Filtered by vendor Mitel
Subscriptions
Filtered by product Micollab
Subscriptions
Total
43 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-35286 | 1 Mitel | 1 Micollab | 2024-12-10 | 9.8 Critical |
A vulnerability in NuPoint Messenger (NPM) of Mitel MiCollab through 9.8.0.33 allows an unauthenticated attacker to conduct a SQL injection attack due to insufficient sanitization of user input. A successful exploit could allow an attacker to access sensitive information and execute arbitrary database and management operations. | ||||
CVE-2024-41713 | 1 Mitel | 1 Micollab | 2024-12-10 | 9.1 Critical |
A vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a path traversal attack, due to insufficient input validation. A successful exploit could allow unauthorized access, enabling the attacker to view, corrupt, or delete users' data and system configurations. | ||||
CVE-2024-30160 | 1 Mitel | 1 Micollab | 2024-12-06 | 4.8 Medium |
A vulnerability in the Suite Applications Services component of Mitel MiCollab through 9.7.1.110 could allow an authenticated attacker with administrative privileges to conduct a Stored Cross-Site Scripting (XSS) attack due to insufficient validation of user input. A successful exploit could allow an attacker to execute arbitrary scripts. | ||||
CVE-2024-30159 | 1 Mitel | 1 Micollab | 2024-12-06 | 4.8 Medium |
A vulnerability in the web conferencing component of Mitel MiCollab through 9.7.1.110 could allow an authenticated attacker with administrative privileges to conduct a Stored Cross-Site Scripting (XSS) attack due to insufficient validation of user input. A successful exploit could allow an attacker to execute arbitrary scripts. | ||||
CVE-2024-30157 | 1 Mitel | 1 Micollab | 2024-11-21 | 7.2 High |
A vulnerability in the Suite Applications Services component of Mitel MiCollab through 9.7.1.110 could allow an authenticated attacker with administrative privileges to conduct a SQL Injection attack due to insufficient validation of user input. A successful exploit could allow an attacker to execute arbitrary database and management operations. | ||||
CVE-2023-25597 | 1 Mitel | 1 Micollab | 2024-11-21 | 5.9 Medium |
A vulnerability in the web conferencing component of Mitel MiCollab through 9.6.2.9 could allow an unauthenticated attacker to download a shared file via a crafted request - including the exact path and filename - due to improper authentication control. A successful exploit could allow access to sensitive information. | ||||
CVE-2022-41326 | 1 Mitel | 1 Micollab | 2024-11-21 | 9.8 Critical |
The web conferencing component of Mitel MiCollab through 9.6.0.13 could allow an unauthenticated attacker to upload arbitrary scripts due to improper authorization controls. A successful exploit could allow remote code execution within the context of the application. | ||||
CVE-2022-36454 | 1 Mitel | 1 Micollab | 2024-11-21 | 6.5 Medium |
A vulnerability in the MiCollab Client API of Mitel MiCollab through 9.5.0.101 could allow an authenticated attacker to modify their profile parameters due to improper authorization controls. A successful exploit could allow the authenticated attacker to impersonate another user's name. | ||||
CVE-2022-36453 | 1 Mitel | 1 Micollab | 2024-11-21 | 8.8 High |
A vulnerability in the MiCollab Client API of Mitel MiCollab 9.1.3 through 9.5.0.101 could allow an authenticated attacker to modify their profile parameters due to improper authorization controls. A successful exploit could allow the authenticated attacker to control another extension number. | ||||
CVE-2022-36452 | 1 Mitel | 1 Micollab | 2024-11-21 | 9.8 Critical |
A vulnerability in the web conferencing component of Mitel MiCollab through 9.5.0.101 could allow an unauthenticated attacker to upload malicious files. A successful exploit could allow an attacker to execute arbitrary code within the context of the application. | ||||
CVE-2022-36451 | 1 Mitel | 1 Micollab | 2024-11-21 | 8.8 High |
A vulnerability in the MiCollab Client server component of Mitel MiCollab through 9.5.0.101 could allow an authenticated attacker to conduct a Server-Side Request Forgery (SSRF) attack due to insufficient restriction of URL parameters. A successful exploit could allow an attacker to leverage connections and permissions available to the host server. | ||||
CVE-2022-26143 | 1 Mitel | 2 Micollab, Mivoice Business Express | 2024-11-21 | 9.8 Critical |
The TP-240 (aka tp240dvr) component in Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Express through 8.1 allows remote attackers to obtain sensitive information and cause a denial of service (performance degradation and excessive outbound traffic). This was exploited in the wild in February and March 2022 for the TP240PhoneHome DDoS attack. | ||||
CVE-2021-32072 | 1 Mitel | 1 Micollab | 2024-11-21 | 6.5 Medium |
The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to get source code information (disclosing sensitive application data) due to insufficient output sanitization. A successful exploit could allow an attacker to view source code methods. | ||||
CVE-2021-32071 | 1 Mitel | 1 Micollab | 2024-11-21 | 9.8 Critical |
The MiCollab Client service in Mitel MiCollab before 9.3 could allow an unauthenticated user to gain system access due to improper access control. A successful exploit could allow an attacker to view and modify application data, and cause a denial of service for users. | ||||
CVE-2021-32070 | 1 Mitel | 1 Micollab | 2024-11-21 | 5.4 Medium |
The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to perform a clickjacking attack due to an insecure header response. A successful exploit could allow an attacker to modify the browser header and redirect users. | ||||
CVE-2021-32069 | 1 Mitel | 1 Micollab | 2024-11-21 | 4.8 Medium |
The AWV component of Mitel MiCollab before 9.3 could allow an attacker to perform a Man-In-the-Middle attack due to improper TLS negotiation. A successful exploit could allow an attacker to view and modify data. | ||||
CVE-2021-32068 | 1 Mitel | 1 Micollab | 2024-11-21 | 3.7 Low |
The AWV and MiCollab Client Service components in Mitel MiCollab before 9.3 could allow an attacker to perform a Man-In-the-Middle attack by sending multiple session renegotiation requests, due to insufficient TLS session controls. A successful exploit could allow an attacker to modify application data and state. | ||||
CVE-2021-32067 | 1 Mitel | 1 Micollab | 2024-11-21 | 6.5 Medium |
The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to view sensitive system information through an HTTP response due to insufficient output sanitization. | ||||
CVE-2021-27402 | 1 Mitel | 1 Micollab | 2024-11-21 | 6.5 Medium |
The SAS Admin portal of Mitel MiCollab before 9.2 FP2 could allow an unauthenticated attacker to access (view and modify) user data by injecting arbitrary directory paths due to improper URL validation, aka Directory Traversal. | ||||
CVE-2021-27401 | 1 Mitel | 1 Micollab | 2024-11-21 | 6.1 Medium |
The Join Meeting page of Mitel MiCollab Web Client before 9.2 FP2 could allow an attacker to access (view and modify) user data by executing arbitrary code due to insufficient input validation, aka Cross-Site Scripting (XSS). |