Page 2 of 8 results (0.003 seconds)

CVSS: 3.5EPSS: 0%CPEs: 3EXPL: 0

The service utility in EMC Avamar 5.x before 5.0.4 uses cleartext to transmit event details in (1) service requests and (2) e-mail messages, which might allow remote attackers to obtain sensitive information by sniffing the network. La utilidad de servicio en EMC Avamar v5.x anterior a v5.0.4 utiliza texto claro para transmitir los detalles del evento en una (1) petición de servicio y (2) mensajes de correo electrónico, lo que podría permitir a atacantes remotos obtener información sensible espiando la red . • http://secunia.com/advisories/43797 http://securityreason.com/securityalert/8139 http://www.securityfocus.com/archive/1/517022/100/0/threaded http://www.securityfocus.com/bid/46879 http://www.securitytracker.com/id?1025213 http://www.vupen.com/english/advisories/2011/0677 http://www.vupen.com/english/advisories/2011/0678 https://exchange.xforce.ibmcloud.com/vulnerabilities/66109 • CWE-310: Cryptographic Issues •

CVSS: 8.5EPSS: 0%CPEs: 3EXPL: 0

Unspecified vulnerability in EMC Avamar before 5.0.4-30 allows remote authenticated users to gain privileges via unknown vectors. Vulnerabilidad no especificada en EMC Avamar anterior a v5.0.4-30 permite a usuarios remotos autenticados obtener privilegios a través de vectores desconocidos . • http://osvdb.org/71181 http://secunia.com/advisories/43749 http://securityreason.com/securityalert/8138 http://www.securityfocus.com/archive/1/517024/100/0/threaded http://www.securityfocus.com/bid/46874 https://exchange.xforce.ibmcloud.com/vulnerabilities/66108 •

CVSS: 7.1EPSS: 2%CPEs: 2EXPL: 0

Unspecified vulnerability in EMC Avamar 4.1.x and 5.0 before SP1 allows remote attackers to cause a denial of service (gsan service hang) by sending a crafted message using TCP. Vulnerabilidad sin especificar en EMC Avamar v4.1.x y v5.0 anterior a SP1 permite a atacantes remotos provocar una denegación de servicio (servicio gsan colgado) enviando un mensaje manipulado utilizando TCP. • http://archives.neohapsis.com/archives/bugtraq/2010-05/0254.html http://secunia.com/advisories/39919 http://securitytracker.com/id?1024036 http://www.packetstormsecurity.org/1005-advisories/ESA-2010-007.txt http://www.securityfocus.com/bid/40390 http://www.vupen.com/english/advisories/2010/1253 •