First published: Fri Apr 10 2009(Updated: )
Unspecified vulnerability in the Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x, allows remote authenticated users to execute arbitrary commands via unknown vectors related to configuration of "local data viewing or restoring parameters."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya Aura SIP Enablement Services | =3.0 | |
Avaya Aura SIP Enablement Services | =3.1 | |
Avaya Aura SIP Enablement Services | =3.1.1 | |
Avaya Aura SIP Enablement Services | =4.0 | |
Avaya Communication Manager | =3.1 | |
Avaya Communication Manager | =3.1.1 | |
Avaya Communication Manager | =3.1.2 | |
Avaya Communication Manager | =3.1.3 | |
Avaya Communication Manager | =3.1.4 | |
Avaya Communication Manager | =3.1.4-sp1 | |
Avaya Communication Manager | =3.1.4-sp2 | |
Avaya Communication Manager | =3.1.5 | |
Avaya Communication Manager | =3.1.5-sp0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.