Known Vulnerabilities for Backup Exec Remote Agent by Veritas

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationVeritasBackup Exec Remote Agent9.1.4691sp2windows_serversAll
ApplicationVeritasBackup Exec Remote Agent9.1.4691sp3windows_serversAll
ApplicationVeritasBackup Exec Remote Agent9.1.4691sp4awindows_serversAll
ApplicationVeritasBackup Exec Remote Agent9.0.4454sp1windows_serversAll
ApplicationVeritasBackup Exec Remote Agent9.0.4367sp1windows_serversAll
ApplicationVeritasBackup Exec Remote Agent10.0.5484sp1windows_serversAll
ApplicationVeritasBackup Exec Remote Agent10.0.5484sp3windows_serversAll
ApplicationVeritasBackup Exec Remote Agent10.0.5484sp4windows_serversAll

Popular searches for Backup Exec Remote Agent

Backup Exec Agents & Options | Veritas

Backup Exec Agents & Options | Veritas Backup Exec c a Agents for Vmware, Hpyer-V, Applications, Databases, Windows, & Linux - also view our list of Backup Exec options Backup Exec Veritas Technologies Cloud computing Multicloud Linux VMware Database Data deduplication NetBackup Information technology Server (computing) Application software Data Microsoft Windows Option key Computer data storage 64-bit computing 32-bit Enterprise Vault Software agent

VTS17-006: Use-After-Free Vulnerability in Multiple Veritas Backup Exec Agents | Veritas™

S17-006: Use-After-Free Vulnerability in Multiple Veritas Backup Exec Agents | Veritas May 10, 2017: Initial release 1.1: May 10, 2017: Added CVE 1.2: May 12, 2017: Corrected that an attacker does not need to be authenticated to exploit this vulnerability. 1.3: July 6, 2017: Corrected specific versions of Backup Exec ; 9 7 14 that are affected. Use-after-free vulnerability in Veritas Backup Exec / - agents can lead to a denial of service or remote I G E code execution. There is a use-after-free vulnerability in multiple Veritas Backup Exec 4 2 0 agents that can lead to a denial of service or remote code execution. Veritas Technologies Backup Exec Vulnerability (computing) Dangling pointer Arbitrary code execution Denial-of-service attack Common Vulnerabilities and Exposures Exploit (computer security) Authentication Free software Software agent Security hacker Documentation User interface Trademark Common Vulnerability Scoring System User (computing) Antivirus software Process (computing) EXPRESS (data modeling language)

© 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license. and Source URL Uptime Status