All the vulnerabilites related to emc - replication_manager
Vulnerability from fkie_nvd
Published
2016-10-05 01:59
Modified
2024-11-21 02:42
Severity ?
Summary
The client in EMC Replication Manager (RM) before 5.5.3.0_01-PatchHotfix, EMC Network Module for Microsoft 3.x, and EMC Networker Module for Microsoft 8.2.x before 8.2.3.6 allows remote RM servers to execute arbitrary commands by placing a crafted script in an SMB share.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
emc | networker_module_for_microsoft_applications | * | |
emc | networker_module_for_microsoft_applications | 3.0 | |
emc | networker_module_for_microsoft_applications | 3.0.1 | |
emc | replication_manager | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emc:networker_module_for_microsoft_applications:*:*:*:*:*:*:*:*", "matchCriteriaId": "D98D85D3-42B9-4552-9DB9-6DCE1CB41958", "versionEndIncluding": "8.2.3.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:networker_module_for_microsoft_applications:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2F6B128-7AB5-490B-B104-49EC7ECEA7AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:networker_module_for_microsoft_applications:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9C2D3BBD-BD95-4ECB-84BF-443C792985C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:replication_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "74EA0D77-A27C-452C-AA15-0455A95BE908", "versionEndIncluding": "5.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The client in EMC Replication Manager (RM) before 5.5.3.0_01-PatchHotfix, EMC Network Module for Microsoft 3.x, and EMC Networker Module for Microsoft 8.2.x before 8.2.3.6 allows remote RM servers to execute arbitrary commands by placing a crafted script in an SMB share." }, { "lang": "es", "value": "El cliente en EMC Replication Manager (RM) en versiones anteriores a 5.5.3.0_01-PatchHotfix, EMC Network Module para Microsoft 3.x y EMC Networker Module para Microsoft 8.2.x en versiones anteriores a 8.2.3.6 permite a servidores RM remotos ejecutar comandos arbitrarios colocando una secuencia de comandos manipulada en un recurso compartido SMB." } ], "id": "CVE-2016-0913", "lastModified": "2024-11-21T02:42:37.527", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-10-05T01:59:05.823", "references": [ { "source": "security_alert@emc.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/bugtraq/2016/Oct/6" }, { "source": "security_alert@emc.com", "url": "http://www.securityfocus.com/bid/93348" }, { "source": "security_alert@emc.com", "url": "http://www.securitytracker.com/id/1036940" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/bugtraq/2016/Oct/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/93348" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036940" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 18:00
Modified
2024-11-21 01:24
Severity ?
Summary
The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
emc | replication_manager | * | |
emc | replication_manager | 2.0 | |
emc | replication_manager | 5.2 | |
emc | replication_manager | 5.2.2 | |
emc | networker_module | 2.1 | |
emc | networker_module | 2.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emc:replication_manager:*:*:client:*:*:*:*:*", "matchCriteriaId": "DC7703AF-CF4C-4DBA-8538-E4839054A443", "versionEndIncluding": "5.2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:replication_manager:2.0:*:client:*:*:*:*:*", "matchCriteriaId": "E73C5C32-9C5B-451A-80E0-D716CD21713C", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:replication_manager:5.2:*:client:*:*:*:*:*", "matchCriteriaId": "328ADEA6-6E22-492C-8309-9622455AEBCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:replication_manager:5.2.2:*:client:*:*:*:*:*", "matchCriteriaId": "4FA3660A-D710-4E74-9160-E97BE6B63BC2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emc:networker_module:2.1:-:microsoft_applications:*:*:*:*:*", "matchCriteriaId": "8F906A50-FC68-4807-BF0E-880E5DDD698B", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:networker_module:2.2:-:microsoft_applications:*:*:*:*:*", "matchCriteriaId": "6CB14856-A203-466A-9F9E-DF9470A74EC7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542." }, { "lang": "es", "value": "El servicio irccd.exe en EMC Replication Manager Client anterior de v5.3 y NetWorker Module para Microsoft Applications v2.1.x y v2.2.x permite a atacantes remotos ejecutar comandos de su elecci\u00f3n a trav\u00e9s de la funci\u00f3n RunProgram al puerto TCP 6542." } ], "id": "CVE-2011-0647", "lastModified": "2024-11-21T01:24:31.840", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-10T18:00:59.083", "references": [ { "source": "security_alert@emc.com", "url": "http://osvdb.org/70853" }, { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43164" }, { "source": "security_alert@emc.com", "url": "http://www.securityfocus.com/archive/1/516260" }, { "source": "security_alert@emc.com", "url": "http://www.securityfocus.com/archive/1/516282/100/0/threaded" }, { "source": "security_alert@emc.com", "url": "http://www.securityfocus.com/bid/46235" }, { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0304" }, { "source": "security_alert@emc.com", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-061/" }, { "source": "security_alert@emc.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65205" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/70853" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516260" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516282/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-061/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65205" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-30 15:59
Modified
2024-11-21 02:10
Severity ?
Summary
Unquoted Windows search path vulnerability in EMC Replication Manager through 5.5.2 and AppSync before 2.1.0 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
emc | appsync | * | |
emc | replication_manager | * | |
emc | replication_manager | 5.0 | |
emc | replication_manager | 5.1 | |
emc | replication_manager | 5.2 | |
emc | replication_manager | 5.3 | |
emc | replication_manager | 5.4 | |
emc | replication_manager | 5.4.3 | |
emc | replication_manager | 5.5 | |
emc | replication_manager | 5.5.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emc:appsync:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2187CCC-728C-4057-BD25-617EA608E0B1", "versionEndIncluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emc:replication_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "9302592F-8719-48DA-8FB8-00AC9F579FB4", "versionEndIncluding": "5.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:replication_manager:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "6460E0E2-BBCD-4E55-B3DA-9531D574F88D", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:replication_manager:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "6E8F2448-EF8E-4F15-9AB0-7EC0A0C11E86", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:replication_manager:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "3EF5CE77-3BAF-4A2B-B85C-85DC523144C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:replication_manager:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "AC46A080-A8EB-464E-B2C3-CEDC6E4ECB33", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:replication_manager:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "0835F326-D195-4F26-A788-B4FFE26DC6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:replication_manager:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8D03792-F608-41FF-A954-61771AEE53DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:replication_manager:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "59A19960-5B9B-42A5-A302-8ECB5C2D4A1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:replication_manager:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "048D38E4-8718-4170-A2E3-602248E8F3E4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unquoted Windows search path vulnerability in EMC Replication Manager through 5.5.2 and AppSync before 2.1.0 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character." }, { "lang": "es", "value": "Vulnerabilidad de b\u00fasqueda de ruta en Windows sin entrecomillar en EMC Replication Manager a trav\u00e9s de 5.5.2 y AppSync anterior a 2.1.0 permite a usuarios locales obtener privilegios a trav\u00e9s de un troyano con el nombre compuesto por una subcadena inicial de una ruta que contiene el car\u00e1cter de espacio." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/428.html\" target=\"_blank\"\u003eCWE-428: Unquoted Search Path or Element\u003c/a\u003e", "id": "CVE-2014-4634", "lastModified": "2024-11-21T02:10:36.803", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-30T15:59:01.483", "references": [ { "source": "security_alert@emc.com", "url": "http://archives.neohapsis.com/archives/bugtraq/2014-12/0170.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2014-12/0170.html" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-08 20:55
Modified
2024-11-21 01:53
Severity ?
Summary
EMC Replication Manager (RM) before 5.4.4 places encoded passwords in application log files, which makes it easier for local users to obtain sensitive information by reading a file and conducting an unspecified decoding attack.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
emc | replication_manager | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emc:replication_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6C478B0-91F8-4C55-B31E-EC8D697E0174", "versionEndIncluding": "5.4.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "EMC Replication Manager (RM) before 5.4.4 places encoded passwords in application log files, which makes it easier for local users to obtain sensitive information by reading a file and conducting an unspecified decoding attack." }, { "lang": "es", "value": "EMC Replication Manager (RM) anterior a v5.4.4 codifica las contrase\u00f1as en los archivos de registro de aplicaci\u00f3n, que hace m\u00e1s f\u00e1cil para los usuarios locales obtener informaci\u00f3n sensible mediante la lectura de un fichero y la realizaci\u00f3n de un ataque de decodificaci\u00f3n sin especificar." } ], "id": "CVE-2013-3272", "lastModified": "2024-11-21T01:53:18.723", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-08T20:55:01.150", "references": [ { "source": "security_alert@emc.com", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0045.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0045.html" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-12-28 04:53
Modified
2024-11-21 01:58
Severity ?
Summary
Unquoted Windows search path vulnerability in EMC Replication Manager before 5.5 allows local users to gain privileges via a crafted application in a parent directory of an intended directory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
emc | replication_manager | * | |
emc | replication_manager | 5.0 | |
emc | replication_manager | 5.1 | |
emc | replication_manager | 5.2 | |
emc | replication_manager | 5.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emc:replication_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABFCC480-13B4-4F67-81D8-4FB395AFBA55", "versionEndIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:replication_manager:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "6460E0E2-BBCD-4E55-B3DA-9531D574F88D", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:replication_manager:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "6E8F2448-EF8E-4F15-9AB0-7EC0A0C11E86", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:replication_manager:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "3EF5CE77-3BAF-4A2B-B85C-85DC523144C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:emc:replication_manager:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "AC46A080-A8EB-464E-B2C3-CEDC6E4ECB33", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unquoted Windows search path vulnerability in EMC Replication Manager before 5.5 allows local users to gain privileges via a crafted application in a parent directory of an intended directory." }, { "lang": "es", "value": "Vulnerabilidad de b\u00fasqueda de ruta de EMC Replication Manager antes de 5,5 que permite a usuarios locales conseguir privilegios a trav\u00e9s de una aplicaci\u00f3n dise\u00f1ada en un directorio padre de un directorio previsto." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/428.html\n\n\"CWE-428: Unquoted Search Path or Element\"", "id": "CVE-2013-6182", "lastModified": "2024-11-21T01:58:47.613", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-12-28T04:53:06.583", "references": [ { "source": "security_alert@emc.com", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0139.html" }, { "source": "security_alert@emc.com", "url": "http://osvdb.org/101430" }, { "source": "security_alert@emc.com", "url": "http://packetstormsecurity.com/files/124584/EMC-Replication-Manager-Unquoted-File-Path-Enumeration.html" }, { "source": "security_alert@emc.com", "url": "http://www.securityfocus.com/bid/64520" }, { "source": "security_alert@emc.com", "url": "http://www.securitytracker.com/id/1029536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0139.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/101430" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/124584/EMC-Replication-Manager-Unquoted-File-Path-Enumeration.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/64520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029536" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2013-6182
Vulnerability from cvelistv5
Published
2013-12-28 02:00
Modified
2024-08-06 17:29
Severity ?
EPSS score ?
Summary
Unquoted Windows search path vulnerability in EMC Replication Manager before 5.5 allows local users to gain privileges via a crafted application in a parent directory of an intended directory.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/64520 | vdb-entry, x_refsource_BID | |
http://archives.neohapsis.com/archives/bugtraq/2013-12/0139.html | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/124584/EMC-Replication-Manager-Unquoted-File-Path-Enumeration.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1029536 | vdb-entry, x_refsource_SECTRACK | |
http://osvdb.org/101430 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:29:43.147Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "64520", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64520" }, { "name": "20131224 ESA-2013-092: EMC Replication Manager Unquoted File Path Enumeration Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0139.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://packetstormsecurity.com/files/124584/EMC-Replication-Manager-Unquoted-File-Path-Enumeration.html" }, { "name": "1029536", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029536" }, { "name": "101430", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/101430" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-12-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Unquoted Windows search path vulnerability in EMC Replication Manager before 5.5 allows local users to gain privileges via a crafted application in a parent directory of an intended directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-01-06T14:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "name": "64520", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64520" }, { "name": "20131224 ESA-2013-092: EMC Replication Manager Unquoted File Path Enumeration Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0139.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://packetstormsecurity.com/files/124584/EMC-Replication-Manager-Unquoted-File-Path-Enumeration.html" }, { "name": "1029536", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029536" }, { "name": "101430", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/101430" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2013-6182", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unquoted Windows search path vulnerability in EMC Replication Manager before 5.5 allows local users to gain privileges via a crafted application in a parent directory of an intended directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "64520", "refsource": "BID", "url": "http://www.securityfocus.com/bid/64520" }, { "name": "20131224 ESA-2013-092: EMC Replication Manager Unquoted File Path Enumeration Vulnerability", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0139.html" }, { "name": "http://packetstormsecurity.com/files/124584/EMC-Replication-Manager-Unquoted-File-Path-Enumeration.html", "refsource": "CONFIRM", "url": "http://packetstormsecurity.com/files/124584/EMC-Replication-Manager-Unquoted-File-Path-Enumeration.html" }, { "name": "1029536", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029536" }, { "name": "101430", "refsource": "OSVDB", "url": "http://osvdb.org/101430" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2013-6182", "datePublished": "2013-12-28T02:00:00", "dateReserved": "2013-10-21T00:00:00", "dateUpdated": "2024-08-06T17:29:43.147Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3272
Vulnerability from cvelistv5
Published
2013-07-08 20:00
Modified
2024-09-16 22:44
Severity ?
EPSS score ?
Summary
EMC Replication Manager (RM) before 5.4.4 places encoded passwords in application log files, which makes it easier for local users to obtain sensitive information by reading a file and conducting an unspecified decoding attack.
References
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2013-07/0045.html | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:36.678Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20130705 ESA-2013-050: EMC Replication Manager Sensitive Information Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0045.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "EMC Replication Manager (RM) before 5.4.4 places encoded passwords in application log files, which makes it easier for local users to obtain sensitive information by reading a file and conducting an unspecified decoding attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-07-08T20:00:00Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "name": "20130705 ESA-2013-050: EMC Replication Manager Sensitive Information Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0045.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2013-3272", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "EMC Replication Manager (RM) before 5.4.4 places encoded passwords in application log files, which makes it easier for local users to obtain sensitive information by reading a file and conducting an unspecified decoding attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20130705 ESA-2013-050: EMC Replication Manager Sensitive Information Disclosure Vulnerability", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0045.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2013-3272", "datePublished": "2013-07-08T20:00:00Z", "dateReserved": "2013-04-26T00:00:00Z", "dateUpdated": "2024-09-16T22:44:57.312Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-4634
Vulnerability from cvelistv5
Published
2014-12-30 15:00
Modified
2024-08-06 11:20
Severity ?
EPSS score ?
Summary
Unquoted Windows search path vulnerability in EMC Replication Manager through 5.5.2 and AppSync before 2.1.0 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.
References
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2014-12/0170.html | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:20:26.673Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20141230 ESA-2014-179: EMC Replication Manager and EMC AppSync Unquoted Service Path Enumeration Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2014-12/0170.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Unquoted Windows search path vulnerability in EMC Replication Manager through 5.5.2 and AppSync before 2.1.0 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-12-30T14:57:00", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "name": "20141230 ESA-2014-179: EMC Replication Manager and EMC AppSync Unquoted Service Path Enumeration Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2014-12/0170.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2014-4634", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unquoted Windows search path vulnerability in EMC Replication Manager through 5.5.2 and AppSync before 2.1.0 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20141230 ESA-2014-179: EMC Replication Manager and EMC AppSync Unquoted Service Path Enumeration Vulnerability", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2014-12/0170.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2014-4634", "datePublished": "2014-12-30T15:00:00", "dateReserved": "2014-06-24T00:00:00", "dateUpdated": "2024-08-06T11:20:26.673Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0647
Vulnerability from cvelistv5
Published
2011-02-10 17:00
Modified
2024-08-06 21:58
Severity ?
EPSS score ?
Summary
The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/516260 | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/43164 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/46235 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65205 | vdb-entry, x_refsource_XF | |
http://osvdb.org/70853 | vdb-entry, x_refsource_OSVDB | |
http://www.vupen.com/english/advisories/2011/0304 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/516282/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.zerodayinitiative.com/advisories/ZDI-11-061/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:25.940Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110208 ESA-2011-004: EMC Replication Manager remote code execution vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516260" }, { "name": "43164", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43164" }, { "name": "46235", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46235" }, { "name": "replicationmanager-irccd-code-execution(65205)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65205" }, { "name": "70853", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/70853" }, { "name": "ADV-2011-0304", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0304" }, { "name": "20110207 ZDI-11-061: EMC Replication Manager Client irccd.exe Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516282/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-061/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "name": "20110208 ESA-2011-004: EMC Replication Manager remote code execution vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516260" }, { "name": "43164", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43164" }, { "name": "46235", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46235" }, { "name": "replicationmanager-irccd-code-execution(65205)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65205" }, { "name": "70853", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/70853" }, { "name": "ADV-2011-0304", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0304" }, { "name": "20110207 ZDI-11-061: EMC Replication Manager Client irccd.exe Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516282/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-061/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2011-0647", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110208 ESA-2011-004: EMC Replication Manager remote code execution vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516260" }, { "name": "43164", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43164" }, { "name": "46235", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46235" }, { "name": "replicationmanager-irccd-code-execution(65205)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65205" }, { "name": "70853", "refsource": "OSVDB", "url": "http://osvdb.org/70853" }, { "name": "ADV-2011-0304", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0304" }, { "name": "20110207 ZDI-11-061: EMC Replication Manager Client irccd.exe Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516282/100/0/threaded" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-11-061/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-061/" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2011-0647", "datePublished": "2011-02-10T17:00:00", "dateReserved": "2011-01-25T00:00:00", "dateUpdated": "2024-08-06T21:58:25.940Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-0913
Vulnerability from cvelistv5
Published
2016-10-05 01:00
Modified
2024-08-05 22:38
Severity ?
EPSS score ?
Summary
The client in EMC Replication Manager (RM) before 5.5.3.0_01-PatchHotfix, EMC Network Module for Microsoft 3.x, and EMC Networker Module for Microsoft 8.2.x before 8.2.3.6 allows remote RM servers to execute arbitrary commands by placing a crafted script in an SMB share.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1036940 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/93348 | vdb-entry, x_refsource_BID | |
http://seclists.org/bugtraq/2016/Oct/6 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:38:41.015Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1036940", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036940" }, { "name": "93348", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93348" }, { "name": "20161004 ESA-2016-063: EMC Replication Manager and Network Module for Microsoft Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://seclists.org/bugtraq/2016/Oct/6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The client in EMC Replication Manager (RM) before 5.5.3.0_01-PatchHotfix, EMC Network Module for Microsoft 3.x, and EMC Networker Module for Microsoft 8.2.x before 8.2.3.6 allows remote RM servers to execute arbitrary commands by placing a crafted script in an SMB share." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-29T09:57:01", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "name": "1036940", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036940" }, { "name": "93348", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93348" }, { "name": "20161004 ESA-2016-063: EMC Replication Manager and Network Module for Microsoft Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://seclists.org/bugtraq/2016/Oct/6" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security_alert@emc.com", "ID": "CVE-2016-0913", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The client in EMC Replication Manager (RM) before 5.5.3.0_01-PatchHotfix, EMC Network Module for Microsoft 3.x, and EMC Networker Module for Microsoft 8.2.x before 8.2.3.6 allows remote RM servers to execute arbitrary commands by placing a crafted script in an SMB share." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1036940", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036940" }, { "name": "93348", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93348" }, { "name": "20161004 ESA-2016-063: EMC Replication Manager and Network Module for Microsoft Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://seclists.org/bugtraq/2016/Oct/6" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2016-0913", "datePublished": "2016-10-05T01:00:00", "dateReserved": "2015-12-17T00:00:00", "dateUpdated": "2024-08-05T22:38:41.015Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }