CA Technologies Arcserve Backup 2000
By the Year
In 2024 there have been 0 vulnerabilities in CA Technologies Arcserve Backup 2000 . Arcserve Backup 2000 did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Arcserve Backup 2000 vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent CA Technologies Arcserve Backup 2000 Security Vulnerabilities
Buffer overflow in the Discovery Service in BrightStor ARCserve Backup 9.0 through 11.1
CVE-2005-2535
- August 10, 2005
Buffer overflow in the Discovery Service in BrightStor ARCserve Backup 9.0 through 11.1 allows remote attackers to execute arbitrary commands via a large packet to TCP port 41523, a different vulnerability than CVE-2005-0260.
Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 creates a hidden share named ARCSERVE$, which
CVE-2001-0959
- September 15, 2001
Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 creates a hidden share named ARCSERVE$, which allows remote attackers to obtain sensitive information and overwrite critical files.
Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 stores the backup agent user name and password in cleartext in the aremote.dmp file in the ARCSERVE$ hidden share, which
CVE-2001-0960
- September 15, 2001
Computer Associates ARCserve for NT 6.61 SP2a and ARCserve 2000 7.0 stores the backup agent user name and password in cleartext in the aremote.dmp file in the ARCSERVE$ hidden share, which allows local and remote attackers to gain privileges.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Broadcom Arcserve Backup 2000 or by CA Technologies? Click the Watch button to subscribe.