10

CVE-2015-6550

bpcd in Veritas NetBackup 7.x through 7.5.0.7, 7.6.0.x through 7.6.0.4, 7.6.1.x through 7.6.1.2, and 7.7.x before 7.7.2 and NetBackup Appliance through 2.5.4, 2.6.0.x through 2.6.0.4, 2.6.1.x through 2.6.1.2, and 2.7.x before 2.7.2 allows remote attackers to execute arbitrary commands via crafted input.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
VeritasNetbackup Appliance Version1.1.0.1
VeritasNetbackup Appliance Version1.1.0.2
VeritasNetbackup Appliance Version1.2
VeritasNetbackup Appliance Version2.0
VeritasNetbackup Appliance Version2.0.1
VeritasNetbackup Appliance Version2.0.2
VeritasNetbackup Appliance Version2.0.3
VeritasNetbackup Appliance Version2.5
VeritasNetbackup Appliance Version2.5.1
VeritasNetbackup Appliance Version2.5.2
VeritasNetbackup Appliance Version2.5.3
VeritasNetbackup Appliance Version2.6
VeritasNetbackup Appliance Version2.6.0.2
VeritasNetbackup Appliance Version2.6.0.3
VeritasNetbackup Appliance Version2.6.0.4
VeritasNetbackup Appliance Version2.6.1
VeritasNetbackup Appliance Version2.6.1.1
VeritasNetbackup Appliance Version2.6.1.2
VeritasNetbackup Appliance Version2.7.1
VeritasNetbackup Version7.0
VeritasNetbackup Version7.0.1
VeritasNetbackup Version7.1.0.1
VeritasNetbackup Version7.1.0.2
VeritasNetbackup Version7.1.0.3
VeritasNetbackup Version7.1.0.4
VeritasNetbackup Version7.5.0.1
VeritasNetbackup Version7.5.0.3
VeritasNetbackup Version7.5.0.4
VeritasNetbackup Version7.5.0.5
VeritasNetbackup Version7.5.0.6
VeritasNetbackup Version7.5.0.7
VeritasNetbackup Version7.6.0.2
VeritasNetbackup Version7.6.0.3
VeritasNetbackup Version7.6.0.4
VeritasNetbackup Version7.6.1.1
VeritasNetbackup Version7.6.1.2
VeritasNetbackup Version7.7.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 3.01% 0.853
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE-284 Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.