Filtered by vendor Bakbone
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2009-3448 | 1 Bakbone | 1 Netvault | 2024-02-14 | N/A |
npvmgr.exe in BakBone NetVault Backup 8.22 Build 29 allows remote attackers to cause a denial of service (daemon crash) via a packet to (1) TCP or (2) UDP port 20031 with a large value in an unspecified size field, which is not properly handled in a malloc operation. NOTE: some of these details are obtained from third party information. | ||||
CVE-2007-3911 | 1 Bakbone | 1 Netvault Reporter | 2018-10-15 | N/A |
Multiple heap-based buffer overflows in (1) clsscheduler.exe (aka scheduler client) and (2) srvscheduler.exe (aka scheduler server) in BakBone NetVault Reporter 3.5 before Update4 allow remote attackers to execute arbitrary code via long filename arguments in HTTP requests. | ||||
CVE-2007-3181 | 2 Bakbone, Firebirdsql | 2 Netvault, Firebird | 2017-07-29 | N/A |
Buffer overflow in fbserver.exe in Firebird SQL 2 before 2.0.1 allows remote attackers to execute arbitrary code via a large p_cnct_count value in a p_cnct structure in a connect (0x01) request to port 3050/tcp, related to "an InterBase version of gds32.dll." | ||||
CVE-2005-1372 | 1 Bakbone | 1 Netvault | 2017-07-11 | N/A |
nvstatsmngr.exe process in BakBone NetVault 7.1 does not properly drop privileges before opening files, which allows local users to gain privileges via the Help menu. | ||||
CVE-2005-1009 | 1 Bakbone | 1 Netvault | 2017-07-11 | N/A |
Multiple buffer overflows in BakBone NetVault 6.x and 7.x allow (1) remote attackers to execute arbitrary code via a modified computer name and length that leads to a heap-based buffer overflow, or (2) local users to execute arbitrary code via a long Name entry in the configure.cfg file. | ||||
CVE-2005-1547 | 1 Bakbone | 1 Netvault | 2016-10-18 | N/A |
Heap-based buffer overflow in the demo version of Bakbone Netvault, and possibly other versions, allows remote attackers to execute arbitrary commands via a large packet to port 20031. |
Page 1 of 1.