Логотип exploitDog
bind:CVE-2024-42455
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-42455

Количество 3

Количество 3

nvd логотип

CVE-2024-42455

около 1 года назад

A vulnerability in Veeam Backup & Replication allows a low-privileged user to connect to remoting services and exploit insecure deserialization by sending a serialized temporary file collection. This exploit allows the attacker to delete any file on the system with service account privileges. The vulnerability is caused by an insufficient blacklist during the deserialization process.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-hw3m-2wrm-879c

около 1 года назад

A vulnerability in Veeam Backup & Replication allows a low-privileged user to connect to remoting services and exploit insecure deserialization by sending a serialized temporary file collection. This exploit allows the attacker to delete any file on the system with service account privileges. The vulnerability is caused by an insufficient blacklist during the deserialization process.

CVSS3: 7.1
EPSS: Низкий
fstec логотип

BDU:2024-11172

больше 1 года назад

Уязвимость средства защиты облачных, виртуальных и физических систем Veeam Backup & Replication, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю получить несанкционированный доступ на чтение, изменение или удаление данных

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-42455

A vulnerability in Veeam Backup & Replication allows a low-privileged user to connect to remoting services and exploit insecure deserialization by sending a serialized temporary file collection. This exploit allows the attacker to delete any file on the system with service account privileges. The vulnerability is caused by an insufficient blacklist during the deserialization process.

CVSS3: 8.1
5%
Низкий
около 1 года назад
github логотип
GHSA-hw3m-2wrm-879c

A vulnerability in Veeam Backup & Replication allows a low-privileged user to connect to remoting services and exploit insecure deserialization by sending a serialized temporary file collection. This exploit allows the attacker to delete any file on the system with service account privileges. The vulnerability is caused by an insufficient blacklist during the deserialization process.

CVSS3: 7.1
5%
Низкий
около 1 года назад
fstec логотип
BDU:2024-11172

Уязвимость средства защиты облачных, виртуальных и физических систем Veeam Backup & Replication, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю получить несанкционированный доступ на чтение, изменение или удаление данных

CVSS3: 7.1
5%
Низкий
больше 1 года назад

Уязвимостей на страницу