Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-37506 | A code injection vulnerability can allow a low-privileged user to overwrite files on that VSPC server, which can lead to remote code execution on VSPC server. |
| Link | Providers |
|---|---|
| https://www.veeam.com/kb4649 |
|
Mon, 09 Sep 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Veeam
Veeam service Provider Console |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:veeam:service_provider_console:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Veeam
Veeam service Provider Console |
|
| Metrics |
ssvc
|
Sat, 07 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A code injection vulnerability can allow a low-privileged user to overwrite files on that VSPC server, which can lead to remote code execution on VSPC server. | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-09T16:20:59.132Z
Reserved: 2024-06-19T01:04:07.137Z
Link: CVE-2024-38651
Updated: 2024-09-09T16:20:08.583Z
Status : Deferred
Published: 2024-09-07T17:15:12.347
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-38651
No data.
OpenCVE Enrichment
No data.
EUVD