SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   


View Topics  >  Vendor  >  Avaya

Feb 5 2018   Avaya Aura System Manager Authentication Flaw Lets Remote Users Bypass RMI Security Restrictions on the Target System
Aug 16 2011   Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code
Jun 15 2011   Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory
Jun 27 2008   Avaya Communication Manager Bugs Let Remote Users Access Information and Utiliites and Let Remote Authenticated Users Execute Arbitrary Code
Apr 8 2004   Avaya Converged Communication Server Buffer Overflow in Processing SIP Packets Lets Remote Users Execute Arbitrary Code
Feb 13 2004   (Avaya Modular Messaging is Affected) Microsoft ASN.1 Library Heap Overflows Let Remote Users Execute Arbitrary Code With SYSTEM Privileges
Feb 13 2004   (Avaya Media Server is Affected) Microsoft ASN.1 Library Heap Overflows Let Remote Users Execute Arbitrary Code With SYSTEM Privileges
Jun 19 2003   Avaya P330/P130 and G700 Switches Can Be Crashed By Remote Users
May 9 2003   Avaya Intuity Audix Uses Non-Secure Administrative Authentication By Default
Oct 17 2002   Avay Cajun Switches Feature Undocumented Maintenance Accounts That Allow Remote Users to Gain Privileged Access
Sep 16 2002   Avaya IP Office Telecommunications System Can Be Crashed By Remote Users Sending Malformed Packets
Aug 6 2002   Avaya Cajun Switch Undocumented SNMP Community String Lets Remote Users Administer the Device
Apr 12 2002   (Mandrake Issues Fix) Libsafe Libary Security Function Format String Protections Can Be Bypassed
Mar 20 2002   Libsafe Libary Security Function Format String Protections Can Be Bypassed
Aug 7 2001   Avaya's Alchemy ArgentOffice Phone System Lets Remote Users Deny Service to the System or Gain Administrative Control of the System







Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC