Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 313,825
With exploit
cisco / unified_communications_manager
You can search for specific versions with
https://synscan.net/product/unified_communications_manager/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2011-1643
High
Aug 29, 2011
== 6.0
== 6.1(1)
== 6.1(1a)
== 6.1(1b)
== 6.1(2)
== 6.1(2)su1
== 6.1(2)su1a
== 6.1(3)
== 6.1(3a)
== 6.1(3b)
== 6.1(3b)su1
== 6.1(4)
== 6.1(4)su1
== 6.1(4a)
== 6.1(4a)su2
== 6.1(5)
== 6.1(5)su1
== 6.1(5)su2
== 7.0(1)su1
== 7.0(1)su1a
== 7.0(2)
== 7.0(2a)
== 7.0(2a)su1
== 7.0(2a)su2
== 7.1(2a)
== 7.1(2a)su1
== 7.1(2b)
== 7.1(2b)su1
== 7.1(3)
== 7.1(3a)
== 7.1(3a)su1
== 7.1(3a)su1a
== 7.1(3b)
== 7.1(3b)su1
== 7.1(3b)su2
== 7.1(5)
== 7.1(5)su1
== 7.1(5)su1a
== 7.1(5a)
== 7.1(5b)
== 7.1(5b)su1
== 7.1(5b)su1a
== 7.1(5b)su2
== 7.1(5b)su3
== 8.0
== 8.5
== 8.5(1)
== 8.5(1)su1
CVE-2011-2560
High
Aug 29, 2011
== 4.2.3sr2
== 4.1(3)sr1
== 4.2.3sr1
== 4.1(3)sr2
== 4.1(3)
== 4.2
== 4.3
== 4.2.3
== 4.1(3)sr4
== 4.2.1
== 4.2.2
== 4.3(1)
== 4.1(3)sr3
== 4.2.3sr2b
CVE-2011-2561
High
Aug 29, 2011
== 7.1(2b)su1
== 7.1(2b)
== 7.1(3b)
== 7.1(2a)su1
== 7.1(3b)su1
== 7.1(3a)su1a
== 7.1(5b)su1
== 7.1(5b)su3
== 7.1(3)
== 7.1(2a)
== 7.1(5b)
== 7.0(2a)
== 8.0
== 7.0(1)su1
== 7.0(1)su1a
== 7.1(5b)su2
== 7.1(5)
== 7.1(5a)
== 7.0(2a)su2
== 7.1(5b)su1a
== 7.1(5)su1a
== 7.1(5)su1
== 7.1(3a)
== 7.0(2a)su1
== 7.1(3a)su1
== 7.0(2)
== 7.1(3b)su2
CVE-2011-2562
High
Aug 29, 2011
== 6.1(3a)
== 8.0(2c)
== 6.1(2)
== 6.1(3b)su1
== 7.1(2b)su1
== 7.1(2b)
== 6.1(2)su1a
== 7.1(3b)
== 6.1(4)su1
== 6.1(4)
== 7.1(2a)su1
== 7.1(3b)su1
== 7.1(3a)su1a
== 7.1(5b)su1
== 6.1(5)su1
== 6.1(4a)
== 6.1(3)
== 7.1(3)
== 6.1(4a)su2
== 7.1(2a)
== 6.1(1)
== 7.1(5b)
== 7.0(2a)
== 8.0
== 7.0(1)su1
== 7.0(1)su1a
== 7.1(5b)su2
== 7.1(5)
== 7.1(5a)
== 6.1(1b)
== 6.1(3b)
== 7.0(2a)su2
== 6.1(5)
== 8.0(3)
== 7.1(5b)su1a
== 7.1(5)su1a
== 8.5
== 7.1(5)su1
== 8.0(3a)
== 7.1(3a)
== 6.1(2)su1
== 7.0(2a)su1
== 7.1(3a)su1
== 6.0
== 8.0(2c)su1
== 6.1(1a)
== 7.0(2)
== 7.1(3b)su2
CVE-2011-2563
High
Aug 29, 2011
== 8.0(2c)
== 8.0(3a)su2
== 8.0
== 8.0(3)
== 8.5
== 8.0(3a)
== 8.0(2c)su1
== 8.0(1)
== 8.0(3a)su1
CVE-2011-2564
High
Aug 29, 2011
== 8.0(2c)
== 8.0(3a)su2
== 8.0
== 8.0(3)
== 8.5
== 8.0(3a)
== 8.0(2c)su1
== 8.0(1)
== 8.0(3a)su1
CVE-2011-1604
High
May 3, 2011
== 6.1(3a)
== 6.1(2)
== 6.1(3b)su1
== 6.1(2)su1a
== 6.1(4)su1
== 6.1(4)
== 6.1(5)su1
== 6.1(4a)
== 6.1(5)su2
== 6.1(3)
== 6.1(4a)su2
== 6.1(1)
== 6.1(1b)
== 6.1(3b)
== 6.1(5)
== 6.1(2)su1
== 6.0
== 6.1(1a)
== 7.1(2b)su1
== 7.1(2b)
== 7.1(3b)
== 7.1(2a)su1
== 7.1(3b)su1
== 7.1(3a)su1a
== 7.1(3)
== 7.1(2a)
== 7.1(5b)
== 7.0(2a)
== 7.0(1)su1
== 7.0(1)su1a
== 7.1(5b)su2
== 7.1(5)
== 7.1(5a)
== 7.0(2a)su2
== 7.1(5)su1a
== 7.1(5)su1
== 7.1(3a)
== 7.0(2a)su1
== 7.1(3a)su1
== 7.0(2)
== 7.1(3b)su2
== 8.0(2c)
== 8.0(3)
== 8.5
== 8.0(3a)
== 8.0(2c)su1
== 8.0(3a)su1
CVE-2011-1605
High
May 3, 2011
== 6.1(3a)
== 6.1(2)
== 6.1(3b)su1
== 6.1(2)su1a
== 6.1(4)su1
== 6.1(4)
== 6.1(5)su1
== 6.1(4a)
== 6.1(3)
== 6.1(4a)su2
== 6.1(1)
== 6.1(1b)
== 6.1(3b)
== 6.1(5)
== 6.1(2)su1
== 6.0
== 6.1(1a)
== 7.1(2b)su1
== 7.1(2b)
== 7.1(3b)
== 7.1(2a)su1
== 7.1(3b)su1
== 7.1(3a)su1a
== 7.1(3)
== 7.1(2a)
== 7.1(5b)
== 7.0(2a)
== 7.0(1)su1
== 7.0(1)su1a
== 7.1(5)
== 7.1(5a)
== 7.0(2a)su2
== 7.1(5)su1a
== 7.1(5)su1
== 7.1(3a)
== 7.0(2a)su1
== 7.1(3a)su1
== 7.0(2)
== 7.1(3b)su2
== 8.0(2c)
== 8.0(3a)su2
== 8.0(3)
== 8.5
== 8.0(3a)
== 8.0(2c)su1
== 8.0(3a)su1
CVE-2011-1606
High
May 3, 2011
== 6.1(3a)
== 6.1(2)
== 6.1(3b)su1
== 6.1(2)su1a
== 6.1(4)su1
== 6.1(4)
== 6.1(5)su1
== 6.1(4a)
== 6.1(3)
== 6.1(4a)su2
== 6.1(1)
== 6.1(1b)
== 6.1(3b)
== 6.1(5)
== 6.1(2)su1
== 6.0
== 6.1(1a)
== 7.1(2b)
== 7.1(3b)
== 7.1(2a)su1
== 7.1(3b)su1
== 7.1(3a)su1a
== 7.1(3)
== 7.1(2a)
== 7.1(5b)
== 7.0(2a)
== 7.0(1)su1
== 7.0(1)su1a
== 7.1(5)
== 7.1(5a)
== 7.0(2a)su2
== 7.1(5)su1a
== 7.1(5)su1
== 7.1(3a)
== 7.0(2a)su1
== 7.1(3a)su1
== 7.0(2)
== 7.1(3b)su2
== 8.0(2c)
== 8.0(3a)su2
== 8.0(3)
== 8.5
== 8.0(3a)
== 8.0(2c)su1
== 8.0(3a)su1
CVE-2011-1607
Medium
May 3, 2011
== 6.1(3a)
== 6.1(2)
== 6.1(3b)su1
== 6.1(2)su1a
== 6.1(4)su1
== 6.1(4)
== 6.1(5)su1
== 6.1(4a)
== 6.1(3)
== 6.1(4a)su2
== 6.1(1)
== 6.1(1b)
== 6.1(3b)
== 6.1(5)
== 6.1(2)su1
== 6.0
== 6.1(1a)
== 7.1(2b)su1
== 7.1(2b)
== 7.1(3b)
== 7.1(2a)su1
== 7.1(3b)su1
== 7.1(3a)su1a
== 7.1(3)
== 7.1(2a)
== 7.1(5b)
== 7.0(2a)
== 7.0(1)su1
== 7.0(1)su1a
== 7.1(5b)su2
== 7.1(5)
== 7.1(5a)
== 7.0(2a)su2
== 7.1(5)su1a
== 7.1(5)su1
== 7.1(3a)
== 7.0(2a)su1
== 7.1(3a)su1
== 7.0(2)
== 7.1(3b)su2
== 8.0(2c)
== 8.0(3)
== 8.5
== 8.0(3a)
== 8.0(2c)su1
‹
›
‹
1
2
...
18
19
20
...
23
24
›