Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Moderate
CVE-2024-29212
Disclosure Date: May 14, 2024 (last updated May 15, 2024)
Due to an unsafe de-serialization method used by the Veeam Service Provider Console(VSPC) server in communication between the management agent and its components, under certain conditions, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.
1
Attacker Value
Unknown
CVE-2024-42448
Disclosure Date: December 12, 2024 (last updated December 21, 2024)
From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.
0
Attacker Value
Unknown
CVE-2024-45206
Disclosure Date: December 04, 2024 (last updated December 21, 2024)
A vulnerability in Veeam Service Provider Console has been identified, which allows to perform arbitrary HTTP requests to arbitrary hosts of the network and get information about internal resources.
0
Attacker Value
Unknown
CVE-2024-42449
Disclosure Date: December 04, 2024 (last updated December 21, 2024)
From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to remove arbitrary files on the VSPC server machine.
0
Attacker Value
Unknown
CVE-2024-39715
Disclosure Date: September 07, 2024 (last updated September 08, 2024)
A code injection vulnerability that allows a low-privileged user with REST API access granted to remotely upload arbitrary files to the VSPC server using REST API, leading to remote code execution on VSPC server.
0
Attacker Value
Unknown
CVE-2024-39714
Disclosure Date: September 07, 2024 (last updated September 08, 2024)
A code injection vulnerability that permits a low-privileged user to upload arbitrary files to the server, leading to remote code execution on VSPC server.
0
Attacker Value
Unknown
CVE-2024-38651
Disclosure Date: September 07, 2024 (last updated September 08, 2024)
A code injection vulnerability can allow a low-privileged user to overwrite files on that VSPC server, which can lead to remote code execution on VSPC server.
0
Attacker Value
Unknown
CVE-2024-38650
Disclosure Date: September 07, 2024 (last updated September 08, 2024)
An authentication bypass vulnerability can allow a low privileged attacker to access the NTLM hash of service account on the VSPC server.
0
Attacker Value
Unknown
CVE-2020-27216
Disclosure Date: October 23, 2020 (last updated November 08, 2023)
In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
0
Attacker Value
Unknown
CVE-2019-10246
Disclosure Date: April 22, 2019 (last updated November 08, 2023)
In Eclipse Jetty version 9.2.27, 9.3.26, and 9.4.16, the server running on Windows is vulnerable to exposure of the fully qualified Base Resource directory name on Windows to a remote client when it is configured for showing a Listing of directory contents. This information reveal is restricted to only the content in the configured base resource directories.
0