Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
avaya cvlan vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2001-1494
script command in the util-linux package prior to 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command.
Kernel Util-linux
Avaya Cvlan
Avaya Interactive Response
Avaya Integrated Management Suit
Avaya Intuity Lx
Avaya Message Networking
Avaya Messaging Storage Server
1 Github repository
7.5
CVSSv2
CVE-2004-0494
Multiple extfs backend scripts for GNOME virtual file system (VFS) prior to 1.0.1 may allow remote malicious users to perform certain unauthorized actions via a gnome-vfs URI.
Avaya Cvlan
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 3.0
Redhat Linux Advanced Workstation 2.1
7.5
CVSSv2
CVE-2004-1307
Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote malicious users to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a ...
Avaya Call Management System Server 13.0
Avaya Call Management System Server 8.0
F5 Icontrol Service Manager 1.3
F5 Icontrol Service Manager 1.3.4
Libtiff Libtiff 3.5.4
Libtiff Libtiff 3.5.5
Conectiva Linux 9.0
Avaya Call Management System Server 11.0
Avaya Call Management System Server 12.0
Avaya Interactive Response 1.3
Avaya Intuity Audix Lx
Libtiff Libtiff 3.5.2
Libtiff Libtiff 3.5.3
Sgi Propack 3.0
Conectiva Linux 10.0
Avaya Integrated Management
Avaya Interactive Response
Avaya Interactive Response 1.2.1
Libtiff Libtiff 3.4
Libtiff Libtiff 3.5.1
Libtiff Libtiff 3.6.1
Libtiff Libtiff 3.7.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started