|ID||CVSS||Summary||Last (major) update||Published|
The client in EMC Replication Manager (RM) before 220.127.116.11_01-PatchHotfix, EMC Network Module for Microsoft 3.x, and EMC Networker Module for Microsoft 8.2.x before 18.104.22.168 allows remote RM servers to execute arbitrary commands by placing a crafted sc
|28-11-2016 - 14:55||04-10-2016 - 21:59|
Unquoted Windows search path vulnerability in EMC Replication Manager through 5.5.2 and AppSync before 2.1.0 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a s
|24-03-2015 - 16:51||30-12-2014 - 10:59|
Unquoted Windows search path vulnerability in EMC Replication Manager before 5.5 allows local users to gain privileges via a crafted application in a parent directory of an intended directory.
|07-01-2014 - 23:42||27-12-2013 - 23:53|
EMC Replication Manager (RM) before 5.4.4 places encoded passwords in application log files, which makes it easier for local users to obtain sensitive information by reading a file and conducting an unspecified decoding attack.
|11-10-2013 - 11:51||08-07-2013 - 16:55|
The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542.
|17-02-2011 - 02:02||10-02-2011 - 13:00|