Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
arkeia vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2015-7709
The arkeiad daemon in the Arkeia Backup Agent in Western Digital Arkeia 11.0.12 and previous versions allows remote malicious users to bypass authentication and execute arbitrary commands via a series of crafted requests involving the ARKFS_EXEC_CMD operation.
Arkeia Western Digital Arkeia
1 EDB exploit
1000
VMScore
CVE-2005-0491
Stack-based buffer overflow in Knox Arkeia Server Backup 5.3.x allows remote malicious users to execute arbitrary code via a long type 77 request.
Knox Software Arkeia Server Backup 5.3.2
Knox Software Arkeia Server Backup 5.3.3
Knox Software Arkeia Server Backup 5.3.0 Rc2
Knox Software Arkeia Server Backup 5.3.0 Rc3
Knox Software Arkeia Server Backup 5.3.0 Rc4
Knox Software Arkeia Server Backup 5.3.1
Knox Software Arkeia Server Backup 5.3.0
Knox Software Arkeia Server Backup 5.3.0 Rc1
Knox Software Arkeia Server Backup 5.3.4
5 EDB exploits
890
VMScore
CVE-2001-0968
Knox Arkeia server 4.2, and possibly other versions, installs its root user with a null password by default, which allows local and remote users to gain privileges.
Knox Software Arkeia 4.2
Knox Software Arkeia 4.2.8.2
755
VMScore
CVE-2014-2846
Directory traversal vulnerability in opt/arkeia/wui/htdocs/index.php in the WD Arkeia virtual appliance (AVA) with firmware prior to 10.2.9 allows remote malicious users to read arbitrary files and execute arbitrary PHP code via a ..././ (dot dot dot slash dot slash) in the lang ...
Westerndigital Arkeia Virtual Appliance Firmware
1 EDB exploit
725
VMScore
CVE-1999-1534
Buffer overflow in (1) nlservd and (2) rnavc in Knox Software Arkeia backup product allows local users to obtain root access via a long HOME environmental variable.
Knox Software Arkeia 4.0
1 EDB exploit
668
VMScore
CVE-2005-0496
Arkeia Network Backup Client 5.x contains hard-coded credentials that effectively serve as a back door, which allows remote malicious users to access the file system and possibly execute arbitrary commands.
Arkeia Network Backup 5.0
668
VMScore
CVE-2001-0967
Knox Arkeia server 4.2, and possibly other versions, uses a constant salt when encrypting passwords using the crypt() function, which makes it easier for an malicious user to conduct brute force password guessing.
Arkeia Arkeia 4.2.8-2
Arkeia Arkeia 4.2
641
VMScore
CVE-2001-0988
Arkeia backup server 4.2.8-2 and previous versions creates its database files with world-writable permissions, which could allow local users to overwrite the files or obtain sensitive information.
Knox Software Arkeia
445
VMScore
CVE-1999-0788
Arkiea nlservd allows remote malicious users to conduct a denial of service.
Knox Software Arkeia 4.0
Knox Software Arkeia 4.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started