Page 6 of 28 results (0.030 seconds)

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

A vulnerability in the web conference chat component of MiCollab, versions 7.3 PR6 (7.3.0.601) and earlier, and 8.0 (8.0.0.40) through 8.0 SP2 FP2 (8.0.2.202), and MiVoice Business Express versions 7.3 PR3 (7.3.1.302) and earlier, and 8.0 (8.0.0.40) through 8.0 SP2 FP1 (8.0.2.202), could allow creation of unauthorized chat sessions, due to insufficient access controls. A successful exploit could allow execution of arbitrary commands. Una vulnerabilidad en el componente de chat de conferencia web de MiCollab, versiones 7.3 PR6 (7.3.0.601) y anteriores, y versiones 8.0 (8.0.0.40) hasta 8.0 SP2 FP2 (8.0.2.202), y MiVoice Business Express versiones 7.3 PR3 (7.3.1.302 ) y anteriores, y versiones 8.0 (8.0.0.40) hasta 8.0 SP2 FP1 (8.0.2.202), podrían permitir la creación de sesiones de chat no autorizadas, debido a controles de acceso insuficientes. Una explotación con éxito podría permitir la ejecución de comandos arbitrarios. • https://www.mitel.com/support/security-advisories https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-18-0012 • CWE-863: Incorrect Authorization •

CVSS: 10.0EPSS: 0%CPEs: 8EXPL: 0

MiCollab 7.3 PR2 (7.3.0.204) and earlier, 7.2 (7.2.2.13) and earlier, and 7.1 (7.1.0.57) and earlier and MiCollab AWV 6.3 (6.3.0.103), 6.2 (6.2.2.8), 6.1 (6.1.0.28), 6.0 (6.0.0.61), and 5.0 (5.0.5.7) have a Command Execution Vulnerability. Successful exploit of this vulnerability could allow an attacker to execute arbitrary system commands. MiCollab versión 7.3 PR2 (7.3.0.204) y anteriores, versión 7.2 (7.2.2.13) y anteriores, y versión 7.1 (7.1.0.57) y anteriores y MiCollab AWV versión 6.3 (6.3.0.103), versión 6.2 (6.2.2.8), versión 6.1 (6.1. 0.28), versión 6.0 (6.0.0.61) y versión 5.0 (5.0.5.7), presentan una vulnerabilidad de ejecución de comandos. La explotación con éxito de esta vulnerabilidad permitiría a un atacante ejecutar comandos de sistema arbitrarios. • https://www.mitel.com/-/media/mitel/pdf/content-entry-pdf/en-security-bulletin-17-0010-004.pdf •

CVSS: 7.5EPSS: 97%CPEs: 54EXPL: 16

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. Las implementaciones de (1) TLS y (2) DTLS en OpenSSL 1.0.1 en versiones anteriores a 1.0.1g no manejan adecuadamente paquetes Heartbeat Extension, lo que permite a atacantes remotos obtener información sensible desde la memoria de proceso a través de paquetes manipulados que desencadenan una sobrelectura del buffer, según lo demostrado mediante la lectura de claves privadas, relacionado con d1_both.c y t1_lib.c, también conocido como bug Heartbleed. An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. Note that the disclosed portions of memory could potentially include sensitive information such as private keys. • https://www.exploit-db.com/exploits/32764 https://www.exploit-db.com/exploits/32791 https://www.exploit-db.com/exploits/32998 https://www.exploit-db.com/exploits/32745 https://github.com/0x90/CVE-2014-0160 https://github.com/jdauphant/patch-openssl-CVE-2014-0160 https://github.com/caiqiqi/OpenSSL-HeartBleed-CVE-2014-0160-PoC https://github.com/obayesshelton/CVE-2014-0160-Scanner https://github.com/MrE-Fog/CVE-2014-0160-Chrome-Plugin https://github.com/Xyl2k/CVE-2014&# • CWE-125: Out-of-bounds Read CWE-201: Insertion of Sensitive Information Into Sent Data •