Nortel

Mobile Voice Client 2050

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 11.67%
  • Published 23.10.2007 17:46:00
  • Last modified 09.04.2025 00:30:58

The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and additional Nortel products from the IP Phone, Business Communications Manager (BCM), and other product lines allow remote attackers to eavesdrop on the physical environment via an Open Audio S...

Exploit
  • EPSS 0.59%
  • Published 23.10.2007 17:46:00
  • Last modified 09.04.2025 00:30:58

The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and additional Nortel products from the IP Phone, Business Communications Manager (BCM), and other product lines, use only 65536 different values in the 32-bit ID number field of an RUDP datagram,...

Exploit
  • EPSS 1.27%
  • Published 23.10.2007 17:46:00
  • Last modified 09.04.2025 00:30:58

The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and other Nortel IP Phone, Mobile Voice Client, and WLAN Handsets products allow remote attackers to cause a denial of service (device hang) via a flood of Mute and UnMute messages that have a spo...

Exploit
  • EPSS 1.17%
  • Published 23.10.2007 17:46:00
  • Last modified 09.04.2025 00:30:58

The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and additional Nortel products from the IP Phone, Business Communications Manager (BCM), Mobile Voice Client, and other product lines, allow remote attackers to block calls and force re-registrati...

Exploit
  • EPSS 35.5%
  • Published 15.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

The DHTML Edit Control (dhtmled.ocx) allows remote attackers to inject arbitrary web script into other domains by setting a name for a window, opening a child page whose target is the window with the given name, then injecting the script from the par...

Exploit
  • EPSS 45.43%
  • Published 18.08.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

Internet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities ...