Show filters
32 Total Results
Displaying 1-10 of 32
Sort by:
Attacker Value
Very High
CVE-2023-7102
Disclosure Date: December 24, 2023 (last updated January 10, 2024)
Use of a Third Party library produced a vulnerability in Barracuda Networks Inc. Barracuda ESG Appliance which allowed Parameter Injection.This issue affected Barracuda ESG Appliance, from 5.1.3.001 through 9.2.1.001, until Barracuda removed the vulnerable logic.
4
Attacker Value
Very High
CVE-2023-2868
Disclosure Date: May 24, 2023 (last updated December 22, 2024)
A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.
3
Attacker Value
Unknown
CVE-2023-26213
Disclosure Date: March 03, 2023 (last updated October 08, 2023)
On Barracuda CloudGen WAN Private Edge Gateway devices before 8 webui-sdwan-1089-8.3.1-174141891, an OS command injection vulnerability exists in /ajax/update_certificate - a crafted HTTP request allows an authenticated attacker to execute arbitrary commands. For example, a name field can contain :password and a password field can contain shell metacharacters.
0
Attacker Value
Unknown
CVE-2021-42711
Disclosure Date: December 01, 2021 (last updated February 23, 2025)
Barracuda Network Access Client before 5.2.2 creates a Temporary File in a Directory with Insecure Permissions. This file is executed with SYSTEM privileges when an unprivileged user performs a repair operation.
0
Attacker Value
Unknown
CVE-2019-5648
Disclosure Date: March 05, 2020 (last updated February 21, 2025)
Authenticated, administrative access to a Barracuda Load Balancer ADC running unpatched firmware <= v6.4 allows one to edit the LDAP service configuration of the balancer and change the LDAP server to an attacker-controlled system, without having to re-enter LDAP credentials. These steps can be used by any authenticated administrative user to expose the LDAP credentials configured in the LDAP connector over the network.
0
Attacker Value
Unknown
CVE-2014-2595
Disclosure Date: February 12, 2020 (last updated February 21, 2025)
Barracuda Web Application Firewall (WAF) 7.8.1.013 allows remote attackers to bypass authentication by leveraging a permanent authentication token obtained from a query string.
0
Attacker Value
Unknown
CVE-2019-6724
Disclosure Date: March 21, 2019 (last updated November 27, 2024)
The barracudavpn component of the Barracuda VPN Client prior to version 5.0.2.7 for Linux, macOS, and OpenBSD runs as a privileged process and can allow an unprivileged local attacker to load a malicious library, resulting in arbitrary code executing as root.
0
Attacker Value
Unknown
CVE-2018-20369
Disclosure Date: December 23, 2018 (last updated November 27, 2024)
Barracuda Message Archiver 2018 has XSS in the error_msg exception-handling value for the ldap_user parameter to the cgi-mod/ldap_load_entry.cgi module. The injection point of the issue is the Add_Update module.
0
Attacker Value
Unknown
CVE-2014-8426
Disclosure Date: August 28, 2017 (last updated November 26, 2024)
Hard coded weak credentials in Barracuda Load Balancer 5.0.0.015.
0
Attacker Value
Unknown
CVE-2014-8428
Disclosure Date: August 28, 2017 (last updated November 26, 2024)
Privilege escalation vulnerability in Barracuda Load Balancer 5.0.0.015 via the use of an improperly protected SSH key.
0