Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
emc networker module for microsoft applications 2.4 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2012-2290
The client in EMC NetWorker Module for Microsoft Applications (NMM) 2.2.1, 2.3 before build 122, and 2.4 before build 375 allows remote malicious users to execute arbitrary code by sending a crafted message over a TCP communication channel.
Emc Networker Module For Microsoft Applications 2.3
Emc Networker Module For Microsoft Applications 2.2.1
Emc Networker Module For Microsoft Applications 2.4
7.8
CVSSv2
CVE-2008-6219
nsrexecd.exe in multiple EMC Networker products including EMC NetWorker Server, Storage Node, and Client 7.3.x and 7.4, 7.4.1, 7.4.2, Client and Storage Node for Open VMS 7.3.2 ECO6 and previous versions, Module for Microsoft Exchange 5.1 and previous versions, Module for Microso...
Emc Networker Client 7.4.2
Emc Networker Server 7.4.1
Emc Networker Module
Emc Networker Storage Node 7.4.1
Emc Networker Client
Emc Networker Server 7.4.2
Emc Networker Server 7.4
Emc Networker Client 7.4
Emc Networker Server
Emc Networker Storage Node
Emc Networker Storage Node 7.4.2
Emc Networker Storage Node 7.4
Emc Networker Client 7.4.1
Emc Networker Powersnap
2.1
CVSSv2
CVE-2012-2284
The (1) install and (2) upgrade processes in EMC NetWorker Module for Microsoft Applications (NMM) 2.2.1, 2.3 before build 122, and 2.4 before build 375, when Exchange Server is used, allow local users to read cleartext administrator credentials via unspecified vectors.
Emc Networker Module For Microsoft Applications 2.2.1
Emc Networker Module For Microsoft Applications 2.3
Emc Networker Module For Microsoft Applications 2.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started