Vulnerabilities > Mitel > Micollab > High

DATE CVE VULNERABILITY TITLE RISK
2024-10-21 CVE-2024-30157 SQL Injection vulnerability in Mitel Micollab
A vulnerability in the Suite Applications Services component of Mitel MiCollab through 9.7.1.110 could allow an authenticated attacker with administrative privileges to conduct a SQL Injection attack due to insufficient validation of user input.
network
low complexity
mitel CWE-89
7.2
2024-10-21 CVE-2024-30158 SQL Injection vulnerability in Mitel Micollab
A vulnerability in the web conferencing component of Mitel MiCollab through 9.7.1.110 could allow an authenticated attacker with administrative privileges to conduct a SQL Injection attack due to insufficient validation of user input.
network
low complexity
mitel CWE-89
7.2
2022-10-25 CVE-2022-36451 Server-Side Request Forgery (SSRF) vulnerability in Mitel Micollab
A vulnerability in the MiCollab Client server component of Mitel MiCollab through 9.5.0.101 could allow an authenticated attacker to conduct a Server-Side Request Forgery (SSRF) attack due to insufficient restriction of URL parameters.
network
low complexity
mitel CWE-918
8.8
2022-10-25 CVE-2022-36453 Unspecified vulnerability in Mitel Micollab
A vulnerability in the MiCollab Client API of Mitel MiCollab 9.1.3 through 9.5.0.101 could allow an authenticated attacker to modify their profile parameters due to improper authorization controls.
network
low complexity
mitel
8.8
2020-12-18 CVE-2020-25608 SQL Injection vulnerability in Mitel Micollab
The SAS portal of Mitel MiCollab before 9.2 could allow an attacker to access user credentials due to improper input validation, aka SQL Injection.
network
low complexity
mitel CWE-89
7.2
2020-08-26 CVE-2020-13863 Injection vulnerability in Mitel Micollab
The SAS portal of Mitel MiCollab before 9.1.3 could allow an attacker to access user data by performing a header injection in HTTP responses, due to the improper handling of input parameters.
network
low complexity
mitel CWE-74
8.1
2014-04-07 CVE-2014-0160 Out-of-bounds Read vulnerability in multiple products
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
7.5