Contact Center Hosted, IP Contact Center Enterprise, y Cisco IP Contact Center Hosted 5.0 hasta 7.1 permite a atacantes remotos provocar una denegación de servicio (repetición de reinicio de proceso) mediante sesiones concretas TCP en el puerto de servidor JTapi. • http://osvdb.org/32682 http://secunia.com/advisories/23710 http://securitytracker.com/id?1017499 http://www.cisco.com/warp/public/707/cisco-sa-20070110-jtapi.shtml http://www.securityfocus.com/bid/21988 http://www.vupen.com/english/advisories/2007/0138 •