Description
Format string vulnerability in the Java user interface service (bpjava-msvc) daemon for VERITAS NetBackup Data and Business Center 4.5FP and 4.5MP, and NetBackup Enterprise/Server/Client 5.0, 5.1, and 6.0, allows remote attackers to execute arbitrary code via the COMMAND_LOGON_TO_MSERVER command.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Kevin Finisterre · perlremotewindows_x86
https://www.exploit-db.com/exploits/1264
exploitdb
WORKING POC
VERIFIED
by Kevin Finisterre · perlremoteosx
https://www.exploit-db.com/exploits/1265
exploitdb
WORKING POC
VERIFIED
by Kevin Finisterre · perlremotemultiple
https://www.exploit-db.com/exploits/1263
References (8)
Scores
EPSS
0.6631
EPSS Percentile
98.5%
Details
Status
published
Products (5)
symantec_veritas/netbackup_data_and_business_center
4.5fp
symantec_veritas/netbackup_data_and_business_center
4.5mp
symantec_veritas/netbackup_enterprise_server_client
5.0
symantec_veritas/netbackup_enterprise_server_client
5.1
symantec_veritas/netbackup_enterprise_server_client
6.0
Published
Oct 12, 2005
Tracked Since
Feb 18, 2026