Show filters
69 Total Results
Displaying 1-10 of 69
Sort by:
Attacker Value
Moderate

OpenSSL TLS Server Crash (NULL pointer dereference) — CVE-2021-3449

Disclosure Date: March 25, 2021 (last updated February 22, 2025)
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).
Attacker Value
Moderate

CVE-2024-29212

Disclosure Date: May 14, 2024 (last updated May 15, 2024)
Due to an unsafe de-serialization method used by the Veeam Service Provider Console(VSPC) server in communication between the management agent and its components, under certain conditions, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.
1
Attacker Value
Unknown

CVE-2024-42448

Disclosure Date: December 12, 2024 (last updated December 21, 2024)
From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.
0
Attacker Value
Unknown

CVE-2024-45206

Disclosure Date: December 04, 2024 (last updated December 21, 2024)
A vulnerability in Veeam Service Provider Console has been identified, which allows to perform arbitrary HTTP requests to arbitrary hosts of the network and get information about internal resources.
0
Attacker Value
Unknown

CVE-2024-42449

Disclosure Date: December 04, 2024 (last updated December 21, 2024)
From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to remove arbitrary files on the VSPC server machine.
0
Attacker Value
Unknown

CVE-2024-39715

Disclosure Date: September 07, 2024 (last updated September 08, 2024)
A code injection vulnerability that allows a low-privileged user with REST API access granted to remotely upload arbitrary files to the VSPC server using REST API, leading to remote code execution on VSPC server.
0
Attacker Value
Unknown

CVE-2024-39714

Disclosure Date: September 07, 2024 (last updated September 08, 2024)
A code injection vulnerability that permits a low-privileged user to upload arbitrary files to the server, leading to remote code execution on VSPC server.
0
Attacker Value
Unknown

CVE-2024-38651

Disclosure Date: September 07, 2024 (last updated September 08, 2024)
A code injection vulnerability can allow a low-privileged user to overwrite files on that VSPC server, which can lead to remote code execution on VSPC server.
0
Attacker Value
Unknown

CVE-2024-38650

Disclosure Date: September 07, 2024 (last updated September 08, 2024)
An authentication bypass vulnerability can allow a low privileged attacker to access the NTLM hash of service account on the VSPC server.
0
Attacker Value
Unknown

CVE-2024-6267

Disclosure Date: June 23, 2024 (last updated September 07, 2024)
A vulnerability classified as problematic was found in SourceCodester Service Provider Management System 1.0. Affected by this vulnerability is an unknown functionality of the file system_info/index.php of the component System Info Page. The manipulation of the argument System Name/System Short Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269479.