Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
emc avamar 6.1 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2014-4623
EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening prior to 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent malicious users to obtain cleartext p...
Emc Avamar 6.0.1
Emc Avamar 7.0
Emc Avamar 6.0.2
Emc Avamar 6.0.3
Emc Avamar 6.1
Emc Avamar 6.1.101-87
7.2
CVSSv2
CVE-2012-2291
EMC Avamar Client 4.x, 5.x, and 6.x on HP-UX and Mac OS X, and the EMC Avamar plugin 4.x, 5.x, and 6.x for Oracle, uses world-writable permissions for cache directories, which allows local users to gain privileges via an unspecified symlink attack.
Emc Avamar 5.0
Emc Avamar 5.0.0-407
Emc Avamar 4.0
Emc Avamar 4.1
Emc Avamar 5.0.4-26
Emc Avamar 6.0
Emc Avamar Plugin 4.0
Emc Avamar Plugin 6.0
Emc Avamar Plugin 5.0
Emc Avamar Plugin 6.1
3.3
CVSSv2
CVE-2012-4610
EMC Avamar Client for VMware 6.1 stores the cleartext server root password on the proxy client, which might allow remote malicious users to obtain sensitive information by leveraging "network access" to the proxy client.
Emc Avamar 6.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3380
CVE-2024-1694
local file inclusion
CVE-2024-5645
CVE-2024-24919
XSS
CVE-2024-36774
CVE-2024-21306
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started