Page 2 of 11 results (0.002 seconds)

CVSS: 7.5EPSS: 8%CPEs: 4EXPL: 0

Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code. Desbordamiento de búfer en Admin Plus Pack Option for VERITAS Backup Exec 9.0 hasta 10.0 para Windows Servers permite que atacantes remotos ejecuten código arbitrario. • http://secunia.com/advisories/15789 http://seer.support.veritas.com/docs/276607.htm http://seer.support.veritas.com/docs/277429.htm http://www.kb.cert.org/vuls/id/352625 http://www.securityfocus.com/bid/14023 http://www.us-cert.gov/cas/techalerts/TA05-180A.html •

CVSS: 7.5EPSS: 4%CPEs: 7EXPL: 0

Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code. • http://marc.info/?l=bugtraq&m=111954711532252&w=2 http://secunia.com/advisories/15789 http://seer.support.veritas.com/docs/276606.htm http://www.ciac.org/ciac/bulletins/p-232.shtml http://www.securityfocus.com/bid/14025 •

CVSS: 10.0EPSS: 96%CPEs: 4EXPL: 0

VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106. • http://secunia.com/advisories/15789 http://securitytracker.com/id?1014273 http://seer.support.veritas.com/docs/276605.htm http://seer.support.veritas.com/docs/277429.htm http://www.idefense.com/application/poi/display?id=269&type=vulnerabilities&flashstatus=true http://www.kb.cert.org/vuls/id/584505 http://www.us-cert.gov/cas/techalerts/TA05-180A.html •

CVSS: 7.5EPSS: 96%CPEs: 22EXPL: 2

Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument. • https://www.exploit-db.com/exploits/16332 http://secunia.com/advisories/15789 http://securitytracker.com/id?1014273 http://seer.support.veritas.com/docs/276604.htm http://seer.support.veritas.com/docs/277429.htm http://www.idefense.com/application/poi/display?id=272&type=vulnerabilities&flashstatus=true http://www.kb.cert.org/vuls/id/492105 http://www.osvdb.org/17624 http://www.securityfocus.com/bid/14022 http://www.us-cert.gov/cas/techalerts/TA05-180A.html •

CVSS: 10.0EPSS: 95%CPEs: 5EXPL: 2

Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname. • https://www.exploit-db.com/exploits/750 https://www.exploit-db.com/exploits/16331 http://secunia.com/advisories/13495 http://seer.support.veritas.com/docs/273419.htm http://seer.support.veritas.com/docs/273420.htm http://seer.support.veritas.com/docs/273422.htm http://seer.support.veritas.com/docs/273850.htm http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php http://www.idefense.com/application/poi/display?id=169 http://www.kb.cert.org/vuls/id/907729 http&# •