Page 25 of 147 results (0.002 seconds)

CVSS: 5.0EPSS: 2%CPEs: 8EXPL: 0

Unspecified vulnerability in Veritas Backup Exec for Windows Server Remote Agent 9.1 through 10.1, for Netware Servers and Remote Agent 9.1 and 9.2, and Remote Agent for Linux Servers 10.0 and 10.1 allow attackers to cause a denial of service (application crash or unavailability) due to "memory errors." • http://secunia.com/advisories/19242 http://securityreason.com/securityalert/597 http://securitytracker.com/id?1015784 http://www.securityfocus.com/archive/1/428016/100/0/threaded http://www.securityfocus.com/bid/17098 http://www.symantec.com/avcenter/security/Content/2006.03.17a.html http://www.vupen.com/english/advisories/2006/0995 https://exchange.xforce.ibmcloud.com/vulnerabilities/25309 •

CVSS: 4.6EPSS: 1%CPEs: 2EXPL: 0

Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec. • http://secunia.com/advisories/19242 http://securitytracker.com/id?1015785 http://support.veritas.com/docs/282254 http://www.securityfocus.com/archive/1/428223/100/0/threaded http://www.securityfocus.com/bid/17096 http://www.symantec.com/avcenter/security/Content/2006.03.17b.html http://www.vupen.com/english/advisories/2006/0996 https://exchange.xforce.ibmcloud.com/vulnerabilities/25310 •

CVSS: 4.3EPSS: 0%CPEs: 40EXPL: 2

Buffer overflow in various ha commands of VERITAS Cluster Server for UNIX before 4.0MP2 allows local users to execute arbitrary code via a long VCSI18N_LANG environment variable to (1) haagent, (2) haalert, (3) haattr, (4) hacli, (5) hacli_runcmd, (6) haclus, (7) haconf, (8) hadebug, (9) hagrp, (10) hahb, (11) halog, (12) hareg, (13) hares, (14) hastatus, (15) hasys, (16) hatype, (17) hauser, and (18) tststew. • https://www.exploit-db.com/exploits/1316 http://marc.info/?l=bugtraq&m=113199516516880&w=2 http://osvdb.org/20673 http://secunia.com/advisories/17502 http://securityreason.com/securityalert/174 http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08a.html http://securitytracker.com/id?1015169 http://www.securityfocus.com/bid/15349 http://www.vupen.com/english/advisories/2005/2350 https://exchange.xforce.ibmcloud.com/vulnerabilities/22986 •

CVSS: 10.0EPSS: 94%CPEs: 9EXPL: 3

Stack-based buffer overflow in a shared library as used by the Volume Manager daemon (vmd) in VERITAS NetBackup Enterprise Server 5.0 MP1 to MP5 and 5.1 up to MP3A allows remote attackers to execute arbitrary code via a crafted packet. • https://www.exploit-db.com/exploits/1421 http://secunia.com/advisories/17503 http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08b.html http://securitytracker.com/id?1015170 http://seer.support.veritas.com/docs/279553.htm http://www.idefense.com/application/poi/display?id=336&type=vulnerabilities http://www.kb.cert.org/vuls/id/574662 http://www.osvdb.org/20674 http://www.securityfocus.com/archive/1/422066/100/0/threaded http://www.securityfocus.com/archi •

CVSS: 10.0EPSS: 89%CPEs: 5EXPL: 4

Format string vulnerability in the Java user interface service (bpjava-msvc) daemon for VERITAS NetBackup Data and Business Center 4.5FP and 4.5MP, and NetBackup Enterprise/Server/Client 5.0, 5.1, and 6.0, allows remote attackers to execute arbitrary code via the COMMAND_LOGON_TO_MSERVER command. This vulnerability allows remote attackers to execute arbitrary code on vulnerable NetBackup installations. Authentication is not required to exploit this vulnerability. This specific flaw exists within the bpjava-msvc daemon due to incorrect handling of format string data passed through the 'COMMAND_LOGON_TO_MSERVER' command. The vulnerable daemon listens on TCP port 13722 and affects both NetBackup clients and servers. • https://www.exploit-db.com/exploits/1263 https://www.exploit-db.com/exploits/1265 https://www.exploit-db.com/exploits/1264 http://secunia.com/advisories/17181 http://securitytracker.com/id?1015028 http://seer.support.veritas.com/docs/279085.htm http://sunsolve.sun.com/search/document.do?assetkey=1-26-102054-1 http://www.kb.cert.org/vuls/id/495556 http://www.securityfocus.com/bid/15079 http://www.symantec.com/avcenter/security/Content/2005.10.12.html http:// •