Page 2 of 11 results (0.023 seconds)

CVSS: 4.6EPSS: 0%CPEs: 43EXPL: 0

EMC NetWorker 7.6.x and 8.x before 8.1 allows local users to obtain sensitive configuration information by leveraging operating-system privileges to perform decryption with nsradmin. EMC NetWorker 7.6.x y 8.x anterior a 8.1, permite a usuarios locales obtener información sensible de la configuración aprovechando los privilegios del sistema operativo para realizar un descifrado con nsradmin. • http://archives.neohapsis.com/archives/bugtraq/2013-07/0193.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.2EPSS: 0%CPEs: 70EXPL: 0

The nsrpush process in the client in EMC NetWorker before 7.6.5.3 and 8.x before 8.0.1.4 sets weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors. El proceso nsrpush en el cliente en EMC NetWorker anterior a v7.6.5.3 y v8.x anterior a v8.0.1.4 fija permisos débiles para ficheros no especificados, permitiendo a usuarios locales ganar privilegios mediante vectores desconocidos. • http://archives.neohapsis.com/archives/bugtraq/2013-05/0013.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.3EPSS: 94%CPEs: 53EXPL: 0

Buffer overflow in nsrindexd in EMC NetWorker 7.5.x and 7.6.x before 7.6.5, and 8.x before 8.0.0.6, allows remote attackers to execute arbitrary code via crafted SunRPC data. Un desbordamiento de búfer en nsrindexd en EMC NetWorker v7.5.x y v7.6.x antes de v7.6.5 y v8.x antes de v8.0.0.6, permite a atacantes remotos ejecutar código de su elección a través de datos SunRPC hechos a mano. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC NetWorker. Authentication is not required to exploit this vulnerability. The specific flaw exists within the way nsrck.exe handles a remotely supplied string. When handling RPC calls for opcode 0x07 of program 0x0005F3D9, the nsrindexd.exe process starts a new nsrck.exe process using a user-supplied string parameter as a command argument. • http://archives.neohapsis.com/archives/bugtraq/2013-01/0029.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 90%CPEs: 37EXPL: 0

Buffer overflow in the server in EMC NetWorker 7.5.x and 7.6.x before 7.6.3 SP1 Cumulative Release build 851 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors. Desbordamiento de búfer en el servidor en EMC NetWorker v7.5.x y v7.6.x anterior a v7.6.3 SP1 Cumulative Release 851 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) o posiblemente ejecutar código arbitrario a través de vectores no especificados. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC Networker. Authentication is not required to exploit this vulnerability. The specific flaw exists within the way the indexd.exe handles rpc calls with opcode 0x1 for program 0x0005F3D9. While processing this message a user supplied string is copied into a fixed size stack buffer. • http://www.securityfocus.com/archive/1/521374 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.9EPSS: 0%CPEs: 29EXPL: 0

EMC NetWorker 7.5.x before 7.5.4.3 and 7.6.x before 7.6.1.5, when the client push feature is enabled, uses weak permissions for an unspecified file, which allows local users to gain privileges via unknown vectors. EMC NetWorker v7.5.x anterior a v7.5.4.3 y v7.6.x anterior a v7.6.1.5, cuando la función Client Push cliente está habilitada, utiliza permisos débiles para un archivo no especificado, lo que permite a usuarios locales conseguir privilegios a través de vectores desconocidos. • http://secunia.com/advisories/44237 http://securityreason.com/securityalert/8214 http://securitytracker.com/id?1025383 http://www.securityfocus.com/archive/1/517532/100/0/threaded http://www.securityfocus.com/bid/47410 http://www.vupen.com/english/advisories/2011/1025 • CWE-264: Permissions, Privileges, and Access Controls •