Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
arkeia vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2001-0967
Knox Arkeia server 4.2, and possibly other versions, uses a constant salt when encrypting passwords using the crypt() function, which makes it easier for an malicious user to conduct brute force password guessing.
Arkeia Arkeia 4.2.8-2
Arkeia Arkeia 4.2
1000
VMScore
CVE-2015-7709
The arkeiad daemon in the Arkeia Backup Agent in Western Digital Arkeia 11.0.12 and previous versions allows remote malicious users to bypass authentication and execute arbitrary commands via a series of crafted requests involving the ARKFS_EXEC_CMD operation.
Arkeia Western Digital Arkeia
1 EDB exploit
1000
VMScore
CVE-2005-0491
Stack-based buffer overflow in Knox Arkeia Server Backup 5.3.x allows remote malicious users to execute arbitrary code via a long type 77 request.
Knox Software Arkeia Server Backup 5.3.2
Knox Software Arkeia Server Backup 5.3.3
Knox Software Arkeia Server Backup 5.3.0 Rc2
Knox Software Arkeia Server Backup 5.3.0 Rc3
Knox Software Arkeia Server Backup 5.3.0 Rc4
Knox Software Arkeia Server Backup 5.3.1
Knox Software Arkeia Server Backup 5.3.0
Knox Software Arkeia Server Backup 5.3.0 Rc1
Knox Software Arkeia Server Backup 5.3.4
5 EDB exploits
445
VMScore
CVE-1999-0788
Arkiea nlservd allows remote malicious users to conduct a denial of service.
Knox Software Arkeia 4.0
Knox Software Arkeia 4.1
890
VMScore
CVE-2001-0968
Knox Arkeia server 4.2, and possibly other versions, installs its root user with a null password by default, which allows local and remote users to gain privileges.
Knox Software Arkeia 4.2
Knox Software Arkeia 4.2.8.2
641
VMScore
CVE-2001-0988
Arkeia backup server 4.2.8-2 and previous versions creates its database files with world-writable permissions, which could allow local users to overwrite the files or obtain sensitive information.
Knox Software Arkeia
725
VMScore
CVE-1999-1534
Buffer overflow in (1) nlservd and (2) rnavc in Knox Software Arkeia backup product allows local users to obtain root access via a long HOME environmental variable.
Knox Software Arkeia 4.0
1 EDB exploit
668
VMScore
CVE-2005-0496
Arkeia Network Backup Client 5.x contains hard-coded credentials that effectively serve as a back door, which allows remote malicious users to access the file system and possibly execute arbitrary commands.
Arkeia Network Backup 5.0
755
VMScore
CVE-2014-2846
Directory traversal vulnerability in opt/arkeia/wui/htdocs/index.php in the WD Arkeia virtual appliance (AVA) with firmware prior to 10.2.9 allows remote malicious users to read arbitrary files and execute arbitrary PHP code via a ..././ (dot dot dot slash dot slash) in the lang ...
Westerndigital Arkeia Virtual Appliance Firmware
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started