Vulnerabilities (CVE)

Filtered by vendor Veritas Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-41570 1 Veritas 1 Netbackup 2022-04-27 3.5 LOW 5.4 MEDIUM
Veritas NetBackup OpsCenter Analytics 9.1 allows XSS via the NetBackup Master Server Name, Display Name, NetBackup User Name, or NetBackup Password field during a Settings/Configuration Add operation.
CVE-2020-36159 1 Veritas 1 Desktop And Laptop Option 2021-01-08 5.0 MEDIUM 5.3 MEDIUM
Veritas Desktop and Laptop Option (DLO) before 9.5 disclosed operational information on the backup processing status through a URL that did not require authentication.
CVE-2020-12875 1 Veritas 1 Aptare 2020-05-15 6.5 MEDIUM 6.3 MEDIUM
Veritas APTARE versions prior to 10.4 did not perform adequate authorization checks. An authenticated user could gain unauthorized access to sensitive information or functionality by manipulating specific parameters within the application.
CVE-2019-14415 1 Veritas 1 Resiliency Platform 2019-10-09 3.5 LOW 4.8 MEDIUM
An issue was discovered in Veritas Resiliency Platform (VRP) before 3.4 HF1. A persistent cross-site scripting (XSS) vulnerability allows a malicious VRP user to inject malicious script into another user's browser, related to resiliency plans functionality. A victim must open a resiliency plan that an attacker has access to.
CVE-2017-6404 1 Veritas 2 Netbackup, Netbackup Appliance 2019-10-03 2.1 LOW 5.5 MEDIUM
An issue was discovered in Veritas NetBackup Before 7.7 and NetBackup Appliance Before 2.7. There are world-writable log files, allowing destruction or spoofing of log data.
CVE-2017-6402 1 Veritas 2 Netbackup, Netbackup Appliance 2019-10-03 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered in Veritas NetBackup 8.0 and earlier and NetBackup Appliance 3.0 and earlier. Denial of service affecting NetBackup server can occur.
CVE-2015-6551 1 Veritas 2 Netbackup, Netbackup Appliance 2016-12-01 4.3 MEDIUM 5.9 MEDIUM
Veritas NetBackup 7.x through 7.5.0.7 and 7.6.0.x through 7.6.0.4 and NetBackup Appliance through 2.5.4 and 2.6.0.x through 2.6.0.4 do not use TLS for administration-console traffic to the NBU server, which allows remote attackers to obtain sensitive information by sniffing the network for key-exchange packets.