
CVE-2005-0771 – Veritas Backup Exec Server Registry Access
https://notcve.org/view.php?id=CVE-2005-0771
23 Jun 2005 — VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106. • https://packetstorm.news/files/id/180900 •

CVE-2005-0773 – Veritas Backup Exec Windows - Remote Agent Overflow
https://notcve.org/view.php?id=CVE-2005-0773
18 Jun 2005 — Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument. • https://www.exploit-db.com/exploits/16332 •

CVE-2005-1131
https://notcve.org/view.php?id=CVE-2005-1131
16 Apr 2005 — Unknown vulnerability in Veritas i3 Focalpoint Server 7.1 and earlier has unknown attack vectors and unknown but "critical" impact. • http://archives.neohapsis.com/archives/vulnwatch/2005-q2/0008.html •

CVE-2004-2205
https://notcve.org/view.php?id=CVE-2004-2205
31 Dec 2004 — Unknown vulnerability in Veritas Cluster Server 1.0.1 through 4.0 allows local users to gain root access via unspecified vectors. • http://secunia.com/advisories/12833 •

CVE-2004-1389 – Veritas NetBackup - Remote Command Execution
https://notcve.org/view.php?id=CVE-2004-1389
31 Dec 2004 — Unknown vulnerability in the Veritas NetBackup Administrative Assistant interface for NetBackup BusinesServer 3.4, 3.4.1, and 4.5, DataCenter 3.4, 3.4.1, and 4.5, Enterprise Server 5.1, and NetBackup Server 5.0 and 5.1, allows attackers to execute arbitrary commands via the bpjava-susvc process, possibly related to the call-back feature. • https://www.exploit-db.com/exploits/9941 •

CVE-2004-1172 – Veritas Backup Exec Agent 8.x/9.x - Browser Overflow
https://notcve.org/view.php?id=CVE-2004-1172
22 Dec 2004 — Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname. • https://www.exploit-db.com/exploits/750 •

CVE-2003-1361
https://notcve.org/view.php?id=CVE-2003-1361
31 Dec 2003 — Unknown vulnerability in VERITAS Bare Metal Restore (BMR) of Tivoli Storage Manager (TSM) 3.1.0 through 3.2.1 allows remote attackers to gain root privileges on the BMR Main Server. • http://archives.neohapsis.com/archives/bugtraq/2003-02/0333.html •

CVE-2002-1817
https://notcve.org/view.php?id=CVE-2002-1817
31 Dec 2002 — Unknown vulnerability in Veritas Cluster Server (VCS) 1.2 for WindowsNT, Cluster Server 1.3.0 for Solaris, and Cluster Server 1.3.1 for HP-UX allows attackers to gain privileges via unknown attack vectors. • http://securitytracker.com/id?1005204 •

CVE-2002-1374 – MySQL 3.23.x/4.0.x - 'COM_CHANGE_USER' Password Length Account
https://notcve.org/view.php?id=CVE-2002-1374
23 Dec 2002 — The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 4.0.6, allows remote attackers to gain privileges via a brute force attack using a one-character password, which causes MySQL to only compare the provided password against the first character of the real password. El comando COM_CHANGE_USER en MySQL 3.x anterirores de 3.23.54 y 4.x anteriores a 4.0.5 permite a atacantes remotos ganar privilegios mediante un ataque de fuerza bruta usando una contraseña de un carácter, lo que hace que MyS... • https://www.exploit-db.com/exploits/22084 •

CVE-2002-1375 – MySQL 3.23.x/4.0.x - COM_CHANGE_USER Password Memory Corruption
https://notcve.org/view.php?id=CVE-2002-1375
23 Dec 2002 — The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x to 4.0.6, allows remote attackers to execute arbitrary code via a long response. El comando COM_CHANGE_USER en MySQL 3.x anteriores a 2.23.54 y 4.x anterior a 4.0.6 permite a atacantes remotos ejecutar código arbitrario mediante una respuesta larga. • https://www.exploit-db.com/exploits/22085 •