Page 63 of 419 results (0.013 seconds)

CVSS: 7.6EPSS: 4%CPEs: 1EXPL: 0

Format string vulnerability in the _vsnsprintf function in rrobotd.exe in the Device Manager in EMC AlphaStor 4.0 before build 800 allows remote attackers to execute arbitrary code via format string specifiers in a command. Vulnerabilidad en el formato de cadena en la función _vsnsprintf en rrobotd.exe en el Administrador de dispositivos de EMC AlphaStor v4.0 antes de build 800 que permite a atacantes remotos ejecutar código arbitrario a través de especificadores de formato de cadena en un comando. This vulnerability potentially allows remote attackers to execute arbitrary code on vulnerable installations of EMC AlphaStor for EMC Networker. Authentication is not required to exploit this vulnerability. The specific flaw exists within Device Manager (rrobotd.exe) which listens by default on port 3000. When parsing the 0x75 command, the process uses unfiltered user supplied data as a format string, allowing an attacker partial control over memory. • http://archives.neohapsis.com/archives/bugtraq/2013-01/0078.html http://www.securityfocus.com/bid/57472 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 10.0EPSS: 30%CPEs: 1EXPL: 3

The NetWorker command processor in rrobotd.exe in the Device Manager in EMC AlphaStor 4.0 before build 800 allows remote attackers to execute arbitrary commands via a DCP "run command" operation. El procesador de comandos NetWorker en rrobotd.exe en el Administrador de dispositivos de EMC AlphaStor 4.0 antes de build 800 permite a atacantes remotos ejecutar código arbitrario a través de un DCP, operación "ejecutar comando" . This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC AlphaStor for EMC Networker. Authentication is not required to exploit this vulnerability. The specific flaw exists within Device Manager (rrobotd.exe) which listens by default on port 3000. When parsing the 0x75 command, the process does not properly filter the user supplied data allowing for arbitrary command injection and execution. • https://www.exploit-db.com/exploits/34756 http://archives.neohapsis.com/archives/bugtraq/2013-01/0078.html http://www.exploit-db.com/exploits/34756 http://www.securityfocus.com/bid/57472 http://www.zerodayinitiative.com/advisories/ZDI-13-033 - • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.3EPSS: 94%CPEs: 53EXPL: 0

Buffer overflow in nsrindexd in EMC NetWorker 7.5.x and 7.6.x before 7.6.5, and 8.x before 8.0.0.6, allows remote attackers to execute arbitrary code via crafted SunRPC data. Un desbordamiento de búfer en nsrindexd en EMC NetWorker v7.5.x y v7.6.x antes de v7.6.5 y v8.x antes de v8.0.0.6, permite a atacantes remotos ejecutar código de su elección a través de datos SunRPC hechos a mano. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC NetWorker. Authentication is not required to exploit this vulnerability. The specific flaw exists within the way nsrck.exe handles a remotely supplied string. When handling RPC calls for opcode 0x07 of program 0x0005F3D9, the nsrindexd.exe process starts a new nsrck.exe process using a user-supplied string parameter as a command argument. • http://archives.neohapsis.com/archives/bugtraq/2013-01/0029.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 0

Directory traversal vulnerability in the Web UI in EMC Data Protection Advisor (DPA) 5.6 through SP1, 5.7 through SP1, and 5.8 through SP4 allows remote attackers to read arbitrary files via unspecified vectors. Una vulnerabilidad de salto de directorio en la interfaz de usuario web de EMC Data Protection Advisor (DPA) v5.6 hasta SP1, v5.7 SP1 hasta SP1, y v5.8 hasta SP4, que permite a atacantes remotos leer archivos de su elección a través de vectores no especificados. • http://archives.neohapsis.com/archives/bugtraq/2012-12/0125.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Cross-site request forgery (CSRF) vulnerability in the web interface in EMC RSA NetWitness Informer before 2.0.5.6 allows remote attackers to hijack the authentication of arbitrary users. Múltiples vulnerabilidades de falsificación de petición en sitios cruzados (CSRF) en la interfaz web en EMC RSA NetWitness Informer anterior a v2.0.5.6, permite a atacantes remotos secuestrar la autenticación de usuarios arbitrarios. • http://archives.neohapsis.com/archives/bugtraq/2012-12/0002.html • CWE-352: Cross-Site Request Forgery (CSRF) •