Page 4 of 24 results (0.013 seconds)

CVSS: 4.6EPSS: 1%CPEs: 2EXPL: 0

Format string vulnerability in the Job Engine service (bengine.exe) in the Media Server in Veritas Backup Exec 10d (10.1) for Windows Servers rev. 5629, Backup Exec 10.0 for Windows Servers rev. 5520, Backup Exec 10.0 for Windows Servers rev. 5484, and Backup Exec 9.1 for Windows Servers rev. 4691, when the job log mode is Full Detailed (aka Full Details), allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a crafted filename on a machine that is backed up by Backup Exec. • http://secunia.com/advisories/19242 http://securitytracker.com/id?1015785 http://support.veritas.com/docs/282254 http://www.securityfocus.com/archive/1/428223/100/0/threaded http://www.securityfocus.com/bid/17096 http://www.symantec.com/avcenter/security/Content/2006.03.17b.html http://www.vupen.com/english/advisories/2006/0996 https://exchange.xforce.ibmcloud.com/vulnerabilities/25310 •

CVSS: 10.0EPSS: 97%CPEs: 57EXPL: 3

VERITAS Backup Exec for Windows Servers 8.6 through 10.0, Backup Exec for NetWare Servers 9.0 and 9.1, and NetBackup for NetWare Media Server Option 4.5 through 5.1 uses a static password during authentication from the NDMP agent to the server, which allows remote attackers to read and write arbitrary files with the backup server. • https://www.exploit-db.com/exploits/1147 http://secunia.com/advisories/16403 http://securityresponse.symantec.com/avcenter/security/Content/2005.08.12b.html http://securitytracker.com/id?1014662 http://www.kb.cert.org/vuls/id/378957 http://www.securityfocus.com/bid/14551 http://www.us-cert.gov/cas/techalerts/TA05-224A.html http://www.vupen.com/english/advisories/2005/1387 https://exchange.xforce.ibmcloud.com/vulnerabilities/21793 https://web.archive.org/web/20120227144337/http& •

CVSS: 7.5EPSS: 0%CPEs: 17EXPL: 0

Unknown vulnerability in Remote Agent for Windows Servers (RAWS) in VERITAS Backup Exec 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for NetWare, allows remote attackers to gain privileges by copying the handle for the server. • http://secunia.com/advisories/15789 http://seer.support.veritas.com/docs/276608.htm http://seer.support.veritas.com/docs/277429.htm http://www.securityfocus.com/bid/14026 •

CVSS: 7.5EPSS: 8%CPEs: 4EXPL: 0

Heap-based buffer overflow in the Admin Plus Pack Option for VERITAS Backup Exec 9.0 through 10.0 for Windows Servers allows remote attackers to execute arbitrary code. Desbordamiento de búfer en Admin Plus Pack Option for VERITAS Backup Exec 9.0 hasta 10.0 para Windows Servers permite que atacantes remotos ejecuten código arbitrario. • http://secunia.com/advisories/15789 http://seer.support.veritas.com/docs/276607.htm http://seer.support.veritas.com/docs/277429.htm http://www.kb.cert.org/vuls/id/352625 http://www.securityfocus.com/bid/14023 http://www.us-cert.gov/cas/techalerts/TA05-180A.html •

CVSS: 7.5EPSS: 4%CPEs: 7EXPL: 0

Buffer overflow in the VERITAS Backup Exec Web Administration Console (BEWAC) 9.0 4367 through 10.0 rev. 5484 allows remote attackers to execute arbitrary code. • http://marc.info/?l=bugtraq&m=111954711532252&w=2 http://secunia.com/advisories/15789 http://seer.support.veritas.com/docs/276606.htm http://www.ciac.org/ciac/bulletins/p-232.shtml http://www.securityfocus.com/bid/14025 •