|ID||CVSS||Summary||Last (major) update||Published|
An issue was discovered in EMC Data Domain DD OS 5.7 family, versions prior to 184.108.40.206; EMC Data Domain DD OS 6.0 family, versions prior to 220.127.116.11; EMC Data Domain DD OS 6.1 family, versions prior to 18.104.22.168; EMC Data Domain Virtual Edition 2.0 fam
|20-12-2017 - 18:29||20-12-2017 - 18:29|
EMC Data Domain OS 5.2 through 5.7 before 22.214.171.124 and 6.0 before 126.96.36.199 is affected by a privilege escalation vulnerability that may potentially be exploited by attackers to compromise the affected system.
|05-05-2017 - 21:29||04-05-2017 - 10:29|
EMC Data Domain OS (DD OS) 5.4 all versions, EMC Data Domain OS (DD OS) 5.5 family all versions prior to 188.8.131.52, EMC Data Domain OS (DD OS) 5.6 family all versions prior to 184.108.40.206, EMC Data Domain OS (DD OS) 5.7 family all versions prior to 220.127.116.11
|14-03-2017 - 09:04||03-02-2017 - 02:59|
EMC Data Domain OS 5.4 through 5.7 before 18.104.22.168 has a default no_root_squash option for NFS exports, which makes it easier for remote attackers to obtain filesystem access by leveraging client root privileges.
|10-01-2017 - 23:13||19-06-2016 - 16:59|
EMC Data Domain OS 5.4 through 5.7 before 22.214.171.124 allows remote authenticated users to bypass intended password-change restrictions by leveraging access to (1) a different account with the same role as a target account or (2) an account's session at
|10-01-2017 - 23:12||19-06-2016 - 16:59|
EMC Data Domain OS 5.5 before 126.96.36.199, 5.6 before 5.6.1.004, and 5.7 before 188.8.131.52 stores session identifiers of GUI users in a world-readable file, which allows local users to hijack arbitrary accounts via unspecified vectors.
|10-01-2017 - 21:59||09-06-2016 - 21:59|