Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 313,825
With exploit
cisco / unified_communications_manager
You can search for specific versions with
https://synscan.net/product/unified_communications_manager/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2013-1133
High
Feb 27, 2013
== 8.6(1)
== 8.6(2a)su1
== 8.6(2)
== 8.6(4)
== 8.6(2a)
== 8.6
== 8.6(1a)
== 9.0(1)
CVE-2013-1134
High
Feb 27, 2013
== 9.0(1)
CVE-2012-3949
High
Sep 27, 2012
== 6.0(1a)
== 6.0(1b)
== 6.1(1)
== 6.1(1a)
== 6.1(1b)
== 6.1(2)
== 6.1(3)
== 6.1(3a)
== 6.1(3b)
== 6.1(4)
== 6.1(4a)
== 6.1(4b)
== 6.1(5)
== 7.1(1)
== 7.1(2)
== 7.1(2a)
== 7.1(2b)
== 7.1(3)
== 7.1(3a)
== 7.1(3b)
== 7.1(5)
== 7.1(5a)
== 7.1(5b)
== 7.1(5b)su1
== 7.1(5b)su1a
== 7.1(5b)su2
== 7.1(5b)su3
== 7.1(5b)su4
== 8.0
== 8.0(1)
== 8.0(2)
== 8.0(2a)
== 8.0(2b)
== 8.0(2c)
== 8.0(3)
== 8.0(3a)
== 8.5(1)su1
== 8.5(1)su2
== 8.5(1)su3
CVE-2012-0376
Medium
May 3, 2012
== 8.5
CVE-2011-4019
Medium
May 3, 2012
== 7.1(2b)su1
== 7.1(2b)
== 7.1(5b)su4
== 7.1(3b)
== 7.1
== 7.1(2a)su1
== 7.1(3b)su1
== 7.1(3a)su1a
== 7.1(5b)su1
== 7.1(5b)su3
== 7.1(3)
== 7.1(2a)
== 7.1(5b)
== 7.0(2a)
== 7.0(1)su1
== 7.0(1)su1a
== 7.0(1)
== 7.1(5b)su2
== 7.1(5)
== 7.1(5a)
== 7.0(2a)su2
== 7.1(5b)su1a
== 7.1(5)su1a
== 7.0_base
== 7.1(5)su1
== 7.0
== 7.1(3a)
== 7.1(5b)su5
== 7.1_base
== 7.0(2a)su1
== 7.1(3a)su1
== 7.0(2)
== 7.1(3b)su2
CVE-2011-4486
High
Mar 1, 2012
== 6.0
== 6.0(1)
== 6.0(1a)
== 6.0(1b)
== 6.1(1)
== 6.1(1a)
== 6.1(1b)
== 6.1(2)
== 6.1(2)su1
== 6.1(2)su1a
== 6.1(3)
== 6.1(3a)
== 6.1(3b)
== 6.1(3b)su1
== 6.1(4)
== 6.1(4)su1
== 6.1(4a)
== 6.1(4a)su2
== 6.1(5)
== 6.1(5)su1
== 6.1(5)su2
== 6.1(5)su3
== 7.0(1)su1
== 7.0(1)su1a
== 7.0(2)
== 7.0(2a)
== 7.0(2a)su1
== 7.0(2a)su2
== 7.1(2a)
== 7.1(2a)su1
== 7.1(2b)
== 7.1(2b)su1
== 7.1(3)
== 7.1(3a)
== 7.1(3a)su1
== 7.1(3a)su1a
== 7.1(3b)
== 7.1(3b)su1
== 7.1(3b)su2
== 7.1(5)
== 7.1(5)su1
== 7.1(5)su1a
== 7.1(5a)
== 7.1(5b)
== 7.1(5b)su1
== 7.1(5b)su1a
== 7.1(5b)su2
== 7.1(5b)su3
== 7.1(5b)su4
== 8.0
== 8.0(1)
== 8.0(2)
== 8.0(2a)
== 8.0(2b)
== 8.0(2c)
== 8.0(2c)su1
== 8.0(3)
== 8.0(3a)
== 8.0(3a)su1
== 8.0(3a)su2
== 8.5
== 8.5(1)
== 8.5(1)su1
== 8.5(1)su2
== 8.5(1)su3
== 8.6
== 8.6(1)
== 8.6(1a)
== 8.6(2)
== 8.6(2a)
CVE-2011-4487
Medium
Mar 1, 2012
== 6.0
== 6.0(1)
== 6.0(1a)
== 6.0(1b)
== 6.1(1)
== 6.1(1a)
== 6.1(1b)
== 6.1(2)
== 6.1(2)su1
== 6.1(2)su1a
== 6.1(3)
== 6.1(3a)
== 6.1(3b)
== 6.1(3b)su1
== 6.1(4)
== 6.1(4)su1
== 6.1(4a)
== 6.1(4a)su2
== 6.1(5)
== 6.1(5)su1
== 6.1(5)su2
== 6.1(5)su3
== 7.0(1)su1
== 7.0(1)su1a
== 7.0(2)
== 7.0(2a)
== 7.0(2a)su1
== 7.0(2a)su2
== 7.1(2a)
== 7.1(2a)su1
== 7.1(2b)
== 7.1(2b)su1
== 7.1(3)
== 7.1(3a)
== 7.1(3a)su1
== 7.1(3a)su1a
== 7.1(3b)
== 7.1(3b)su1
== 7.1(3b)su2
== 7.1(5)
== 7.1(5)su1
== 7.1(5)su1a
== 7.1(5a)
== 7.1(5b)
== 7.1(5b)su1
== 7.1(5b)su1a
== 7.1(5b)su2
== 7.1(5b)su3
== 7.1(5b)su4
== 8.0
== 8.0(1)
== 8.0(2)
== 8.0(2a)
== 8.0(2b)
== 8.0(2c)
== 8.0(2c)su1
== 8.0(3)
== 8.0(3a)
== 8.0(3a)su1
== 8.0(3a)su2
== 8.5
== 8.5(1)
== 8.5(1)su1
== 8.5(1)su2
== 8.5(1)su3
== 8.6
== 8.6(1)
== 8.6(1a)
== 8.6(2)
== 8.6(2a)
CVE-2011-0941
High
Nov 1, 2011
== 6.1(3a)
== 8.0(2c)
== 6.1(2)
== 6.1(3b)su1
== 7.1(2b)su1
== 8.0(2)
== 7.1(2b)
== 6.1(2)su1a
== 7.1(3b)
== 6.1(4)su1
== 8.0(2b)
== 6.1(4)
== 7.1(2a)su1
== 7.1(3b)su1
== 7.1(3a)su1a
== 7.1(5b)su1
== 6.1(5)su1
== 6.1(4a)
== 6.1(3)
== 7.1(3)
== 6.1(4a)su2
== 7.1(2a)
== 6.1(1)
== 7.1(5b)
== 7.0(2a)
== 8.0
== 7.0(1)su1
== 7.0(1)su1a
== 7.1(5b)su2
== 7.1(5)
== 7.1(5a)
== 6.1(1b)
== 6.1(3b)
== 7.0(2a)su2
== 6.1(5)
== 7.1(5b)su1a
== 7.1(5)su1a
== 8.0(2a)
== 8.5
== 7.1(5)su1
== 8.0(3a)
== 7.1(3a)
== 6.1(2)su1
== 7.0(2a)su1
== 7.1(3a)su1
== 6.0
== 8.0(2c)su1
== 6.1(1a)
== 7.0(2)
== 8.0(1)
== 7.1(3b)su2
CVE-2011-3315
High
Oct 27, 2011
== 5.1(3e)
== 6.1(3a)
== 8.0(2c)
== 5.1(3c)
== 6.1(2)
== 5.1(2a)
== 6.1(3b)su1
== 7.1(2b)su1
== 8.0(2)
== 5.1(1b)
== 7.1(2b)
== 5.1(1c)
== 6.1(2)su1a
== 5.1(2)
== 7.1(3b)
== 6.1(4)su1
== 8.0(2b)
== 6.1(4)
== 5.0
== 7.1(2a)su1
== 7.1(3b)su1
== 7.1(3a)su1a
== 7.1(5b)su1
== 6.1(5)su1
== 5.1(2b)
== 6.1(4a)
== 6.1(3)
== 7.1(3)
== 6.1(4a)su2
== 7.1(2a)
== 6.1(1)
== 7.1(5b)
== 5.1(3d)
== 5.1.2
== 7.0(2a)
== 8.0
== 7.0(1)su1
== 7.0(1)su1a
== 7.1(5)
== 7.1(5a)
== 6.1(1b)
== 6.1(3b)
== 7.0(2a)su2
== 5.1(3)
== 6.1(5)
== 7.1(5b)su1a
== 7.1(5)su1a
== 8.0(2a)
== 7.1(5)su1
== 5.1(1)
== 7.1(3a)
== 6.1(2)su1
== 7.0(2a)su1
== 5.1(3a)
== 7.1(3a)su1
== 6.0
== 5.1
== 8.0(2c)su1
== 6.1(1a)
== 7.0(2)
== 8.0(1)
== 7.1(3b)su2
CVE-2011-2072
High
Oct 3, 2011
== 6.0
== 6.1(1)
== 6.1(1a)
== 6.1(1b)
== 6.1(2)
== 6.1(2)su1
== 6.1(2)su1a
== 6.1(3)
== 6.1(3a)
== 6.1(3b)
== 6.1(3b)su1
== 6.1(4)
== 6.1(4)su1
== 6.1(4a)
== 6.1(4a)su2
== 6.1(5)
== 6.1(5)su1
== 6.1(5)su2
== 7.0(1)su1
== 7.0(1)su1a
== 7.0(2)
== 7.0(2a)
== 7.0(2a)su1
== 7.0(2a)su2
== 7.1(2a)
== 7.1(2a)su1
== 7.1(2b)
== 7.1(2b)su1
== 7.1(3)
== 7.1(3a)
== 7.1(3a)su1
== 7.1(3a)su1a
== 7.1(3b)
== 7.1(3b)su1
== 7.1(3b)su2
== 7.1(5)
== 7.1(5)su1
== 7.1(5)su1a
== 7.1(5a)
== 7.1(5b)
== 7.1(5b)su1
== 7.1(5b)su1a
== 7.1(5b)su2
== 7.1(5b)su3
== 8.0(1)
== 8.0(2)
== 8.0(2a)
== 8.0(2b)
== 8.0(2c)
== 8.0(2c)su1
== 8.0(3)
== 8.0(3a)
== 8.0(3a)su1
== 8.0(3a)su2
== 8.5(1)
== 8.5(1)su1
== 8.6
‹
›
‹
1
2
...
17
18
19
...
23
24
›