CVE-2021-43269
- EPSS 0.47%
- Veröffentlicht 20.01.2022 02:15:06
- Zuletzt bearbeitet 21.11.2024 06:28:57
In Code42 app before 8.8.0, eval injection allows an attacker to change a device’s proxy configuration to use a malicious proxy auto-config (PAC) file, leading to arbitrary code execution. This affects Incydr Basic, Advanced, and Gov F1; CrashPlan Cl...
CVE-2020-12736
- EPSS 3.11%
- Veröffentlicht 07.07.2020 20:15:09
- Zuletzt bearbeitet 21.11.2024 05:00:10
Code42 environments with on-premises server versions 7.0.4 and earlier allow for possible remote code execution. When an administrator creates a local (non-SSO) user via a Code42-generated email, the administrator has the option to modify content for...
CVE-2019-16860
- EPSS 0.05%
- Veröffentlicht 19.11.2019 13:15:11
- Zuletzt bearbeitet 21.11.2024 04:31:13
Code42 app through version 7.0.2 for Windows has an Untrusted Search Path. In certain situations, a non-administrative attacker on the local machine could create or modify a dynamic-link library (DLL). The Code42 service could then load it at runtime...
CVE-2019-16861
- EPSS 0.05%
- Veröffentlicht 19.11.2019 13:15:11
- Zuletzt bearbeitet 21.11.2024 04:31:13
Code42 server through 7.0.2 for Windows has an Untrusted Search Path. In certain situations, a non-administrative attacker on the local server could create or modify a dynamic-link library (DLL). The Code42 service could then load it at runtime, and ...
CVE-2019-15131
- EPSS 1.13%
- Veröffentlicht 17.09.2019 12:15:10
- Zuletzt bearbeitet 21.11.2024 04:28:07
In Code42 Enterprise 6.7.5 and earlier, 6.8.4 through 6.8.8, and 7.0.0 a vulnerability has been identified that may allow arbitrary files to be uploaded to Code42 servers and executed. This vulnerability could allow an attacker to create directories ...
CVE-2019-11553
- EPSS 0.21%
- Veröffentlicht 19.07.2019 17:15:11
- Zuletzt bearbeitet 21.11.2024 04:21:20
In Code42 for Enterprise through 6.8.4, an administrator without web restore permission but with the ability to manage users in an organization can impersonate a user with web restore permission. When requesting the token to do a web restore, an admi...
CVE-2018-20131
- EPSS 0.04%
- Veröffentlicht 03.01.2019 01:29:00
- Zuletzt bearbeitet 21.11.2024 04:00:55
The Code42 app before 6.8.4, as used in Code42 for Enterprise, on Linux installs with overly permissive permissions on the /usr/local/crashplan/log directory. This allows a user to manipulate symbolic links to escalate privileges, or show the content...