7 High
AI Score
Confidence
Low
7.8 High
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:C/I:N/A:N
0.006 Low
EPSS
Percentile
77.5%
Multiple unspecified vulnerabilities in the Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x, allow remote attackers to obtain (1) application server configuration, (2) database server configuration including encrypted passwords, (3) a system utility that decrypts “subscriber table passwords,” (4) a system utility that decrypts database passwords, and (5) a system utility that encrypts “subscriber table passwords.”
osvdb.org/46602
secunia.com/advisories/30751
support.avaya.com/elmodocs2/security/ASA-2008-268.htm
www.securityfocus.com/bid/29939
www.voipshield.com/research-details.php?id=81
www.voipshield.com/research-details.php?id=82
www.voipshield.com/research-details.php?id=83
www.voipshield.com/research-details.php?id=84
www.voipshield.com/research-details.php?id=85
www.vupen.com/english/advisories/2008/1943/references
exchange.xforce.ibmcloud.com/vulnerabilities/43382
exchange.xforce.ibmcloud.com/vulnerabilities/43383
exchange.xforce.ibmcloud.com/vulnerabilities/43387
exchange.xforce.ibmcloud.com/vulnerabilities/43388