Avaya Aura Application Enablement Services
By the Year
In 2024 there have been 0 vulnerabilities in Avaya Aura Application Enablement Services . Aura Application Enablement Services did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 1 | 6.70 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Aura Application Enablement Services vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Avaya Aura Application Enablement Services Security Vulnerabilities
A vulnerability related to weak permissions was detected in Avaya Aura Application Enablement Services web application
CVE-2022-2975
6.7 - Medium
- October 06, 2022
A vulnerability related to weak permissions was detected in Avaya Aura Application Enablement Services web application, allowing an administrative user to modify accounts leading to execution of arbitrary code as the root user. This issue affects Application Enablement Services versions 8.0.0.0 through 8.1.3.4 and 10.1.0.0 through 10.1.0.1. Versions prior to 8.0.0.0 are end of manufacturing support and were not evaluated.
Incorrect Permission Assignment for Critical Resource
The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which
CVE-2009-3939
7.1 - High
- November 16, 2009
The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
Incorrect Permission Assignment for Critical Resource
BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords
CVE-2006-1058
5.5 - Medium
- April 04, 2006
BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
Use of Password Hash With Insufficient Computational Effort
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Avaya Messaging Storage Server or by Avaya? Click the Watch button to subscribe.