CVE-2008-5710
Published Dec 24, 2008
Last updated 7 years ago
Overview
- Description
- Multiple unspecified vulnerabilities in the web management interface in Avaya Communication Manager (CM) 3.1.x, 4.0.3, and 5.x allow remote attackers to read (1) configuration files, (2) log files, (3) binary image files, and (4) help files via unknown vectors.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-16
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:communication_manager:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88F5C363-3A38-43FC-A06D-73E280AB844B" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4030E5D-BC15-481D-A15E-98FAE65130D9" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:3.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3FC3A86-CE3D-4C12-9E31-7F7280EF9D28" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:3.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBD119B9-FE11-4165-943D-119E906DC013" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:3.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89F99C5C-C184-4A5C-B8BA-F558C4A38730" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:3.1.4:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EAA2BC9-4794-4441-8AA8-3C1B7297FD06" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:3.1.4:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "423E4EEB-3D6F-449E-B623-C8D051E8FA3B" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:3.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87089C0E-2241-46A7-93EE-EC41D52A89C6" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:3.1.5:sp0:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BD89D61-0B42-4DDE-99F1-71570A37A136" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "825C1D4E-CD86-4122-84D7-CF1CB4CF8F10" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84E2136B-6FE3-4548-A89D-444ED9393C22" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:5.0:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB4B7CCA-3961-48BC-ABFD-A608B39BD921" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:5.0:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9DD5F5B-5F44-422C-B9D9-731B53981BEB" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:5.0:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD401628-23D0-4CC0-8D30-B10910533003" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A32A986-3DB3-4CB5-AF52-12D83C4A6B95" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:5.1:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "223037D6-1345-4705-BB88-E814211D666D" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:5.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4ED0CFA4-C45E-465B-9F45-EB0742305CBC" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:5.1.1:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22364E59-5248-43E3-8B6A-E646188F69E3" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:5.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "120EA1E2-EEF0-4FF6-960D-34FF9E88F2F3" }, { "criteria": "cpe:2.3:a:avaya:communication_manager:5.1.2:sp0:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED8A8551-7374-4A21-B141-10BE4CEF222F" } ], "operator": "OR" } ] } ]