You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"description": "This module attempts to authenticate to an Asterisk Manager service. Please note\n that by default, Asterisk Call Management (port 5038) only listens locally, but\n this can be manually configured in file /etc/asterisk/manager.conf by the admin\n on the victim machine.",
55790
+
"description": "This module attempts to authenticate to an Asterisk Manager service. Please note\n that by default, Asterisk Call Management (port 5038) only listens locally, but\n this can be manually configured in file /etc/asterisk/manager.conf by the admin\n on the victim machine.",
"description": "The BVSMWeb portal in the web framework in Cisco Unified Communications Domain Manager\n (CDM) 10 does not properly implement access control, which allows remote attackers to\n modify user information. This module exploits the vulnerability to configure unauthorized\n call forwarding.",
55830
+
"description": "The BVSMWeb portal in the web framework in Cisco Unified Communications Domain Manager\n (CDM) 10 does not properly implement access control, which allows remote attackers to\n modify user information. This module exploits the vulnerability to configure unauthorized\n call forwarding.",
"description": "The BVSMWeb portal in the web framework in Cisco Unified Communications Domain Manager\n (CDM), before version 10, doesn't implement access control properly, which allows remote\n attackers to modify user information. This module exploits the vulnerability to make\n unauthorized speed dial entity manipulations.",
55893
+
"description": "The BVSMWeb portal in the web framework in Cisco Unified Communications Domain Manager\n (CDM), before version 10, doesn't implement access control properly, which allows remote\n attackers to modify user information. This module exploits the vulnerability to make\n unauthorized speed dial entity manipulations.",
"description": "This module allows an unauthenticated attacker to exercise the\n \"Lock\" and \"Unlock\" functionality of Telisca IPS Lock for Cisco IP\n Phones. This module should be run in the VoIP VLAN, and requires\n knowledge of the target phone's name (for example, SEP002497AB1D4B).\n\n Set ACTION to either LOCK or UNLOCK. UNLOCK is the default.",
56003
-
"references": [],
56040
+
"description": "This module allows an unauthenticated attacker to exercise the\n \"Lock\" and \"Unlock\" functionality of Telisca IPS Lock for Cisco IP\n Phones. This module should be run in the VoIP VLAN, and requires\n knowledge of the target phone's name (for example, SEP002497AB1D4B).\n\n Set ACTION to either LOCK or UNLOCK. UNLOCK is the default.",
0 commit comments