10

CVE-2015-6550

bpcd in Veritas NetBackup 7.x through 7.5.0.7, 7.6.0.x through 7.6.0.4, 7.6.1.x through 7.6.1.2, and 7.7.x before 7.7.2 and NetBackup Appliance through 2.5.4, 2.6.0.x through 2.6.0.4, 2.6.1.x through 2.6.1.2, and 2.7.x before 2.7.2 allows remote attackers to execute arbitrary commands via crafted input.

Data is provided by the National Vulnerability Database (NVD)
VeritasNetbackup Appliance Version1.1.0.1
VeritasNetbackup Appliance Version1.1.0.2
VeritasNetbackup Appliance Version1.2
VeritasNetbackup Appliance Version2.0
VeritasNetbackup Appliance Version2.0.1
VeritasNetbackup Appliance Version2.0.2
VeritasNetbackup Appliance Version2.0.3
VeritasNetbackup Appliance Version2.5
VeritasNetbackup Appliance Version2.5.1
VeritasNetbackup Appliance Version2.5.2
VeritasNetbackup Appliance Version2.5.3
VeritasNetbackup Appliance Version2.6
VeritasNetbackup Appliance Version2.6.0.2
VeritasNetbackup Appliance Version2.6.0.3
VeritasNetbackup Appliance Version2.6.0.4
VeritasNetbackup Appliance Version2.6.1
VeritasNetbackup Appliance Version2.6.1.1
VeritasNetbackup Appliance Version2.6.1.2
VeritasNetbackup Appliance Version2.7.1
VeritasNetbackup Version7.0
VeritasNetbackup Version7.0.1
VeritasNetbackup Version7.1.0.1
VeritasNetbackup Version7.1.0.2
VeritasNetbackup Version7.1.0.3
VeritasNetbackup Version7.1.0.4
VeritasNetbackup Version7.5.0.1
VeritasNetbackup Version7.5.0.3
VeritasNetbackup Version7.5.0.4
VeritasNetbackup Version7.5.0.5
VeritasNetbackup Version7.5.0.6
VeritasNetbackup Version7.5.0.7
VeritasNetbackup Version7.6.0.2
VeritasNetbackup Version7.6.0.3
VeritasNetbackup Version7.6.0.4
VeritasNetbackup Version7.6.1.1
VeritasNetbackup Version7.6.1.2
VeritasNetbackup Version7.7.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 3.01% 0.853
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE-284 Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.