8.1

CVSS3.1

CVE-2024-42453 -

A vulnerability Veeam Backup & Replication allows low-privileged users to control and modify configurations on connected virtual infrastructure hosts. This includes the ability to power off virtual machines, delete files in storage, and make configuration changes, potentially leading to Denial of S…

πŸ“… Published: Dec. 4, 2024, 1:06 a.m. πŸ”„ Last Modified: April 24, 2025, 5:11 p.m.

7

CVSS3.0

CVE-2024-45207 -

DLL injection in Veeam Agent for Windows can occur if the system's PATH variable includes insecure locations. When the agent runs, it searches these directories for necessary DLLs. If an attacker places a malicious DLL in one of these directories, the Veeam Agent might load it inadvertently, allowi…

πŸ“… Published: Dec. 4, 2024, 1:06 a.m. πŸ”„ Last Modified: July 2, 2025, 8:29 p.m.

6.5

CVSS3.1

CVE-2024-42457 -

A vulnerability in Veeam Backup & Replication allows users with certain operator roles to expose saved credentials by leveraging a combination of methods in a remote management interface. This can be achieved using a session object that allows for credential enumeration and exploitation, leading to…

πŸ“… Published: Dec. 4, 2024, 1:06 a.m. πŸ”„ Last Modified: April 24, 2025, 5:08 p.m.

8.8

CVSS3.1

CVE-2024-42452 -

A vulnerability in Veeam Backup & Replication allows a low-privileged user to start an agent remotely in server mode and obtain credentials, effectively escalating privileges to system-level access. This allows the attacker to upload files to the server with elevated privileges. The vulnerability e…

πŸ“… Published: Dec. 4, 2024, 1:06 a.m. πŸ”„ Last Modified: April 24, 2025, 5:20 p.m.

6.5

CVSS3.0

CVE-2024-45206 -

A vulnerability in Veeam Service Provider Console has been identified, which allows to perform arbitrary HTTP requests to arbitrary hosts of the network and get information about internal resources.

πŸ“… Published: Dec. 4, 2024, 1:06 a.m. πŸ”„ Last Modified: July 2, 2025, 8:34 p.m.

7.1

CVSS3.0

CVE-2024-45205 -

An Improper Certificate Validation on the UniFi iOS App managing a standalone UniFi Access Point (not using UniFi Network Application) could allow a malicious actor with access to an adjacent network to take control of this UniFi Access Point. Affected Products: UniFi iOS App (Version 10.17.7 and…

πŸ“… Published: Dec. 4, 2024, 1:06 a.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

8.8

CVSS3.1

CVE-2024-40717 -

A vulnerability in Veeam Backup & Replication allows a low-privileged user with certain roles to perform remote code execution (RCE) by updating existing jobs. These jobs can be configured to run pre- and post-scripts, which can be located on a network share and are executed with elevated privilege…

πŸ“… Published: Dec. 4, 2024, 1:06 a.m. πŸ”„ Last Modified: April 24, 2025, 5:21 p.m.

8.8

CVSS3.1

CVE-2024-42456 -

A vulnerability in Veeam Backup & Replication platform allows a low-privileged user with a specific role to exploit a method that updates critical configuration settings, such as modifying the trusted client certificate used for authentication on a specific port. This can result in unauthorized acc…

πŸ“… Published: Dec. 4, 2024, 1:06 a.m. πŸ”„ Last Modified: April 24, 2025, 5:09 p.m.

8.1

CVSS3.1

CVE-2024-42455 -

A vulnerability in Veeam Backup & Replication allows a low-privileged user to connect to remoting services and exploit insecure deserialization by sending a serialized temporary file collection. This exploit allows the attacker to delete any file on the system with service account privileges. The v…

πŸ“… Published: Dec. 4, 2024, 1:06 a.m. πŸ”„ Last Modified: April 24, 2025, 5:10 p.m.

7.1

CVSS3.0

CVE-2024-42449 -

From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to remove arbitrary files on the VSPC server machine.

πŸ“… Published: Dec. 4, 2024, 1:06 a.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 347769
Page 7490 of 34,777
Β« previous page Β» next page
Filters