Mitel MiCollab 漏洞列表
共找到 9 个与 Mitel MiCollab 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2020-11798: Mitel MiCollab AWV 8.1.2.4 and 9.1.3 - Directory Traversal POC
A Directory Traversal vulnerability in the web conference component of Mitel MiCollab AWV before 8.1.2.4 and 9.x before 9.1.3 could allow an attacker to access arbitrary files from restricted directories of the server via a crafted URL, due to insufficient access validation. A successful exploit could allow an attacker to access sensitive information from the restricted directories. -
CVE-2024-41713: Mitel MiCollab - Authentication Bypass POC
A vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a path traversal attack, due to insufficient input validation. A successful exploit could allow unauthorized access, enabling the attacker to view, corrupt, or delete users' data and system configurations. -
CVE-2024-55550: Mitel MiCollab - Arbitary File Read POC
The Mitel Collab Arbitrary File Read vulnerability allows an unauthenticated attacker to read arbitrary files from the underlying file system on a Mitel Collab server. Exploiting this flaw involves sending specially crafted requests to the server, bypassing access controls and allowing the attacker to retrieve sensitive files. -
CVE-2020-11798: Mitel MiCollab AWV 8.1.2.4 and 9.1.3 - Directory Traversal POC
A Directory Traversal vulnerability in the web conference component of Mitel MiCollab AWV before 8.1.2.4 and 9.x before 9.1.3 could allow an attacker to access arbitrary files from restricted directories of the server via a crafted URL, due to insufficient access validation. A successful exploit could allow an attacker to access sensitive information from the restricted directories. -
CVE-2024-41713: Mitel MiCollab - Authentication Bypass POC
A vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a path traversal attack, due to insufficient input validation. A successful exploit could allow unauthorized access, enabling the attacker to view, corrupt, or delete users' data and system configurations. -
CVE-2024-55550: Mitel MiCollab - Arbitary File Read POC
The Mitel Collab Arbitrary File Read vulnerability allows an unauthenticated attacker to read arbitrary files from the underlying file system on a Mitel Collab server. Exploiting this flaw involves sending specially crafted requests to the server, bypassing access controls and allowing the attacker to retrieve sensitive files. -
Mitel MiCollab /npm-pwg/..;/ReconcileWizard/reconcilewizard/sc/IDACall 文件读取漏洞(CVE-2024-41713) 无POC
Mitel MiCollab 是加拿大 Mitel 公司推出的一款企业级协作平台。该漏洞存在于 MiCollab 的 NuPoint 统一消息 (NPM) 组件中,由于身份验证绕过和输入验证不足,未经身份验证的远程攻击者可以通过路径遍历攻击读取任意文件。成功利用可能导致未授权访问、破坏或删除用户的数据和系统配置。 -
Mitel MiCollab 协作平台 存在任意文件读取漏洞(CVE-2024-41713) 无POC
Mitel MiCollab是一个企业协作平台,它将各种通信工具整合到一个应用程序中,提供语音和视频通话、消息传递、状态信息、音频会议、移动支持和团队协作功能。该软件的 NuPoint统一消息 (NPM)组件中存在身份验证绕过漏洞,由于输入验证不足,未经身份验证的远程攻击者可利用该漏洞执行路径遍历攻击,成功利用可能导致未授权访问、破坏或删除用户的数据和系统配置 -
Mitel MiCollab SQL 注入漏洞 无POC
Mitel MiCollab SQL 注入漏洞