cpe:2.3:a:broadcom:desktop_management_suite:11.1:*:*:*:*:*:*:*
Integer underflow in rxRPC.dll in the LGServer service in the server in CA ARCserve Backup for Laptops and Desktops 11.0 through 11.5 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted message that triggers a buffer overflow.
Max CVSS
10.0
EPSS Score
9.84%
Published
2008-08-01
Updated
2021-04-08
Buffer overflow in the LGServer service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary code via unspecified "command arguments."
Max CVSS
9.3
EPSS Score
88.88%
Published
2008-04-07
Updated
2021-04-08
Integer overflow in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 allows remote attackers to execute arbitrary code via a long username and a certain "useless" password.
Max CVSS
9.3
EPSS Score
92.00%
Published
2007-10-01
Updated
2021-04-08

CVE-2007-5003

Public exploit
Multiple stack-based buffer overflows in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 allow remote attackers to execute arbitrary code via a long (1) username or (2) password to the rxrLogin command in rxRPC.dll, or a long (3) username argument to the GetUserInfo function.
Max CVSS
10.0
EPSS Score
94.39%
Published
2007-10-01
Updated
2021-04-08

CVE-2007-0449

Public exploit
Multiple buffer overflows in LGSERVER.EXE in CA BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.1 SP1, Mobile Backup r4.0, Desktop and Business Protection Suite r2, and Desktop Management Suite (DMS) r11.0 and r11.1 allow remote attackers to execute arbitrary code via crafted packets to TCP port (1) 1900 or (2) 2200.
Max CVSS
10.0
EPSS Score
97.17%
Published
2007-01-23
Updated
2021-04-08
5 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!