Page 4 of 50 results (0.005 seconds)

CVSS: 10.0EPSS: 4%CPEs: 9EXPL: 0

Multiple buffer overflows in (1) RPC and (2) rpcx.dll in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allow remote attackers to execute arbitrary code via unspecified vectors. Múltiples desbordamientos de búfer en (1) RPC y (2) rpcx.dll de CA BrightStor ARCServer BackUp v9.01 hasta R11.5, y Enterprise Backup r10.5, permiten a atacantes remotos ejecutar código de su elección a través de vectores no especificados. • http://osvdb.org/41368 http://secunia.com/advisories/27192 http://secunia.com/secunia_research/2007-49/advisory http://supportconnectw.ca.com/public/storage/infodocs/basb-secnotice.asp http://www.securityfocus.com/archive/1/482121/100/0/threaded http://www.securityfocus.com/bid/26015 http://www.securitytracker.com/id?1018805 http://www.vupen.com/english/advisories/2007/3470 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 93%CPEs: 9EXPL: 1

Multiple stack-based buffer overflows in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 allow remote attackers to execute arbitrary code via a long (1) username or (2) password to the rxrLogin command in rxRPC.dll, or a long (3) username argument to the GetUserInfo function. Múltiples desbordamientos de búfer basado en pila en CA (Computer Associates) BrightStor ARCserve Backup para Portátil y Sobremesa r11.0 hasta r11.5 permiten a atacantes remotos ejecutar código de su elección mediante un (1) nombre de usuario ó (2) contraseña largos en el comando rxrLogin de rxRPC.dll, ó un (3) argumento nombre de usuario largo en la función GetUserInfo. • https://www.exploit-db.com/exploits/16411 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=599 http://research.eeye.com/html/advisories/published/AD20070920.html http://secunia.com/advisories/25606 http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35674 http://www.securityfocus.com/archive/1/480252/100/100 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 6%CPEs: 9EXPL: 0

Multiple command handlers in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 do not verify if a peer is authenticated, which allows remote attackers to add and delete users, and start client restores. Múltiples gestores de comandos de CA (Computer Associates) BrightStor ARCserve Backup para Portátil y Sobremesa r11.0 hasta r11.5 no verifican si un par está autenticado, lo cual permite a atacantes remotos añadir y borrar usuarios, e inicializar recuperaciones de cliente. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=598 http://secunia.com/advisories/25606 http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35677 http://www.securityfocus.com/archive/1/480252/100/100/threaded http://www.securityfocus.com/bid/24348 http://www.securitytracker.com/id?1018728 • CWE-287: Improper Authentication •

CVSS: 9.3EPSS: 91%CPEs: 9EXPL: 0

Integer overflow in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 allows remote attackers to execute arbitrary code via a long username and a certain "useless" password. Desbordamiento de entero en en pila en CA (Computer Associates) BrightStor ARCserve Backup para Portátil y Sobremesa r11.0 hasta r11.5 permite a atacantes remotos ejecutar código de su elección mediante un nombre de usuario largo y determinadas contraseñas "sin uso". • http://research.eeye.com/html/advisories/published/AD20070920.html http://secunia.com/advisories/25606 http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35675 http://www.securityfocus.com/archive/1/480252/100/100/threaded http://www.securityfocus.com/bid/24348 http://www.securitytracker.com/id?1018728 • CWE-189: Numeric Errors •

CVSS: 10.0EPSS: 6%CPEs: 9EXPL: 0

Directory traversal vulnerability in rxRPC.dll in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 allows remote attackers to upload and overwrite arbitrary files via a ..\ (dot dot backslash) sequence in the destination filename argument to sub-function 8 in the rxrReceiveFileFromServer command. Vulnerabilidad de salto de directorio en rxRPC.dll de CA (Computer Associates) BrightStor ARCserve Backup para Portátil y Sobremesa r11.0 hasta r11.5 permite a atacantes remotos subir y sobrescribir ficheros de su elección mediante una secuencia ..\ (punto punto barra invertida) en el argumento fichero destino en la sub-función 8 en el comando rxrReceiveFileFromServer. • http://research.eeye.com/html/advisories/published/AD20070920.html http://secunia.com/advisories/25606 http://supportconnectw.ca.com/public/sams/lifeguard/infodocs/caarcservebld-securitynotice.asp http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=156006 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35676 http://www.securityfocus.com/archive/1/480252/100/100/threaded http://www.securityfocus.com/bid/24348 http://www.securitytracker.com/id?1018728 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •