Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown

CVE-2024-22903

Disclosure Date: February 02, 2024 (last updated February 08, 2024)
Vinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the deleteUpdateAPK function.
Attacker Value
Unknown

CVE-2024-22902

Disclosure Date: February 02, 2024 (last updated February 08, 2024)
Vinchin Backup & Recovery v7.2 was discovered to be configured with default root credentials.
Attacker Value
Unknown

CVE-2024-22901

Disclosure Date: February 02, 2024 (last updated February 08, 2024)
Vinchin Backup & Recovery v7.2 was discovered to use default MYSQL credentials.
Attacker Value
Unknown

CVE-2024-22900

Disclosure Date: February 02, 2024 (last updated February 08, 2024)
Vinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the setNetworkCardInfo function.
Attacker Value
Unknown

CVE-2024-22899

Disclosure Date: February 02, 2024 (last updated February 08, 2024)
Vinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the syncNtpTime function.
Attacker Value
Unknown

CVE-2023-45499

Disclosure Date: October 27, 2023 (last updated November 09, 2023)
VinChin Backup & Recovery v5.0.*, v6.0.*, v6.7.*, and v7.0.* was discovered to contain hardcoded credentials.
Attacker Value
Unknown

CVE-2023-45498

Disclosure Date: October 27, 2023 (last updated November 09, 2023)
VinChin Backup & Recovery v5.0.*, v6.0.*, v6.7.*, and v7.0.* was discovered to contain a command injection vulnerability.
Attacker Value
Unknown

CVE-2022-35866

Disclosure Date: August 03, 2022 (last updated October 08, 2023)
This vulnerability allows remote attackers to bypass authentication on affected installations of Vinchin Backup and Recovery 6.5.0.17561. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the MySQL server. The server uses a hard-coded password for the administrator user. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-17139.