Vulnerabilities > EMC > Vplex Geosynchrony
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-12-28 | CVE-2015-6850 | Permissions, Privileges, and Access Controls vulnerability in EMC Vplex Geosynchrony 5.4/5.5 EMC VPLEX GeoSynchrony 5.4 SP1 before P3 and 5.5 before Patch 1 has a default password for the root account, which allows local users to gain privileges by leveraging a login session. | 7.2 |
2015-11-18 | CVE-2015-6847 | Information Exposure vulnerability in EMC Vplex Geosynchrony 5.4 The default configuration of EMC VPLEX GeoSynchrony 5.4 SP1 before P3 stores cleartext NAVISPHERE GUI passwords in a log file, which allows local users to obtain sensitive information by reading this file. | 2.1 |
2014-04-01 | CVE-2014-0635 | Improper Authentication vulnerability in EMC Vplex Geosynchrony Session fixation vulnerability in EMC VPLEX GeoSynchrony 4.x and 5.x before 5.3 allows remote attackers to hijack web sessions via unspecified vectors. | 7.5 |
2014-04-01 | CVE-2014-0634 | Improper Input Validation vulnerability in EMC Vplex Geosynchrony EMC VPLEX GeoSynchrony 4.x and 5.x before 5.3 does not include the HTTPOnly flag in a Set-Cookie header for an unspecified cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. | 6.0 |
2014-04-01 | CVE-2014-0633 | Improper Input Validation vulnerability in EMC Vplex Geosynchrony The GUI in EMC VPLEX GeoSynchrony 4.x and 5.x before 5.3 does not properly validate session-timeout values, which might make it easier for remote attackers to execute arbitrary code by leveraging an unattended workstation. | 7.7 |
2014-04-01 | CVE-2014-0632 | Path Traversal vulnerability in EMC Vplex Geosynchrony Directory traversal vulnerability in EMC VPLEX GeoSynchrony 4.x and 5.x before 5.3 allows remote authenticated users to execute arbitrary code via unspecified vectors. | 9.0 |