Vulnerabilities (CVE)

Filtered by vendor Al-enterprise Subscribe
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2007-3010 1 Al-enterprise 1 Omnipcx Enterprise Communication Server 2024-07-02 10.0 HIGH 9.8 CRITICAL
masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server R7.1 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the user parameter during a ping action.
CVE-2019-20048 1 Al-enterprise 1 Omnivista 8770 2024-02-28 9.0 HIGH 7.2 HIGH
An issue was discovered on Alcatel-Lucent OmniVista 8770 devices before 4.1.2. An authenticated remote attacker, with elevated privileges in the Web Directory component on port 389, may upload a PHP file to achieve Remote Code Execution as SYSTEM.
CVE-2019-20049 1 Al-enterprise 1 Omnivista 4760 2024-02-28 10.0 HIGH 9.8 CRITICAL
An issue was discovered on Alcatel-Lucent OmniVista 4760 devices. A remote unauthenticated attacker can chain a directory traversal (which helps to bypass authentication) with an insecure file upload to achieve Remote Code Execution as SYSTEM. The directory traversal is in the __construct() whereas the insecure file upload is in SetSkinImages().
CVE-2019-20047 1 Al-enterprise 2 Omnivista 4760, Omnivista 8770 2024-02-28 5.0 MEDIUM 7.5 HIGH
An issue was discovered on Alcatel-Lucent OmniVista 4760 devices, and 8770 devices before 4.1.2. An incorrect web server configuration allows a remote unauthenticated attacker to retrieve the content of its own session files. Every session file contains the administrative LDAP credentials encoded in a reversible format. Sessions are stored in /sessions/sess_<sessionid>.
CVE-2019-14260 1 Al-enterprise 2 8008, 8008 Firmware 2024-02-28 7.7 HIGH 8.0 HIGH
On the Alcatel-Lucent Enterprise (ALE) 8008 Cloud Edition Deskphone VoIP phone with firmware 1.50.13, a command injection (missing input validation) issue in the password change field for the Change Password interface allows an authenticated remote attacker in the same network to trigger OS commands via shell commands in a POST request.