cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2009-3027,https://securityvulnerability.io/vulnerability/CVE-2009-3027,,"VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300.",Symantec,"Veritas Cluster Server One,Veritas Storage Foundation For Oracle Real Application Cluster,Veritas Storage Foundation Cluster File System,Veritas Storage Foundation Manager,Veritas Cluster Server,Veritas Netbackup Operations Manager,Veritas Storage Foundation For Windows High Availability,Veritas Storage Foundation,Veritas Micromeasure,Backup Exec Continuous Protection Server,Veritas Storage Foundation For High Availability,Veritas Storage Foundation For Sybase,Veritas Storage Foundation For Db2,Veritas Command Central Storage,Veritas Application Director,Veritas Command Central Storage Change Manager,Veritas Storage Foundation For Oracle,Veritas Cluster Server Management Console,Veritas Command Central Enterprise Reporter,Veritas Storage Foundation Cluster File System For Oracle Rac,Veritas Netbackup Reporter,Veritas Backup Exec,Veritas Storae Foundation",,,0.8903599977493286,false,,false,false,false,,,false,false,,2009-12-11T16:00:00.000Z,0 CVE-2007-3095,https://securityvulnerability.io/vulnerability/CVE-2007-3095,,"Unspecified vulnerability in Symantec Reporting Server 1.0.197.0, and other versions before 1.0.224.0, as used in Symantec Client Security 3.1 and later, and Symantec AntiVirus Corporate Edition (SAV CE) 10.1 and later, allows attackers to ""disable the authentication system"" and bypass authentication via unknown vectors.",Symantec,"Norton Antivirus,Client Security,Reporting Server",,,0.002839999971911311,false,,false,false,false,,,false,false,,2007-06-06T22:00:00.000Z,0 CVE-2007-3022,https://securityvulnerability.io/vulnerability/CVE-2007-3022,,"Symantec Reporting Server 1.0.197.0, and other versions before 1.0.224.0, as used in Symantec Client Security 3.1 and later, and Symantec AntiVirus Corporate Edition (SAV CE) 10.1 and later, displays the password hash for a user after a failed login attempt, which makes it easier for remote attackers to conduct brute force attacks.",Symantec,"Norton Antivirus,Client Security,Reporting Server",,,0.03773000091314316,false,,false,false,false,,,false,false,,2007-06-05T21:00:00.000Z,0 CVE-2007-3021,https://securityvulnerability.io/vulnerability/CVE-2007-3021,,"Symantec Reporting Server 1.0.197.0, and other versions before 1.0.224.0, as used in Symantec Client Security 3.1 and later, and Symantec AntiVirus Corporate Edition (SAV CE) 10.1 and later, does not initialize a critical variable, which allows attackers to create arbitrary executable files via unknown manipulations of a file that is created during data export.",Symantec,"Norton Antivirus,Client Security,Reporting Server",,,0.012609999626874924,false,,false,false,false,,,false,false,,2007-06-05T21:00:00.000Z,0