Changed |
CPE Configuration |
OR
*cpe:2.3:a:barracudadrive:barracudadrive:3.4:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:3.5:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:3.6:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:3.7:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:3.7.2:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:3.8:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:3.9:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.0:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.0.1:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.1:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.2:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.3:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.4:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.4.1:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.4.2:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.4.3:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.4.4:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.4.5:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.4.6:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.4.7:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.4.8:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.5:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.5.1:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.5.2:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.5.3:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.5.4:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.5.5:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.6:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.6.1:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.7:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.8:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.8.4:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.9:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.9.1:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:4.9.2:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:5.0:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:5.1:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:5.2:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:5.3:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:6.0:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:6.1:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:6.2:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:6.3:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:6.4:*:*:*:*:*:*:*
*cpe:2.3:a:barracudadrive:barracudadrive:*:*:*:*:*:*:*:* versions up to (including) 6.6
*cpe:2.3:a:realtimelogic:barracudadrive:6.5:*:*:*:*:*:*:*
|
OR
*cpe:2.3:a:barracudadrive:barracudadrive:*:*:*:*:*:*:*:* versions up to (excluding) 6.7
|
Added |
CVSS V3.1 |
|
NIST AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
Changed |
Reference Type |
http://barracudadrive.com/readme.txt No Types Assigned
|
http://barracudadrive.com/readme.txt Release Notes, Vendor Advisory
|
Changed |
Reference Type |
http://packetstormsecurity.com/files/125766 Exploit
|
http://packetstormsecurity.com/files/125766 Exploit, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
http://secpod.org/advisories/SecPod_BarracudaDrive_Mult_XSS_Vuln.txt Exploit
|
http://secpod.org/advisories/SecPod_BarracudaDrive_Mult_XSS_Vuln.txt Broken Link
|
Changed |
Reference Type |
http://secpod.org/blog/?p=2158 Exploit
|
http://secpod.org/blog/?p=2158 Broken Link
|
Changed |
Reference Type |
http://secunia.com/advisories/57451 Vendor Advisory
|
http://secunia.com/advisories/57451 Not Applicable, Third Party Advisory
|
Changed |
Reference Type |
http://www.securityfocus.com/bid/66269 No Types Assigned
|
http://www.securityfocus.com/bid/66269 Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
https://exchange.xforce.ibmcloud.com/vulnerabilities/91920 No Types Assigned
|
https://exchange.xforce.ibmcloud.com/vulnerabilities/91920 VDB Entry, Vendor Advisory
|