Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
emc networker module for microsoft applications 2.4 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2012-2290
The client in EMC NetWorker Module for Microsoft Applications (NMM) 2.2.1, 2.3 before build 122, and 2.4 before build 375 allows remote malicious users to execute arbitrary code by sending a crafted message over a TCP communication channel.
Emc Networker Module For Microsoft Applications 2.3
Emc Networker Module For Microsoft Applications 2.2.1
Emc Networker Module For Microsoft Applications 2.4
7.8
CVSSv2
CVE-2008-6219
nsrexecd.exe in multiple EMC Networker products including EMC NetWorker Server, Storage Node, and Client 7.3.x and 7.4, 7.4.1, 7.4.2, Client and Storage Node for Open VMS 7.3.2 ECO6 and previous versions, Module for Microsoft Exchange 5.1 and previous versions, Module for Microso...
Emc Networker Storage Node 7.4
Emc Networker Client 7.4.2
Emc Networker Storage Node
Emc Networker Module
Emc Networker Server 7.4.1
Emc Networker Server 7.4
Emc Networker Server
Emc Networker Powersnap
Emc Networker Storage Node 7.4.2
Emc Networker Storage Node 7.4.1
Emc Networker Client
Emc Networker Server 7.4.2
Emc Networker Client 7.4.1
Emc Networker Client 7.4
2.1
CVSSv2
CVE-2012-2284
The (1) install and (2) upgrade processes in EMC NetWorker Module for Microsoft Applications (NMM) 2.2.1, 2.3 before build 122, and 2.4 before build 375, when Exchange Server is used, allow local users to read cleartext administrator credentials via unspecified vectors.
Emc Networker Module For Microsoft Applications 2.4
Emc Networker Module For Microsoft Applications 2.3
Emc Networker Module For Microsoft Applications 2.2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started