Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
emc avamar data store vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2016-8214
EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) versions 7.3.0 and 7.3.1 contain a vulnerability that may allow malicious administrators to compromise Avamar servers.
Emc Avamar Virtual Edition 7.3.1
Emc Avamar Virtual Edition 7.3.0
Emc Avamar Data Store 7.3.1
Emc Avamar Data Store 7.3.0
7.2
CVSSv2
CVE-2016-0909
EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) versions 7.3 and older contain a vulnerability that may expose the Avamar servers to potentially be compromised by malicious users.
Emc Avamar Data Store
Emc Avamar Server Virtual Edition
4.3
CVSSv2
CVE-2014-4623
EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening prior to 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent malicious users to obtain cleartext p...
Emc Avamar 6.0.1
Emc Avamar 7.0
Emc Avamar 6.0.2
Emc Avamar 6.0.3
Emc Avamar 6.1
Emc Avamar 6.1.101-87
9
CVSSv2
CVE-2013-3274
EMC Avamar Server and Avamar Virtual Edition prior to 7.0 on Data Store Gen3, Gen4, and Gen4s platforms do not properly determine authorization for calls to Java RMI methods, which allows remote authenticated users to execute arbitrary code via unspecified vectors.
Emc Avamar Server Virtual Edition 5.0
Emc Avamar Server 4.1
Emc Avamar Server 6.0
Emc Avamar Server
Emc Avamar Server Virtual Edition 4.0
Emc Avamar Server Virtual Edition 6.0
Emc Avamar Server 5.0
Emc Avamar Server 4.0
Emc Avamar Server Virtual Edition 4.1
Emc Avamar Server Virtual Edition
4.3
CVSSv2
CVE-2013-3275
EMC Avamar Server and Avamar Virtual Edition prior to 7.0 on Data Store Gen3, Gen4, and Gen4s platforms do not properly restrict use of FRAME elements, which makes it easier for remote malicious users to obtain sensitive information via a crafted web site, related to "cross ...
Emc Avamar Server
Emc Avamar Server 5.0
Emc Avamar Server Virtual Edition
Emc Avamar Server 4.0
Emc Avamar Server Virtual Edition 4.0
Emc Avamar Server Virtual Edition 4.1
Emc Avamar Server Virtual Edition 6.0
Emc Avamar Server 4.1
Emc Avamar Server Virtual Edition 5.0
Emc Avamar Server 6.0
6.5
CVSSv2
CVE-2016-0906
The web-restore interface in Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) in EMC Avamar up to and including 7.1.2 and 7.2.x up to and including 7.2.1 allows remote authenticated users to read or delete directories via a Linux backup-restore operation.
Emc Avamar
6.4
CVSSv2
CVE-2016-0903
Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) in EMC Avamar Server prior to 7.3.0-233 rely on client-side authentication, which allows remote malicious users to spoof clients and read backup data via a modified client agent.
Emc Avamar Server
7.2
CVSSv2
CVE-2016-0905
Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) in EMC Avamar Server prior to 7.3.0-233 allow local users to obtain root privileges by leveraging admin access and entering a sudo command.
Emc Avamar Server
7.2
CVSSv2
CVE-2016-0920
Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) in EMC Avamar Server prior to 7.3.0-233 allow local users to obtain root access via a crafted parameter to a command that is available in the sudo configuration.
Emc Avamar Server
6.9
CVSSv2
CVE-2016-0921
Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) in EMC Avamar Server prior to 7.3.0-233 use weak permissions for unspecified directories, which allows local users to obtain root access by replacing a script with a Trojan horse program.
Emc Avamar Server
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »