Call Recording Eleveo Call Recording

Do you want an email whenever new security vulnerabilities are reported in Eleveo Call Recording?

By the Year

In 2024 there have been 0 vulnerabilities in Eleveo Call Recording . Call Recording did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 1 10.00
2020 2 7.10
2019 0 0.00
2018 0 0.00

It may take a day or so for new Call Recording vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Eleveo Call Recording Security Vulnerabilities

Zoom Call Recording 6.3.1 from Eleveo is vulnerable to Java Deserialization attacks targeting the inbuilt RMI service

CVE-2019-19810 10 - Critical - October 28, 2021

Zoom Call Recording 6.3.1 from Eleveo is vulnerable to Java Deserialization attacks targeting the inbuilt RMI service. A remote unauthenticated attacker can exploit this vulnerability by sending crafted RMI requests to execute arbitrary code on the target host.

Marshaling, Unmarshaling

ZOOM International Call Recording 6.3.1 suffers from multiple authenticated stored XSS vulnerabilities

CVE-2019-18223 5.4 - Medium - April 27, 2020

ZOOM International Call Recording 6.3.1 suffers from multiple authenticated stored XSS vulnerabilities via the phoneNumber field in the (1) User Edit or (2) User Add form, (3) name field in the Role Add form, (4) name or number field in the Edit Group form, (5) tagKey or tagValue field in the Recording Rules Configuration, or (6) txt_69735:/VemailAddress/value or txt_75767:/VemailFrom/value field in callrec/config.

XSS

A privilege escalation vulnerability in ZOOM Call Recording 6.3.1 allows its user account (i.e

CVE-2019-18822 8.8 - High - April 14, 2020

A privilege escalation vulnerability in ZOOM Call Recording 6.3.1 allows its user account (i.e., the account under which the program runs - by default, the callrec account) to elevate privileges to root by abusing the callrec-rs@.service. The callrec-rs@.service starts the /opt/callrec/bin/rs binary with root privileges, and this binary is owned by callrec. It can be replaced by a Trojan horse.

Improper Privilege Management

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Eleveo Call Recording or by Eleveo? Click the Watch button to subscribe.

Eleveo
Vendor

subscribe