Veritas Access Appliance 7.4.3.100

CPE Details

Veritas Access Appliance 7.4.3.100
7.4.3.100
2022-05-19
11h57 +00:00
2022-05-25
17h47 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:veritas:access_appliance:7.4.3.100:*:*:*:*:*:*:*

Informations

Vendor

veritas

Product

access_appliance

Version

7.4.3.100

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-46411 2022-12-03 23h00 +00:00 An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. A default password is persisted after installation and may be discovered and used to escalate privileges.
8.8
High
CVE-2022-46413 2022-12-03 23h00 +00:00 An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. Authenticated remote command execution can occur via the management portal.
8.8
High
CVE-2022-46414 2022-12-03 23h00 +00:00 An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. Unauthenticated remote command execution can occur via the management portal.
9.8
Critical
CVE-2022-22965 2022-04-01 22h17 +00:00 A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
9.8
Critical