Known Vulnerabilities for Backup Exec by Veritas

Listed below are 5 of the newest known vulnerabilities associated with "Backup Exec" by "Veritas".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-27878 An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successf... 8.8 - HIGH 2021-03-01 2022-09-27
CVE-2021-27877 An issue was discovered in Veritas Backup Exec before 21.2. It supports multiple authentication schemes: SHA authentication i... 9.8 - CRITICAL 2021-03-01 2022-09-27
CVE-2021-27876 An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successf... 8.1 - HIGH 2021-03-01 2022-09-27
CVE-2020-36167 An issue was discovered in the server in Veritas Backup Exec through 16.2, 20.6 before hotfix 298543, and 21.1 before hotfix ... 8.8 - HIGH 2021-01-06 2021-01-14
CVE-2017-8895 In Veritas Backup Exec 2014 before build 14.1.1187.1126, 15 before build 14.2.1180.3160, and 16 before FP1, there is a use-af... 9.8 - CRITICAL 2017-05-10 2021-08-12

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationVeritasBackup Exec21.0.1200.1217AllAllAll
ApplicationVeritasBackup Exec21.0AllAllAll
ApplicationVeritasBackup Exec2014.1786AllAllAll
ApplicationVeritasBackup Exec20.0.1188.2734AllAllAll
ApplicationVeritasBackup Exec20.0AllAllAll
ApplicationVeritasBackup Exec16.1142AllAllAll
ApplicationVeritasBackup Exec15.1180AllAllAll

Popular searches for Backup Exec

Backup Exec

www.veritas.com/protection/backup-exec

Backup Exec Backup Exec provides simple, complete backup l j h and recovery protection for your business, to cover all data wherever it resides. Try free for 60 days.

www.veritas.com/product/backup-and-recovery/backup-exec origin-www.veritas.com/protection/backup-exec www.veritas.com/product/backup-and-recovery/backup-exec.html www.veritas.com/product/backup-and-recovery/backup-exec?fid=backup-exec www.backupexec.com www.veritas.com/product/backup-and-recovery/backup-exec.html?inid=us_veritas_home_products_backupexec www.symantec.com/backup-exec www.backupexec.com/videos www.veritas.com/product/backup-and-recovery/backup-exec.html?inid=us_veritas_cloud_aws_products_backupexec Backup Exec Cloud computing Backup Data Multicloud Veritas Technologies Business Microsoft Azure Disaster recovery Amazon Web Services Virtual machine Information technology Free software Computer data storage Software as a service Data management Regulatory compliance General Data Protection Regulation Microsoft Cloud database

Veritas | The Leader in Enterprise Data Protection

www.veritas.com

Veritas | The Leader in Enterprise Data Protection L J HThe data protection leader for the worlds most important enterprises.

sort.veritas.com/legal/decline www.veritas.com/content/veritas/english/en/form/whitepaper/evaluate-your-gdpr-readiness www.fluidops.com www.veritas.com/content/veritas/english/en www.globanet.com www.veritas.com/content/veritas/english/en/company/legal/license-agreements Veritas Technologies Information privacy Cloud computing Multicloud Business Customer Computing platform Data Information technology Data management Cloud database NetBackup Information Gartner Blog Regulatory compliance Magic Quadrant VMware General Data Protection Regulation E-commerce

© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report