cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-41713,https://securityvulnerability.io/vulnerability/CVE-2024-41713,Mitel NuPoint Unified Messaging (NPM) Vulnerability: Path Traversal Attack,"A vulnerability exists within the NuPoint Unified Messaging component of Mitel MiCollab, where insufficient input validation may result in a path traversal attack. An unauthenticated attacker who successfully exploits this vulnerability could gain unauthorized access, potentially allowing them to view, corrupt, or delete sensitive user data and critical system configurations. Organizations using affected versions should prioritize securing their systems against potential exploits to mitigate the risk of data breaches.",Mitel,Micollab,9.1,CRITICAL,0.9543700218200684,true,2025-01-07T00:00:00.000Z,true,false,true,2024-12-05T14:07:33.000Z,,true,false,,2024-10-21T21:15:00.000Z,3587 CVE-2024-55550,https://securityvulnerability.io/vulnerability/CVE-2024-55550,Local File Read Vulnerability in Mitel MiCollab Product,"Mitel MiCollab versions up to 9.8 SP2 are susceptible to a local file read vulnerability. Authenticated attackers with administrative privileges can exploit this issue due to insufficient input sanitization. This flaw enables access to resources typically restricted to admin-level access, allowing disclosure of non-sensitive system information. However, this vulnerability does not permit file modifications or privilege escalations.",Mitel,Micollab,2.7,LOW,0.42715999484062195,true,2025-01-07T00:00:00.000Z,false,false,true,2025-01-07T00:00:00.000Z,,false,false,,2024-12-10T19:15:00.000Z,0