Cisco

Unity Server

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 80.86%
  • Veröffentlicht 31.05.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes ...

  • EPSS 0.78%
  • Veröffentlicht 15.12.2004 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Cisco Unity 2.x, 3.x, and 4.x, when integrated with Microsoft Exchange, has several hard coded usernames and passwords, which allows remote attackers to gain unauthorized access and change configuration settings or read outgoing or incoming e-mail me...

  • EPSS 0.72%
  • Veröffentlicht 28.10.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Cisco Unity 2.x and 3.x uses well-known default user accounts, which could allow remote attackers to gain access and place arbitrary calls.

  • EPSS 0.08%
  • Veröffentlicht 11.10.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The default configuration of Cisco Unity 2.x and 3.x does not block international operator calls in the predefined restriction tables, which could allow authenticated users to place international calls using call forwarding.