Page 8 of 45 results (0.007 seconds)

CVSS: 7.5EPSS: 96%CPEs: 1EXPL: 1

Buffer overflow in the UniversalAgent for Computer Associates (CA) BrightStor ARCserve Backup allows remote authenticated users to cause a denial of service or execute arbitrary code via an agent request to TCP port 6050 with a large argument before the option field. • https://www.exploit-db.com/exploits/16405 http://marc.info/?l=bugtraq&m=111351851802682&w=2 http://www.idefense.com/application/poi/display?id=232&type=vulnerabilities http://www.securityfocus.com/archive/1/390760 http://www.securityfocus.com/bid/13102 •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 1

The production release of the UniversalAgent for UNIX in BrightStor ARCserve Backup 11.1 contains hard-coded credentials, which allows remote attackers to access the file system and possibly execute arbitrary commands. • http://secunia.com/advisories/14233 http://securitytracker.com/id?1013144 http://supportconnect.ca.com/sc/solcenter/sol_detail.jsp?aparno=QO63672&os=UNIX&returninput=0 http://www.idefense.com/application/poi/display?id=198&type=vulnerabilities http://www.osvdb.org/13706 http://www.securityfocus.com/bid/12522 http://www.vupen.com/english/advisories/2005/0145 •

CVSS: 10.0EPSS: 44%CPEs: 1EXPL: 2

Stack-based buffer overflow in the Discovery Service for BrightStor ARCserve Backup 11.1 and earlier allows remote attackers to execute arbitrary code via a long packet to UDP port 41524, which is not properly handled in a recvfrom call. • https://www.exploit-db.com/exploits/16406 http://secunia.com/advisories/14183 http://securitytracker.com/id?1013138 http://supportconnectw.ca.com/public/enews/BrightStor/brigcurrent.asp#news1 http://www.idefense.com/application/poi/display?id=194&type=vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/19251 •

CVSS: 7.5EPSS: 2%CPEs: 47EXPL: 2

Archive::Zip Perl module before 1.14, when used by antivirus programs such as amavisd-new, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. El módulo Perl Archive::Zip anterior a 1.14, cuando se usa en programas antivirus como amavisd-new, permite a atacantes remotos saltarse la protección del antivirus mediante un ficheros comprimido con cabeceras globales y locales establecido a cero, lo que no impide que el fichero comprimido sea abierto en un sistema objetivo. • https://www.exploit-db.com/exploits/629 http://secunia.com/advisories/13038 http://www.gentoo.org/security/en/glsa/glsa-200410-31.xml http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true http://www.kb.cert.org/vuls/id/492545 http://www.mandriva.com/security/advisories?name=MDKSA-2004:118 http://www.securityfocus.com/bid/11448 https://exchange.xforce.ibmcloud.com/vulnerabilities/17761 •

CVSS: 7.5EPSS: 95%CPEs: 48EXPL: 2

Computer Associates (CA) InoculateIT 6.0, eTrust Antivirus r6.0 through r7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, EZ-Armor 2.0 through 2.4, and EZ-Antivirus 6.1 through 6.3 allow remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. • https://www.exploit-db.com/exploits/629 http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true http://www.securityfocus.com/bid/11448 https://exchange.xforce.ibmcloud.com/vulnerabilities/17761 •