Code42

Code42

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.47%
  • Veröffentlicht 20.01.2022 02:15:06
  • Zuletzt bearbeitet 21.11.2024 06:28:57

In Code42 app before 8.8.0, eval injection allows an attacker to change a device’s proxy configuration to use a malicious proxy auto-config (PAC) file, leading to arbitrary code execution. This affects Incydr Basic, Advanced, and Gov F1; CrashPlan Cl...

  • EPSS 3.11%
  • Veröffentlicht 07.07.2020 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:00:10

Code42 environments with on-premises server versions 7.0.4 and earlier allow for possible remote code execution. When an administrator creates a local (non-SSO) user via a Code42-generated email, the administrator has the option to modify content for...

  • EPSS 0.05%
  • Veröffentlicht 19.11.2019 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:31:13

Code42 app through version 7.0.2 for Windows has an Untrusted Search Path. In certain situations, a non-administrative attacker on the local machine could create or modify a dynamic-link library (DLL). The Code42 service could then load it at runtime...

  • EPSS 0.05%
  • Veröffentlicht 19.11.2019 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:31:13

Code42 server through 7.0.2 for Windows has an Untrusted Search Path. In certain situations, a non-administrative attacker on the local server could create or modify a dynamic-link library (DLL). The Code42 service could then load it at runtime, and ...

  • EPSS 1.13%
  • Veröffentlicht 17.09.2019 12:15:10
  • Zuletzt bearbeitet 21.11.2024 04:28:07

In Code42 Enterprise 6.7.5 and earlier, 6.8.4 through 6.8.8, and 7.0.0 a vulnerability has been identified that may allow arbitrary files to be uploaded to Code42 servers and executed. This vulnerability could allow an attacker to create directories ...

  • EPSS 0.21%
  • Veröffentlicht 19.07.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:21:20

In Code42 for Enterprise through 6.8.4, an administrator without web restore permission but with the ability to manage users in an organization can impersonate a user with web restore permission. When requesting the token to do a web restore, an admi...

  • EPSS 0.04%
  • Veröffentlicht 03.01.2019 01:29:00
  • Zuletzt bearbeitet 21.11.2024 04:00:55

The Code42 app before 6.8.4, as used in Code42 for Enterprise, on Linux installs with overly permissive permissions on the /usr/local/crashplan/log directory. This allows a user to manipulate symbolic links to escalate privileges, or show the content...