VYPR
Vendor
Products
3
CVEs
9
Across products
9
Status
Private

Products

3

Recent CVEs

9
CVESevRiskCVSSEPSSKEVPublishedDescription
CVE-2026-21669Cri0.649.90.00Mar 12, 2026A vulnerability allowing an authenticated domain user to perform remote code execution (RCE) on the Backup Server.
CVE-2026-21671Cri0.599.10.00Mar 12, 2026A vulnerability allowing an authenticated user with the Backup Administrator role to perform remote code execution (RCE) in high availability (HA) deployments of Veeam Backup & Replication.
CVE-2026-21668Hig0.578.80.00Mar 12, 2026A vulnerability allowing an authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository.
CVE-2026-21670Hig0.507.70.00Mar 12, 2026A vulnerability allowing a low-privileged user to extract saved SSH credentials.
CVE-2024-292120.020.30May 13, 2024Due to an unsafe de-serialization method used by the Veeam Service Provider Console(VSPC) server in communication between the management agent and its components, under certain conditions, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.
CVE-2024-452070.000.00Dec 4, 2024DLL injection in Veeam Agent for Windows can occur if the system's PATH variable includes insecure locations. When the agent runs, it searches these directories for necessary DLLs. If an attacker places a malicious DLL in one of these directories, the Veeam Agent might load it inadvertently, allowing the attacker to execute harmful code. This could lead to unauthorized access, data theft, or disruption of services
CVE-2024-452060.000.00Dec 4, 2024A vulnerability in Veeam Service Provider Console has been identified, which allows to perform arbitrary HTTP requests to arbitrary hosts of the network and get information about internal resources.
CVE-2024-298530.000.00May 22, 2024An authentication bypass vulnerability in Veeam Agent for Microsoft Windows allows for local privilege escalation.
CVE-2015-57420.000.00Oct 16, 2015VeeamVixProxy in Veeam Backup & Replication (B&R) before 8.0 update 3 stores local administrator credentials in log files with world-readable permissions, which allows local users to obtain sensitive information by reading the files.