Vulnerabilities (CVE)

Filtered by vendor Emc Subscribe
Total 416 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2008-4916 2 Emc, Vmware 7 Vmware Player, Vmware Ace, Vmware Esx and 4 more 2024-11-21 4.6 MEDIUM N/A
Unspecified vulnerability in a guest virtual device driver in VMware Workstation before 5.5.9 build 126128, and 6.5.1 and earlier 6.x versions; VMware Player before 1.0.9 build 126128, and 2.5.1 and earlier 2.x versions; VMware ACE before 1.0.8 build 125922, and 2.5.1 and earlier 2.x versions; VMware Server 1.x before 1.0.8 build 126538 and 2.0.x before 2.0.1 build 156745; VMware Fusion before 2.0.1; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to cause a denial of service (host OS crash) via unknown vectors.
CVE-2008-3685 1 Emc 1 Documentum Applicationxtender Workflow Manager 2024-11-21 10.0 HIGH N/A
Directory traversal vulnerability in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to upload arbitrary files, and execute arbitrary code, via directory traversal sequences in requests to TCP port 2606.
CVE-2008-3684 1 Emc 1 Documentum Applicationxtender 2024-11-21 10.0 HIGH N/A
Heap-based buffer overflow in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to execute arbitrary code via crafted packet data to TCP port 2606.
CVE-2008-3370 1 Emc 1 Centera Universal Access 2024-11-21 7.5 HIGH N/A
SQL injection vulnerability in the CUA Login Module in EMC Centera Universal Access (CUA) 4.0_4735.p4 allows remote attackers to execute arbitrary SQL commands via the user (user name) field.
CVE-2008-3288 1 Emc 1 Dantz Retrospect Backup Server 2024-11-21 5.0 MEDIUM N/A
The Server Authentication Module in EMC Dantz Retrospect Backup Server 7.5.508 uses a "weak hash algorithm," which makes it easier for context-dependent attackers to recover passwords.
CVE-2008-0963 1 Emc 1 Diskxtender 2024-11-21 9.0 HIGH N/A
Format string vulnerability in EMC DiskXtender MediaStor 6.20.060 allows remote authenticated users to execute arbitrary code via a crafted message to the RPC interface.
CVE-2008-0962 1 Emc 1 Diskxtender 2024-11-21 9.0 HIGH N/A
Stack-based buffer overflow in the File System Manager for EMC DiskXtender 6.20.060 allows remote authenticated users to execute arbitrary code via a crafted request to the RPC interface.
CVE-2008-0961 1 Emc 1 Diskxtender 2024-11-21 10.0 HIGH 9.8 CRITICAL
EMV DiskXtender 6.20.060 has a hard-coded login and password, which allows remote attackers to bypass authentication via the RPC interface.
CVE-2008-0656 1 Emc 2 Documentum Administrator, Documentum Webtop 2024-11-21 10.0 HIGH N/A
Unrestricted file upload vulnerability in dmclTrace.jsp in EMC Documentum Administrator 5.3.0.313 and Webtop 5.3.0.317 allows remote attackers to overwrite arbitrary files via the filename attribute.
CVE-2007-6426 1 Emc 1 Replistor 2024-11-21 7.8 HIGH N/A
Multiple heap-based buffer overflows in EMC RepliStor 6.2 SP2, and possibly earlier versions, allow remote attackers to execute arbitrary code via crafted compressed data.
CVE-2007-5323 1 Emc 1 Replistor 2024-11-21 10.0 HIGH N/A
The RepliStor Server Service in EMC Replistor 6.1.3 allows remote attackers to execute arbitrary code via a size value that causes RepliStor to create a smaller buffer than expected, which triggers a buffer overflow when that buffer is used in a recv function call.
CVE-2007-5024 1 Emc 1 Vmware Server 2024-11-21 2.1 LOW N/A
EMC VMware Server before 1.0.4 Build 56528 writes passwords in cleartext to unspecified log files, which allows local users to obtain sensitive information by reading these files, a different vulnerability than CVE-2005-3620.
CVE-2007-4155 1 Emc 1 Vmware 2024-11-21 9.3 HIGH N/A
Absolute path traversal vulnerability in a certain ActiveX control in vielib.dll in EMC VMware 6.0.0 allows remote attackers to execute arbitrary local programs via a full pathname in the first two arguments to the (1) CreateProcess or (2) CreateProcessEx method.
CVE-2007-4058 1 Emc 1 Vmware 2024-11-21 4.3 MEDIUM N/A
Absolute path traversal vulnerability in a certain ActiveX control in vielib.dll 2.2.5.42958 in EMC VMware 6.0.0 allows remote attackers to execute arbitrary local programs via a full pathname in the first argument to the StartProcess method.
CVE-2007-3618 1 Emc 1 Legato Networker 2024-11-21 9.3 HIGH N/A
Stack-based buffer overflow in the NetWorker Remote Exec Service (nsrexecd.exe) in EMC Software NetWorker 7.x.x allows remote attackers to execute arbitrary code via a (1) poll or (2) kill request with a "long invalid subcmd."
CVE-2006-7201 1 Emc 1 Rsa Security Sitekey 2024-11-21 9.3 HIGH N/A
EMC RSA Security SiteKey does not set the secure qualifier on the SiteKey Flash token (aka the PassMark Flash shared object), which might allow remote attackers to obtain the token via HTTP.
CVE-2006-7200 1 Emc 1 Rsa Security Sitekey 2024-11-21 9.0 HIGH N/A
EMC RSA Security SiteKey issues challenge-bypass tokens that persist forever without a cancellation interface for end users, which makes it easier for attackers to bypass one stage of authentication by stealing and replaying a token.
CVE-2006-7199 1 Emc 1 Rsa Security Sitekey 2024-11-21 8.5 HIGH N/A
EMC RSA Security SiteKey allows remote attackers to display the correct image via a man-in-the-middle (MITM) attack in which an attacker-controlled server proxies authentication data to and from a legitimate SiteKey server. NOTE: the vendor disputes the severity of the issue, stating that it is easier to monitor this attack than "attacks against static web pages."
CVE-2006-3892 1 Emc 1 Networker 2024-11-21 10.0 HIGH N/A
The Management Console server in EMC NetWorker (formerly Legato NetWorker) 7.3.2 before Jumbo Update 1 uses weak authentication, which allows remote attackers to execute arbitrary commands.
CVE-2006-2391 1 Emc 1 Retrospect Client 2024-11-21 7.5 HIGH N/A
Buffer overflow in EMC Retrospect Client 5.1 through 7.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet to port 497.