Vulnerabilities (CVE)

Filtered by vendor Unitrends Subscribe
Total 10 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-8427 1 Unitrends 1 Backup 2024-02-28 7.5 HIGH 9.8 CRITICAL
In Unitrends Backup before 10.4.1, an HTTP request parameter was not properly sanitized, allowing for SQL injection that resulted in an authentication bypass.
CVE-2018-6329 1 Unitrends 1 Backup 2024-02-28 10.0 HIGH 9.8 CRITICAL
It was discovered that the Unitrends Backup (UB) before 10.1.0 libbpext.so authentication could be bypassed with a SQL injection, allowing a remote attacker to place a privilege escalation exploit on the target system and subsequently execute arbitrary commands.
CVE-2017-7282 1 Unitrends 1 Enterprise Backup 2024-02-28 7.1 HIGH 5.5 MEDIUM
An issue was discovered in Unitrends Enterprise Backup before 9.1.1. The function downloadFile in api/includes/restore.php blindly accepts any filename passed to /api/restore/download as valid. This allows an authenticated attacker to read any file in the filesystem that the web server has access to, aka Local File Inclusion (LFI).
CVE-2017-7279 1 Unitrends 1 Enterprise Backup 2024-02-28 10.0 HIGH 9.8 CRITICAL
An unprivileged user of the Unitrends Enterprise Backup before 9.0.0 web server can escalate to root privileges by modifying the "token" cookie issued at login.
CVE-2017-7280 1 Unitrends 1 Enterprise Backup 2024-02-28 7.5 HIGH 9.8 CRITICAL
An issue was discovered in api/includes/systems.php in Unitrends Enterprise Backup before 9.0.0. User input is not properly filtered before being sent to a popen function. This allows for remote code execution by sending a specially crafted user variable.
CVE-2017-7284 1 Unitrends 1 Enterprise Backup 2024-02-28 6.5 MEDIUM 8.8 HIGH
An attacker that has hijacked a Unitrends Enterprise Backup (before 9.1.2) web server session can leverage api/includes/users.php to change the password of the logged in account without knowing the current password. This allows for an account takeover.
CVE-2017-7281 1 Unitrends 1 Enterprise Backup 2024-02-28 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Unitrends Enterprise Backup before 9.1.2. A lack of sanitization of user input in the createReportName and saveReport functions in recoveryconsole/bpl/reports.php allows for an authenticated user to create a randomly named file on disk with a user-controlled extension, contents, and path, leading to remote code execution, aka Unrestricted File Upload.
CVE-2017-7283 1 Unitrends 1 Enterprise Backup 2024-02-28 9.0 HIGH 8.8 HIGH
An authenticated user of Unitrends Enterprise Backup before 9.1.2 can execute arbitrary OS commands by sending a specially crafted filename to the /api/restore/download-files endpoint, related to the downloadFiles function in api/includes/restore.php.
CVE-2014-3139 1 Unitrends 1 Enterprise Backup 2024-02-28 7.5 HIGH N/A
recoveryconsole/bpl/snmpd.php in Unitrends Enterprise Backup 7.3.0 allows remote attackers to bypass authentication by setting the auth parameter to a certain string.
CVE-2014-3008 1 Unitrends 1 Enterprise Backup 2024-02-28 10.0 HIGH N/A
Unitrends Enterprise Backup 7.3.0 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the comm parameter to recoveryconsole/bpl/snmpd.php.