cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2009-3027,https://securityvulnerability.io/vulnerability/CVE-2009-3027,,"VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300.",Symantec,"Veritas Cluster Server One,Veritas Storage Foundation For Oracle Real Application Cluster,Veritas Storage Foundation Cluster File System,Veritas Storage Foundation Manager,Veritas Cluster Server,Veritas Netbackup Operations Manager,Veritas Storage Foundation For Windows High Availability,Veritas Storage Foundation,Veritas Micromeasure,Backup Exec Continuous Protection Server,Veritas Storage Foundation For High Availability,Veritas Storage Foundation For Sybase,Veritas Storage Foundation For Db2,Veritas Command Central Storage,Veritas Application Director,Veritas Command Central Storage Change Manager,Veritas Storage Foundation For Oracle,Veritas Cluster Server Management Console,Veritas Command Central Enterprise Reporter,Veritas Storage Foundation Cluster File System For Oracle Rac,Veritas Netbackup Reporter,Veritas Backup Exec,Veritas Storae Foundation",,,0.8903599977493286,false,,false,false,false,,,false,false,,2009-12-11T16:00:00.000Z,0 CVE-2007-5126,https://securityvulnerability.io/vulnerability/CVE-2007-5126,,"Unspecified vulnerability in the client in Symantec Veritas Backup Exec for Windows Servers 11d has unknown impact and remote attack vectors. NOTE: this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. A CVE has been assigned for tracking purposes, but duplicates with other CVEs are difficult to determine.",Symantec,Veritas Backup Exec,,,0.001509999972768128,false,,false,false,false,,,false,false,,2007-09-27T19:00:00.000Z,0 CVE-2007-3509,https://securityvulnerability.io/vulnerability/CVE-2007-3509,,"Heap-based buffer overflow in the RPC subsystem in Symantec Backup Exec for Windows Servers 10.0, 10d, and 11d allows remote attackers to cause a denial of service (process exit) and possibly execute arbitrary code via crafted ncacn_ip_tcp requests.",Symantec,Veritas Backup Exec,,,0.3235900104045868,false,,false,false,false,,,false,false,,2007-07-12T01:00:00.000Z,0