This might be proprietary software.
|2020-01-21||CVE-2020-7040||storeBackup.pl in storeBackup through 3.5 relies on the /tmp/storeBackup.lock pathname, which allows symlink attacks that possibly lead to privilege escalation. (Local users can also create a plain file named /tmp/storeBackup.lock to block use of storeBackup until an admin manually deletes that file.)||Debian_linux, Backports_sle, Leap, Storebackup||N/A|
|2005-10-05||CVE-2005-3148||StoreBackup before 1.19 does not properly set the uid and guid for symbolic links (1) that are backed up by storeBackup.pl, or (2) recovered by storeBackupRecover.pl, which could cause files to be restored with incorrect ownership.||Storebackup, Suse_linux||N/A|
|2005-10-05||CVE-2005-3147||StoreBackup before 1.19 creates the backup root with world-readable permissions, which allows local users to obtain sensitive information.||Storebackup, Suse_linux||N/A|
|2005-10-05||CVE-2005-3146||StoreBackup before 1.19 allows local users to perform unauthorized operations on arbitrary files via a symlink attack on temporary files.||Storebackup, Suse_linux||N/A|