Page 2 of 19 results (0.007 seconds)

CVSS: 10.0EPSS: 80%CPEs: 57EXPL: 4

17 Aug 2005 — VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server. • https://packetstorm.news/files/id/180901 •

CVSS: 9.8EPSS: 10%CPEs: 4EXPL: 0

29 Jun 2005 — Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code. Desbordamiento de búfer en Admin Plus Pack Option for VERITAS Backup Exec 9.0 hasta 10.0 para Windows Servers permite que atacantes remotos ejecuten código arbitrario. • http://secunia.com/advisories/15789 •

CVSS: 9.8EPSS: 0%CPEs: 17EXPL: 0

29 Jun 2005 — Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server. • http://secunia.com/advisories/15789 •

CVSS: 9.8EPSS: 4%CPEs: 7EXPL: 0

26 Jun 2005 — Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code. • http://marc.info/?l=bugtraq&m=111954711532252&w=2 •

CVSS: 7.5EPSS: 11%CPEs: 2EXPL: 0

26 Jun 2005 — VERITAS Backup Exec 9.0 through 10.0 for Windows Servers, and 9.0.4019 through 9.1.307 for Netware, allows remote attackers to cause a denial of service (Remote Agent crash) via (1) a crafted packet in NDMLSRVR.DLL or (2) a request packet with an invalid (non-0) "Error Status" value, which triggers a null dereference. • http://secunia.com/advisories/15789 • CWE-476: NULL Pointer Dereference •

CVSS: 10.0EPSS: 81%CPEs: 4EXPL: 1

23 Jun 2005 — VERITAS Backup Exec Server (beserver.exe) 9.0 through 10.0 for Windows allows remote unauthenticated attackers to modify the registry by calling methods to the RPC interface on TCP port 6106. • https://packetstorm.news/files/id/180900 •

CVSS: 9.8EPSS: 75%CPEs: 22EXPL: 2

18 Jun 2005 — Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument. • https://www.exploit-db.com/exploits/16332 •

CVSS: 10.0EPSS: 79%CPEs: 5EXPL: 2

22 Dec 2004 — Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname. • https://www.exploit-db.com/exploits/750 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

04 Oct 2002 — Veritas Backup Exec 8.5 and earlier requires that the "RestrictAnonymous" registry key for Microsoft Exchange 2000 must be set to 0, which enables anonymous listing of the SAM database and shares. • http://marc.info/?l=bugtraq&m=103134395124579&w=2 •