what you don't know can hurt you
Showing 1 - 25 of 100 RSS Feed

Files

Avaya one-X 9.x / 10.0.x / 10.1.x Arbitrary File Disclosure / Deletion
Posted Sep 10, 2018
Authored by Pedro Andujar

Avaya one-X versions 9.x, 10.0.x, and 10.1.x suffer from arbitrary file disclosure and deletion vulnerabilities.

tags | exploit, arbitrary, vulnerability
advisories | CVE-2018-15610
MD5 | 19f5b0846706f9c5967437b6d530042e

Related Files

Secunia Security Advisory 49852
Posted Jul 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a weakness in Avaya Products, which can be exploited by malicious people to conduct brute force attacks.

tags | advisory
MD5 | ce423d222dfdd763d19588803e10ae36
Secunia Security Advisory 49762
Posted Jun 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Avaya IP Office Customer Call Reporter, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 3e77d49c0961047474a465e00c465344
Zero Day Initiative Advisory 12-106
Posted Jun 29, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-106 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Avaya IP Office Customer Call Reporter. Authentication is not required to exploit this vulnerability. The specific flaw exists because Avaya IP Office Customer Call Reporter allows unauthenticated users to upload files to the webserver through ImageUpload.ashx. The uploaded files will not be stripped of their file extensions and the directory where they are uploaded to has no scripting restrictions. This flaw can lead the remote code execution under the context of the user running the IP Office Customer Call Reporter, usually NETWORK SERVICE.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2012-3811
MD5 | 5f62220abf46debe38080c31d399c706
Secunia Security Advisory 48200
Posted Feb 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged two vulnerabilities in Avaya Call Management System, which can be exploited by malicious, local users to disclose system information and cause a DoS (Denial of Service) and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
MD5 | ba56e6026877b4c6480cb9d84aca162c
Secunia Security Advisory 44063
Posted Feb 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AbdulAziz Hariri has discovered a vulnerability in Avaya Interaction Center, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 62f870f8a70e922d6ffb76cfbb3280ad
Avaya WinPDM UniteHostRouter 3.8.2 Buffer Overflow
Posted Jan 20, 2012
Authored by Abysssec | Site abysssec.com

Avaya WinPDM UniteHostRouter versions 3.8.2 and below remote pre-auth buffer overflow exploit that binds a shell to port 4444.

tags | exploit, remote, overflow, shell
MD5 | 2f0e85ab508a09e0ebb1db87894629ab
Secunia Security Advisory 47265
Posted Dec 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya CMS, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | d5cadfca0e056114851bb67d3d1e33af
Secunia Security Advisory 46801
Posted Nov 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged multiple vulnerabilities in Avaya CMS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 8666c3aff343ed7e397bf926e2898e07
Secunia Security Advisory 46492
Posted Oct 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Avaya Identity Engines Ignition Server, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | a3d1b7d982e8fc06273edb1172c75737
Secunia Security Advisory 46501
Posted Oct 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Avaya Identity Engines Ignition Server, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 566493b92715311d18fb2e6283e91ba6
Secunia Security Advisory 45895
Posted Sep 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Avaya Contact Recording and Quality Monitoring, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 7adca33832eabbdc8bbdcb782086c0c5
Secunia Security Advisory 45370
Posted Jul 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya Application Enablement Services, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
MD5 | c64dc8591b2066eac3143027e4638247
Avaya IP Office Manager TFTP Server 8.1 Directory Traversal
Posted Jul 8, 2011
Authored by Veerendra G.G | Site secpod.com

Avaya IP Office Manager TFTP server version 8.1 suffers from a remote directory traversal vulnerability.

tags | exploit, remote, file inclusion
MD5 | 79bfc0d87f96002bceba7d09f995ef8a
Secunia Security Advisory 43884
Posted Jun 16, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Avaya IP Office Manager, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | 840bd198393bdd8d0f2e910d72cf38f3
Secunia Security Advisory 44062
Posted May 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Abdul-Aziz Hariri has discovered multiple vulnerabilities in Avaya WinPDM, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | 3959909252d97562a80a064dd4290d84
Secunia Security Advisory 44213
Posted Apr 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Avaya Communication Server 1000, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 4c052979ea7874ffecfaa01e184e2a90
Secunia Security Advisory 43819
Posted Mar 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Avaya IP Office Manager, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 56c8eb81679c7b3d2e644be8652d45c6
Avaya IP Office Manager 8.1 TFTP Denial Of Service
Posted Mar 24, 2011
Authored by Craig Freyman

Avaya IP Office Manager version 8.1 TFTP denial of service exploit.

tags | exploit, denial of service
MD5 | 4619ae971704a116d90106dccebd502b
Secunia Security Advisory 43685
Posted Mar 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged multiple vulnerabilities in Avaya Call Management System, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges and by malicious people to disclose system information, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
MD5 | 4c67dd5b64f71a06f8e0e2e72ed39240
Secunia Security Advisory 43423
Posted Mar 3, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya Call Management System, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
MD5 | 198673950d50b12a3a0e4c61def3cb37
Secunia Security Advisory 43433
Posted Mar 3, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya Call Management System, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 4244003e7be7faf02a3ccf91c062f470
Secunia Security Advisory 43335
Posted Feb 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya Communication Manager, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 383afe1a6e600e3bb95196e396209afc
Secunia Security Advisory 43288
Posted Feb 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged some vulnerabilities in Avaya Call Management System (CMS), which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 38662dc5028652cba8f24b3d0131d87f
Avaya Aura AES Authorization Bypass
Posted Jan 6, 2011
Authored by Ben Heinkel

Avaya Aura AES suffers from an authorization bypass vulnerability.

tags | advisory, bypass
MD5 | 8cebd046d3a13a0fb81331779f0eed21
Secunia Security Advisory 42599
Posted Dec 13, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Avaya Application Enablement Services, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
MD5 | 21c58cb185d1f0eb43af6d8ed5b002a1
Page 1 of 4
Back1234Next

File Archive:

November 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    28 Files
  • 2
    Nov 2nd
    1 Files
  • 3
    Nov 3rd
    1 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    19 Files
  • 6
    Nov 6th
    65 Files
  • 7
    Nov 7th
    22 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    1 Files
  • 10
    Nov 10th
    1 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    65 Files
  • 13
    Nov 13th
    27 Files
  • 14
    Nov 14th
    22 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close