Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
emc legato networker 6.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2005-3658
Multiple heap-based buffer overflows in EMC Legato NetWorker 7.1.x prior to 7.1.4 and 7.2.x prior to 7.2.1.Build.314, and other products such as Sun Solstice Backup (SBU) 6.0 and 6.1 and StorEdge Enterprise Backup Software (EBS) 7.1 up to and including 7.2L, allow remote maliciou...
Emc Legato Networker 7.1.1
Emc Legato Networker 7.1.2
Emc Legato Networker 7.1.3
Emc Legato Networker 7.2 Build172
Emc Legato Networker 7.2
Emc Legato Networker 7.2.1
5
CVSSv2
CVE-2005-3659
nsrd.exe in EMC Legato NetWorker 7.1.x prior to 7.1.4 and 7.2.x prior to 7.2.1.Build.314, and other products such as Sun Solstice Backup (SBU) 6.0 and 6.1 and StorEdge Enterprise Backup Software (EBS) 7.1 up to and including 7.2L, allows remote malicious users to cause a denial o...
Emc Legato Networker 7.2.1
Emc Legato Networker 7.2 Build172
Emc Legato Networker 7.2
7.5
CVSSv2
CVE-2005-0357
EMC Legato NetWorker, Sun Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 7.0 up to and including 7.2 rely on AUTH_UNIX authentication, which relies on user ID for authentication and allows remote malicious users to bypass authentication and gain privileges by spoofin...
Emc Legato Networker 4.2.2
Sun Storedge Enterprise Backup Software 7.0
Sun Storedge Enterprise Backup Software 7.1
Emc Legato Networker 7.13
Emc Legato Networker 7.2
Sun Solstice Backup 6.0
Sun Solstice Backup 6.1
Emc Legato Networker 6.0
Emc Legato Networker 6.1
Sun Storedge Enterprise Backup Software 7.2
7.5
CVSSv2
CVE-2005-0358
EMC Legato NetWorker, Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 6.0 up to and including 7.2 do not properly verify authentication tokens, which allows remote malicious users to gain privileges by modifying an authentication token.
Emc Legato Networker 7.2
Sun Solstice Backup 6.0
Emc Legato Networker 4.2.2
Emc Legato Networker 6.0
Sun Storedge Enterprise Backup Software 7.1
Sun Storedge Enterprise Backup Software 7.2
Emc Legato Networker 6.1
Emc Legato Networker 7.13
Sun Solstice Backup 6.1
Sun Storedge Enterprise Backup Software 7.0
6.4
CVSSv2
CVE-2005-0359
The Legato PortMapper in EMC Legato NetWorker, Sun Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 7.0 up to and including 7.2 does not restrict access to the pmap_set and pmap_unset commands, which allows remote malicious users to (1) cause a denial of service by usi...
Emc Legato Networker 6.1
Emc Legato Networker 7.13
Sun Solstice Backup 6.1
Sun Storedge Enterprise Backup Software 7.0
Emc Legato Networker 4.2.2
Emc Legato Networker 6.0
Sun Storedge Enterprise Backup Software 7.1
Sun Storedge Enterprise Backup Software 7.2
Emc Legato Networker 7.2
Sun Solstice Backup 6.0
4.6
CVSSv2
CVE-2002-0113
EMC NetWorker (formerly Legato NetWorker) prior to 7.0 stores log files in the /nsr/logs/ directory with world-readable permissions, which allows local users to read sensitive information and possibly gain privileges. NOTE: this was originally reported for Legato NetWorker 6.1 on...
Emc Networker 6.1
4.6
CVSSv2
CVE-2002-0114
EMC NetWorker (formerly Legato NetWorker) prior to 7.0 stores passwords in plaintext in the daemon.log file, which allows local users to gain privileges by reading the password from the file. NOTE: this was originally reported for Legato NetWorker 6.1 on the Solaris 7 platform.
Emc Networker 6.1
7.5
CVSSv2
CVE-2001-0910
Legato Networker prior to 6.1 allows remote malicious users to bypass access restrictions and gain privileges on the Networker interface by spoofing the admin server name and IP address and connecting to Networker from an IP address whose hostname can not be determined by a DNS r...
Emc Networker 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started