Vulnerabilities (CVE)

Filtered by vendor Veritas Subscribe
Filtered by product Netbackup Flex Scale Appliance
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-46412 1 Veritas 1 Netbackup Flex Scale Appliance 2023-12-10 N/A 8.8 HIGH
An issue was discovered in Veritas NetBackup Flex Scale through 3.0. A non-privileged user may escape a restricted shell and execute privileged commands.
CVE-2022-46411 1 Veritas 2 Access Appliance, Netbackup Flex Scale Appliance 2023-12-10 N/A 8.8 HIGH
An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. A default password is persisted after installation and may be discovered and used to escalate privileges.
CVE-2022-46410 1 Veritas 1 Netbackup Flex Scale Appliance 2023-12-10 N/A 8.8 HIGH
An issue was discovered in Veritas NetBackup Flex Scale through 3.0. An attacker with non-root privileges may escalate privileges to root by using specific commands.
CVE-2022-46414 1 Veritas 2 Access Appliance, Netbackup Flex Scale Appliance 2023-12-10 N/A 9.8 CRITICAL
An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. Unauthenticated remote command execution can occur via the management portal.
CVE-2022-46413 1 Veritas 2 Access Appliance, Netbackup Flex Scale Appliance 2023-12-10 N/A 8.8 HIGH
An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. Authenticated remote command execution can occur via the management portal.
CVE-2022-22965 5 Cisco, Oracle, Siemens and 2 more 38 Cx Cloud Agent, Commerce Platform, Communications Cloud Native Core Automated Test Suite and 35 more 2023-12-10 7.5 HIGH 9.8 CRITICAL
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.