10 results (0.002 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

08 Mar 2018 — Dell EMC Data Protection Advisor versions prior to 6.3 Patch 159 and Dell EMC Data Protection Advisor versions prior to 6.4 Patch 110 contain a hardcoded database account with administrative privileges. The affected account is "apollosuperuser." An attacker with local access to the server where DPA Datastore Service is installed and knowledge of the password may potentially gain unauthorized access to the database. Note: The Datastore Service database cannot be accessed remotely using this account. Dell EMC... • http://seclists.org/fulldisclosure/2018/Mar/22 • CWE-798: Use of Hard-coded Credentials •

CVSS: 9.0EPSS: 33%CPEs: 1EXPL: 0

28 Sep 2017 — This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC Data Protection Advisor 6.3.0. Authentication is required to exploit this vulnerability. The specific flaw exists within the EMC DPA Application service, which listens on TCP port 9002 by default. When parsing the preScript parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute arbitrary code... • http://www.securityfocus.com/bid/101008 • CWE-20: Improper Input Validation CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

15 Sep 2017 — EMC Data Protection Advisor 6.3.x before patch 67 and 6.4.x before patch 130 contains undocumented accounts with hard-coded passwords and various privileges. Affected accounts are: "Apollo System Test", "emc.dpa.agent.logon" and "emc.dpa.metrics.logon". An attacker with knowledge of the password could potentially use these accounts via REST APIs to gain unauthorized access to EMC Data Protection Advisor (including potentially access with administrative privileges). Las versiones 6.3.x anteriores al patch 67... • http://seclists.org/fulldisclosure/2017/Sep/36 • CWE-798: Use of Hard-coded Credentials •

CVSS: 8.8EPSS: 2%CPEs: 1EXPL: 0

07 Jul 2017 — EMC Data Protection Advisor prior to 6.4 contains multiple blind SQL injection vulnerabilities. A remote authenticated attacker may potentially exploit these vulnerabilities to gain information about the application by causing execution of arbitrary SQL commands. Data Protection Advisor anterior a versión 6.4 de EMC, contiene múltiples vulnerabilidades de inyección SQL ciega. Un atacante autenticado remoto puede potencialmente explotar estas vulnerabilidades para conseguir información sobre la aplicación ca... • http://seclists.org/fulldisclosure/2017/Jul/12 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

07 Jul 2017 — EMC Data Protection Advisor prior to 6.4 contains a path traversal vulnerability. A remote authenticated high privileged user may potentially exploit this vulnerability to access unauthorized information from the underlying OS server by supplying specially crafted strings in input parameters of the application. Data Protection Advisor de EMC anterior a versión 6.4, contiene una vulnerabilidad de salto de directorio. Un usuario autenticado remoto con privilegios elevados puede potencialmente explotar esta vu... • http://seclists.org/fulldisclosure/2017/Jul/12 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

24 Dec 2012 — Directory traversal vulnerability in the Web UI in EMC Data Protection Advisor (DPA) 5.6 through SP1, 5.7 through SP1, and 5.8 through SP4 allows remote attackers to read arbitrary files via unspecified vectors. Una vulnerabilidad de salto de directorio en la interfaz de usuario web de EMC Data Protection Advisor (DPA) v5.6 hasta SP1, v5.7 SP1 hasta SP1, y v5.8 hasta SP4, que permite a atacantes remotos leer archivos de su elección a través de vectores no especificados. A vulnerability exists in EMC Data Pr... • http://archives.neohapsis.com/archives/bugtraq/2012-12/0125.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 14%CPEs: 8EXPL: 3

19 Apr 2012 — The DPA_Utilities.cProcessAuthenticationData function in EMC Data Protection Advisor (DPA) 5.5 through 5.8 SP1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an AUTHENTICATECONNECTION command that (1) lacks a password field or (2) has an empty password. La función de DPA_Utilities.cProcessAuthenticationData de EMC Data Protection Advisor (DPA) v5.5 a v5.8 SP1 permite a atacantes remotos causar una denegación de servicio (desreferencia de puntero NULL y c... • https://www.exploit-db.com/exploits/18688 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 9%CPEs: 8EXPL: 2

19 Apr 2012 — Integer overflow in the DPA_Utilities library in EMC Data Protection Advisor (DPA) 5.5 through 5.8 SP1 allows remote attackers to cause a denial of service (infinite loop) via a negative 64-bit value in a certain size field. Desbordamiento de entero en la biblioteca DPA_Utilities de EMC Data Protection Advisor (DPA) v5.5 a v5.8 SP1 permite a atacantes remotos causar una denegación de servicio (bucle infinito) a través de un valor de 64-bits negativo en un determinado campo 'tamaño'. EMC Data Protection Advi... • https://www.exploit-db.com/exploits/18688 • CWE-189: Numeric Errors •

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

28 Jul 2011 — EMC Data Protection Advisor before 5.8.1 places cleartext account credentials in the DPA configuration file in unspecified circumstances, which might allow local users to obtain sensitive information by reading this file. EMC Data Protection Advisor anterior a v5.8.1 coloca credenciales de cuentas en texto claro en el fichero de configuración DPA en circunstancias no especificadas, lo que permite a usuarios locales obtener información sensible leyendo este fichero. A vulnerability exists in EMC Data Protect... • http://securityreason.com/securityalert/8318 • CWE-255: Credentials Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

25 Mar 2011 — EMC Data Protection Advisor Collector 5.7 and 5.7.1 on Solaris SPARC platforms uses weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors. EMC Data Protection Advisor Collector v5.7 y v5.7.1 en plataformas Solaris SPARC utiliza permisos débiles para archivos no específicos,lo que permite a usuarios locales conseguir privilegios a través de vectores desconocidos. EMC Data Protection Advisor Collector for Solaris SPARC contains a potential security vulnerabili... • http://secunia.com/advisories/43893 • CWE-264: Permissions, Privileges, and Access Controls •