Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
emc avamar 6.0 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2013-0945
EMC Avamar Client prior to 6.1.101-89 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle malicious users to spoof SSL servers via an arbitrary valid...
Emc Avamar 5.0
Emc Avamar 5.0.4-26
Emc Avamar 5.0.0-407
Emc Avamar 6.0
Emc Avamar 4.0
Emc Avamar
Emc Avamar 4.1
9
CVSSv2
CVE-2013-3274
EMC Avamar Server and Avamar Virtual Edition prior to 7.0 on Data Store Gen3, Gen4, and Gen4s platforms do not properly determine authorization for calls to Java RMI methods, which allows remote authenticated users to execute arbitrary code via unspecified vectors.
Emc Avamar Server Virtual Edition 5.0
Emc Avamar Server 4.1
Emc Avamar Server 6.0
Emc Avamar Server
Emc Avamar Server Virtual Edition 4.0
Emc Avamar Server Virtual Edition 6.0
Emc Avamar Server 5.0
Emc Avamar Server 4.0
Emc Avamar Server Virtual Edition 4.1
Emc Avamar Server Virtual Edition
7.7
CVSSv2
CVE-2011-1740
EMC Avamar 4.x, 5.0.x, and 6.0.x prior to 6.0.0-592 allows remote authenticated users to modify client data or obtain sensitive information about product activities by leveraging privileged access to a different domain.
Emc Avamar 5.0.4-26
Emc Avamar 6.0
Emc Avamar 4.1
Emc Avamar 5.0.0-407
Emc Avamar 5.0
Emc Avamar 4.0
7.2
CVSSv2
CVE-2012-2291
EMC Avamar Client 4.x, 5.x, and 6.x on HP-UX and Mac OS X, and the EMC Avamar plugin 4.x, 5.x, and 6.x for Oracle, uses world-writable permissions for cache directories, which allows local users to gain privileges via an unspecified symlink attack.
Emc Avamar 5.0
Emc Avamar 5.0.0-407
Emc Avamar 4.0
Emc Avamar 4.1
Emc Avamar 5.0.4-26
Emc Avamar 6.0
Emc Avamar Plugin 4.0
Emc Avamar Plugin 6.0
Emc Avamar Plugin 5.0
Emc Avamar Plugin 6.1
5
CVSSv2
CVE-2014-4624
EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x up to and including 7.0.2-43 do not require authentication for Java API calls, which allows remote malicious users to discover grid MCUser and GSAN passwords via a crafted call.
Avamar Virtual Edition 6.0
Avamar Virtual Edition 6.0.402
Avamar Virtual Edition 7.0
Avamar Virtual Edition 7.0.2-43
4.3
CVSSv2
CVE-2014-4623
EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening prior to 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent malicious users to obtain cleartext p...
Emc Avamar 6.0.1
Emc Avamar 7.0
Emc Avamar 6.0.2
Emc Avamar 6.0.3
Emc Avamar 6.1
Emc Avamar 6.1.101-87
4.3
CVSSv2
CVE-2013-3275
EMC Avamar Server and Avamar Virtual Edition prior to 7.0 on Data Store Gen3, Gen4, and Gen4s platforms do not properly restrict use of FRAME elements, which makes it easier for remote malicious users to obtain sensitive information via a crafted web site, related to "cross ...
Emc Avamar Server
Emc Avamar Server 5.0
Emc Avamar Server Virtual Edition
Emc Avamar Server 4.0
Emc Avamar Server Virtual Edition 4.0
Emc Avamar Server Virtual Edition 4.1
Emc Avamar Server Virtual Edition 6.0
Emc Avamar Server 4.1
Emc Avamar Server Virtual Edition 5.0
Emc Avamar Server 6.0
3.5
CVSSv2
CVE-2013-0944
The web-based file-restore interface in EMC Avamar Server prior to 6.1.0 allows remote authenticated users to read arbitrary files via a crafted URL.
Emc Avamar 6.0.2
Emc Avamar 6.0.3
Emc Avamar 5.0
Emc Avamar 5.0.0-407
Emc Avamar 6.0.1
Emc Avamar 5.0.4-26
Emc Avamar 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started