Unspecified vulnerability in the HTTP management interface in Cisco Unity Express (CUE) 2.2(2) and earlier, when running on any CUE Advanced Integration Module (AIM) or Network Module (NM), allows remote authenticated attackers to reset the password for any user with an expired password.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/19881 - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1016015 - | |
References | () http://www.cisco.com/warp/public/707/cisco-sa-20060501-cue.shtml - Vendor Advisory | |
References | () http://www.osvdb.org/25165 - | |
References | () http://www.securityfocus.com/bid/17775 - | |
References | () http://www.vupen.com/english/advisories/2006/1613 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26165 - |
Information
Published : 2006-05-04 12:38
Updated : 2024-11-21 00:10
NVD link : CVE-2006-2166
Mitre link : CVE-2006-2166
CVE.ORG link : CVE-2006-2166
JSON object : View
Products Affected
cisco
- unity_express
- unity_express_software
CWE