Vulnerabilities > Veritas
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-01-06 | CVE-2020-36161 | Unspecified vulnerability in Veritas Aptare IT Analytics 10.4.00/10.5.00 An issue was discovered in Veritas APTARE 10.4 before 10.4P9 and 10.5 before 10.5P3. | 8.8 |
2021-01-06 | CVE-2020-36160 | Unspecified vulnerability in Veritas System Recovery An issue was discovered in Veritas System Recovery before 21.2. | 8.8 |
2021-01-05 | CVE-2020-36159 | Unspecified vulnerability in Veritas Desktop and Laptop Option Veritas Desktop and Laptop Option (DLO) before 9.5 disclosed operational information on the backup processing status through a URL that did not require authentication. | 5.3 |
2020-10-15 | CVE-2020-27157 | Authentication Bypass by Capture-replay vulnerability in Veritas Aptare 10.4 Veritas APTARE versions prior to 10.5 included code that bypassed the normal login process when specific authentication credentials were provided to the server. | 8.1 |
2020-10-15 | CVE-2020-27156 | Incorrect Authorization vulnerability in Veritas Aptare 10.4 Veritas APTARE versions prior to 10.5 did not perform adequate authorization checks. | 9.8 |
2020-05-14 | CVE-2020-12877 | Missing Authentication for Critical Function vulnerability in Veritas Aptare Veritas APTARE versions prior to 10.4 allowed sensitive information to be accessible without authentication. | 7.5 |
2020-05-14 | CVE-2020-12876 | Incorrect Authorization vulnerability in Veritas Aptare Veritas APTARE versions prior to 10.4 allowed remote users to access several unintended files on the server. | 7.5 |
2020-05-14 | CVE-2020-12875 | Incorrect Authorization vulnerability in Veritas Aptare Veritas APTARE versions prior to 10.4 did not perform adequate authorization checks. | 6.3 |
2020-05-14 | CVE-2020-12874 | Improper Authentication vulnerability in Veritas Aptare Veritas APTARE versions prior to 10.4 included code that bypassed the normal login process when specific authentication credentials were provided to the server. | 9.8 |
2019-11-05 | CVE-2019-18780 | Command Injection vulnerability in Veritas products An arbitrary command injection vulnerability in the Cluster Server component of Veritas InfoScale allows an unauthenticated remote attacker to execute arbitrary commands as root or administrator. | 9.8 |