|ID||CVSS||Summary||Last (major) update||Published|
An issue was discovered in EMC Data Domain DD OS 5.7 family, versions prior to 18.104.22.168; EMC Data Domain DD OS 6.0 family, versions prior to 22.214.171.124; EMC Data Domain DD OS 6.1 family, versions prior to 126.96.36.199; EMC Data Domain Virtual Edition 2.0 fam
|20-12-2017 - 18:29||20-12-2017 - 18:29|
EMC Data Domain OS 5.2 through 5.7 before 188.8.131.52 and 6.0 before 184.108.40.206 is affected by a privilege escalation vulnerability that may potentially be exploited by attackers to compromise the affected system.
|05-05-2017 - 21:29||04-05-2017 - 10:29|
EMC Data Domain OS (DD OS) 5.4 all versions, EMC Data Domain OS (DD OS) 5.5 family all versions prior to 220.127.116.11, EMC Data Domain OS (DD OS) 5.6 family all versions prior to 18.104.22.168, EMC Data Domain OS (DD OS) 5.7 family all versions prior to 22.214.171.124
|14-03-2017 - 09:04||03-02-2017 - 02:59|
EMC Data Domain OS 5.4 through 5.7 before 126.96.36.199 has a default no_root_squash option for NFS exports, which makes it easier for remote attackers to obtain filesystem access by leveraging client root privileges.
|10-01-2017 - 23:13||19-06-2016 - 16:59|
EMC Data Domain OS 5.4 through 5.7 before 188.8.131.52 allows remote authenticated users to bypass intended password-change restrictions by leveraging access to (1) a different account with the same role as a target account or (2) an account's session at
|10-01-2017 - 23:12||19-06-2016 - 16:59|
EMC Data Domain OS 5.5 before 184.108.40.206, 5.6 before 5.6.1.004, and 5.7 before 220.127.116.11 stores session identifiers of GUI users in a world-readable file, which allows local users to hijack arbitrary accounts via unspecified vectors.
|10-01-2017 - 21:59||09-06-2016 - 21:59|