7.8
CVE-2024-40709 -
A missing authorization vulnerability allows a local low-privileged user on the machine to escalate their privileges to root level.
7.8
CVE-2024-40713 -
A vulnerability that allows a user who has been assigned a low-privileged role within Veeam Backup & Replication to alter Multi-Factor Authentication (MFA) settings and bypass MFA.
9.8
CVE-2024-40711 -
A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE).
8.5
CVE-2024-39715 -
A code injection vulnerability that allows a low-privileged user with REST API access granted to remotely upload arbitrary files to the VSPC server using REST API, leading to remote code execution on VSPC server.
7.8
CVE-2024-40712 -
A path traversal vulnerability allows an attacker with a low-privileged account and local access to the system to perform local privilege escalation (LPE).
8.5
CVE-2024-38651 -
A code injection vulnerability can allow a low-privileged user to overwrite files on that VSPC server, which can lead to remote code execution on VSPC server.
5.4
CVE-2024-42020 -
A Cross-site-scripting (XSS) vulnerability exists in the Reporter Widgets that allows HTML injection.
9.9
CVE-2024-39714 -
A code injection vulnerability that permits a low-privileged user to upload arbitrary files to the server, leading to remote code execution on VSPC server.
8.8
CVE-2024-40710 -
A series of related high-severity vulnerabilities, the most notable enabling remote code execution (RCE) as the service account and extraction of sensitive information (savedcredentials and passwords). Exploiting these vulnerabilities requires a user who has been assigned a low-privileged role withβ¦
8.1
CVE-2024-39718 -
An improper input validation vulnerability that allows a low-privileged user to remotely remove files on the system with permissions equivalent to those of the service account.