A vulnerability in the Desktop Client of Mitel MiCollab through 9.7.1.110, and MiVoice Business Solution Virtual Instance (MiVB SVI) 1.0.0.25, could allow an unauthenticated attacker to conduct a command injection attack due to insufficient parameter sanitization. A successful exploit requires user interaction and could allow an attacker to execute arbitrary scripts.
Metrics
Affected Vendors & Products
References
History
Fri, 08 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the Desktop Client of Mitel MiCollab through 9.7.1.110, and MiVoice Business Solution Virtual Instance (MiVB SVI) 1.0.0.25, could allow an unauthenticated attacker to conduct a command injection attack due to insufficient parameter sanitization. A successful exploit could allow an attacker to execute arbitrary scripts. | A vulnerability in the Desktop Client of Mitel MiCollab through 9.7.1.110, and MiVoice Business Solution Virtual Instance (MiVB SVI) 1.0.0.25, could allow an unauthenticated attacker to conduct a command injection attack due to insufficient parameter sanitization. A successful exploit requires user interaction and could allow an attacker to execute arbitrary scripts. |
References |
|
Tue, 22 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mitel
Mitel micollab Mitel mivoice Business Solutions Virtual Instance |
|
Weaknesses | CWE-94 | |
CPEs | cpe:2.3:a:mitel:micollab:-:*:*:*:*:-:*:* cpe:2.3:a:mitel:mivoice_business_solutions_virtual_instance:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Mitel
Mitel micollab Mitel mivoice Business Solutions Virtual Instance |
|
Metrics |
cvssV3_1
|
Mon, 21 Oct 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the Desktop Client of Mitel MiCollab through 9.7.1.110, and MiVoice Business Solution Virtual Instance (MiVB SVI) 1.0.0.25, could allow an unauthenticated attacker to conduct a command injection attack due to insufficient parameter sanitization. A successful exploit could allow an attacker to execute arbitrary scripts. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-10-21T00:00:00
Updated: 2024-11-08T17:56:14.690391
Reserved: 2024-05-17T00:00:00
Link: CVE-2024-35314
Vulnrichment
Updated: 2024-10-22T13:52:47.448Z
NVD
Status : Awaiting Analysis
Published: 2024-10-21T21:15:05.533
Modified: 2024-11-08T18:15:16.867
Link: CVE-2024-35314
Redhat
No data.