Avaya

Messaging Storage Server

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.08%
  • Veröffentlicht 30.03.2009 16:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Device Mapper multipathing driver (aka multipath-tools or device-mapper-multipath) 0.4.8, as used in SUSE openSUSE, SUSE Linux Enterprise Server (SLES), Fedora, and possibly other operating systems, uses world-writable permissions for the socket ...

  • EPSS 0.06%
  • Veröffentlicht 09.07.2008 00:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) ha...

  • EPSS 0.71%
  • Veröffentlicht 09.07.2008 00:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple unspecified "input validation" vulnerabilities in the Web management interface (aka Messaging Administration interface) in Avaya Message Storage Server (MSS) 3.x and 4.0, and possibly Communication Manager 3.1.x, allow remote authenticated a...

  • EPSS 0.66%
  • Veröffentlicht 05.11.2007 19:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Unspecified vulnerability in the administrative interface in Avaya Messaging Storage Server (MSS) 3.1 before SP1, and Message Networking (MN) 3.1, allows remote attackers to cause a denial of service via unspecified vectors related to "input validati...

  • EPSS 0.05%
  • Veröffentlicht 04.04.2006 10:04:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.

  • EPSS 0.08%
  • Veröffentlicht 31.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command.