Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
veritas aptare vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2020-12874
Veritas APTARE versions before 10.4 included code that bypassed the normal login process when specific authentication credentials were provided to the server.
Veritas Aptare
6.5
CVSSv2
CVE-2020-12875
Veritas APTARE versions before 10.4 did not perform adequate authorization checks. An authenticated user could gain unauthorized access to sensitive information or functionality by manipulating specific parameters within the application.
Veritas Aptare
5
CVSSv2
CVE-2020-12876
Veritas APTARE versions before 10.4 allowed remote users to access several unintended files on the server. This vulnerability only impacts Windows server deployments.
Veritas Aptare
7.5
CVSSv2
CVE-2020-27156
Veritas APTARE versions before 10.5 did not perform adequate authorization checks. This vulnerability could allow for remote code execution by an unauthenticated user.
Veritas Aptare
6.8
CVSSv2
CVE-2020-27157
Veritas APTARE versions before 10.5 included code that bypassed the normal login process when specific authentication credentials were provided to the server. An unauthenticated user could login to the application and gain access to the data and functionality accessible to the ta...
Veritas Aptare
5
CVSSv2
CVE-2020-12877
Veritas APTARE versions before 10.4 allowed sensitive information to be accessible without authentication.
Veritas Aptare
NA
CVE-2023-28818
An issue exists in Veritas NetBackup IT Analytics 11 prior to 11.2.0. The application upgrade process included unsigned files that could be exploited and result in a customer installing unauthentic components. A malicious actor could install rogue Collector executable files (apta...
Veritas Netbackup It Analytics 11.1.00
Veritas Netbackup It Analytics 11.0.00
Veritas Aptare It Analytics
7.2
CVSSv2
CVE-2020-36161
An issue exists in Veritas APTARE 10.4 prior to 10.4P9 and 10.5 prior to 10.5P3. By default, on Windows systems, users can create directories under C:\. A low privileged user can create a directory at the configuration file locations. When the Windows system restarts, a malicious...
Veritas Aptare It Analytics 10.4.00
Veritas Aptare It Analytics 10.5.00
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started