Malicious Process Detection: Potentially Unwanted Software
The md5sum of one or more running process on the remote Windows host matches software known to violate some corporate policies. Verify that the remote processes are authorized in your...
2.4AI Score
PHP remote file inclusion vulnerability in ToendaCMS 1.0.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the tcms_administer_site parameter to an unspecified script, probably index.php. NOTE: this issue has been disputed by a third party, who states that...
8AI Score
0.086EPSS
Malicious File Detection: Potentially Unwanted Software
The md5sum of one or more files on the remote Windows host matches software known to violate some corporate policies. Verify that the remote files are authorized in your...
2.4AI Score
Granular Log Collection Guide for SOBR Capacity/Archive Tier Issues
This article documents an advanced granular log collection method designed to minimize the log bundle size when submitting Veeam Support cases for issues related to the capacity tier or archive tier of a Scale-Out Backup...
6.9AI Score
List Installed Mac OS X Software
This plugin gathers information about all managed / packaged software installed on the remote Mac OS X...
2.3AI Score
Oracle Installed Software Enumeration (Linux / Unix)
Nessus was able to enumerate installed Oracle software on the remote Linux / Unix...
1.2AI Score
How to Enable Changed Block Tracking for Guest Cluster on vSphere with Tanzu
Changed Block Tracking is a VMware feature that tracks changes in virtual disks. Veeam Kasten for Kubernetes uses this feature in vSphere with Tanzu Guest Clusters to efficiently backup Persistent...
7AI Score
SQL injection vulnerability in WebDB 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified search parameters, possibly Search0. NOTE: the vendor has disputed this issue, saying that "WebDB is a generic online database system used by many of the clients of Lois...
8.8AI Score
0.008EPSS
Veeam Support Knowledge Base answer to: Troubleshooting '401 - Unauthorized' or 'x509' Errors When Accessing the Veeam Kasten for Kubernetes...
7.2AI Score
What Data Does Veeam Kasten for Kubernetes Include in the Phone Home Reports
This article documents what data is included in the phone home reports sent by Veeam Kasten for...
7.1AI Score
IBM Netezza Platform Software Detection (Linux)
Support software for IBM Netezza, a enterprise data warehousing suite, is installed on the remote Linux...
1.2AI Score
Intel Chipset Device Software Installed (Windows)
Intel Chipset Device Software is installed on the remote Windows...
7.4AI Score
Exploit for Infinite Loop in Cisco Adaptive Security Appliance Software
CVE-2024-20353-CiscoASAandFTD Exploit for DoS Cisco ASA and...
8.6CVSS
7.7AI Score
0.002EPSS
How to Properly Off-Board a Namespace From Veeam Kasten for Kubernetes Backups
This article documents the procedure to properly off-board a namespace in Veeam Kasten for...
7AI Score
How to ‘Transform’ Multiple Resources with Regex
Veeam Support Knowledge Base answer to: How to ‘Transform’ Multiple Resources with...
7.1AI Score
How to Connect to an Object Storage Repository via AWS Privatelink / Direct Connect
This article documents how to configure Veeam Backup & Replication to use AWS PrivateLink or AWS Direct Connect for Scale-Out Backup Repository offload to Capacity Tier or Archive...
6.9AI Score
A vulnerability has been found in SourceCodester Multi Language Hotel Management Software 1.0 and classified as problematic. This vulnerability affects unknown code of the file ajax.php of the component POST Parameter Handler. The manipulation of the argument complaint_type with the input...
6.1CVSS
6.1AI Score
0.001EPSS
How to Configure EKS Clusters to Use AWS IAM Users/Roles for Veeam Kasten for Kubernetes Access
Follow this guide to provide appropriate Veeam Kasten for Kubernetes role-based access using AWS IAM users or...
7.1AI Score
Unexpected Snapshot Deletion Failures in the Job Sessions for ONTAP 9.13.1
Due to a change in ONTAP 9.13.1, cloned volumes in this version fall into the recovery queue for 12 hours by default. The parent snapshot receives a 'busy' state and cannot be deleted before the clone leaves the queue and is removed completely from...
6.8AI Score
How to Collect Logs for Veeam Backup Enterprise Manager
How to Collect Logs for Veeam Backup Enterprise...
7.1AI Score
Antivirus Exclusions for Veeam Plug-ins for Enterprise Applications
This article documents antivirus exclusions that may be created to reduce the impact that antivirus software has on the functionality of Antivirus Exclusions for Veeam Plug-ins for Enterprise...
7.1AI Score
1.7AI Score
How to Override Volume storageClass During Export
Veeam Support Knowledge Base answer to: How to Override Volume storageClass During...
7.1AI Score
Debugging Backups with Longhorn CSI
Veeam Support Knowledge Base answer to: Debugging Backups with Longhorn...
7.1AI Score
Veeam Agent for Linux - veeamsnap and blksnap Extended Linux Distribution Support
This article describesVeeam Agent for Linux support for distribution versions released after the latest release of Veeam Agent for...
2.5AI Score
OpenX Source Unsupported Software Detection
OpenX Source, an open source ad server application is no longer maintained and is unsupported by the vendor. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security...
7.5AI Score
Antivirus Exclusions for Veeam Backup & Replication
This article documents antivirus exclusions that may be created to reduce the impact that antivirus software has on the functionality of Veeam Backup &...
2.4AI Score
VM Loses Connection During Snapshot Removal
During snapshot removal phase of backup or replication job, VM loses connectivity either momentarily or for extended periods of...
1.6AI Score
Veeam Recovery Media for Linux OS, Workarounds
Veeam Support Knowledge Base answer to: Veeam Recovery Media for Linux OS,...
3.5AI Score
Veeam Cloud Connect - Compiling Provider/Tenant Logs for Support Cases
Veeam Cloud Connect - Compiling Provider/Tenant Logs for Support...
1.5AI Score
Veeam Backup & Replication support for VMware vSphere
This article provides VMware vSphere compatibility information for the most recent version of Veeam Backup &...
6.5AI Score
Detect Unmanaged Software Install Location (Windows)
Locate software that is not managed by standard operating system install techniques. This software is often installed in non-standard directories or packaged with other software. The discovery of this software will allow plugins to determine if the software is vulnerable. Scan settings and how...
1.9AI Score
Microsoft Windows Start Menu Software Version Enumeration
This plugin enumerates the installed software version by interrogating information obtained from various registry entries and files on disk. This plugin provides a best guess at the software version and a confidence level for that version. Note that the versions detected here do not necessarily...
7.1AI Score
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Creative Motion, Will Bontrager Software, LLC Woody ad snippets allows Stored XSS.This issue affects Woody ad snippets: from n/a through...
5.9CVSS
6.8AI Score
0.0004EPSS
How to restore vCenter Server without a vCenter Server
The vCenter Server is not available and the vCenter Server VM needs to be...
1.8AI Score
To back up Web Parts with the Modern App-Only Authentication method, Veeam Backup for Microsoft 365 requires setting the "Export Mode" property of the web part from "None" to "All" to make this Web Part exportable and available for...
1.5AI Score
Scale-Out Backup Repository Offload task fails with "There is not enough space on the disk"
Veeam Support Knowledge Base answer to: Scale-Out Backup Repository Offload task fails with "There is not enough space on the...
1.9AI Score
How-To Export Windows Event Logs
This article provides step-by-step instructions to export Windows events for Veeam...
3AI Score
Dell PowerPath - Veeam Agent for Linux Limitations
If a Linux server has Dell PowerPath devices attached, all the underlying block devices representing the network paths to the server are skipped from processing. This will result in the error "No objects to backup" or PowerPath devices missing from the backup. If non-PowerPath devices are part of.....
7.1AI Score
Intel Graphics Command Center Service Software May 2024 Security Update
Intel has informed HP of a potential security vulnerability in some Intel® Graphics Command Center Service software (bundled in some Intel® Graphics Windows DCH driver software), which might allow escalation of privilege. Intel is releasing software updates to mitigate this potential...
6.7CVSS
7.5AI Score
0.0004EPSS
Summary There are vulnerabilities in multiple Open Source Software (OSS) components consumed by IBM Planning Analytics Workspace. These issues have been addressed in IBM Planning Analytics 2.1.3 and IBM Planning Analytics 2.0.96 by upgrading or removing the vulnerable libraries. Please refer to...
9.8CVSS
9.2AI Score
0.975EPSS
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Creative Motion, Will Bontrager Software, LLC Woody ad snippets allows Stored XSS.This issue affects Woody ad snippets: from n/a through...
5.9CVSS
0.0004EPSS
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Creative Motion, Will Bontrager Software, LLC Woody ad snippets allows Stored XSS.This issue affects Woody ad snippets: from n/a through...
5.9CVSS
0.0004EPSS
Summary Vulnerabilities in IBM Java SDK affect IBM Cloud Pak System. Vulnerability Details ** CVEID: CVE-2023-21930 DESCRIPTION: **An unspecified vulnerability in Oracle Java SE, Oracle GraalVM Enterprise Edition related to the JSSE component could allow an unauthenticated attacker to cause high...
9.1CVSS
8.6AI Score
0.002EPSS
Datastore Named 'VeeamBackup_' Listed as Inaccessible
The datastore appears "inaccessible" because the ESXi host cannot access the NFS share hosted by the vPower NFS Service on the Mount Server listed in the datastore's name. If no restores are actively utilizing the Veeam vPower NFS feature, the datastore's inaccessible state is expected...
3.8AI Score
Release Information for Dell PowerStore Plug-In for Veeam Backup & Replication
Release Information for Dell PowerStore Plug-In for Veeam Backup &...
3.1AI Score
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Creative Motion, Will Bontrager Software, LLC Woody ad snippets allows Stored XSS.This issue affects Woody ad snippets: from n/a through...
5.9CVSS
5.7AI Score
0.0004EPSS
Job For .local Domain Fails When Using Ubuntu-base VMware Backup Proxy
This issue occurs because .local is only intended for multicast DNS, and Ubuntu's default configuration prevents the use of .local for unicast DNS. As a result, the Ubuntu-based machine does not contact the network's DNS server when attempting to resolve .local...
7.1AI Score
Error: Skipping VM processing due to insufficient free disk space on datastore
These alerts are related to the Production Datastore Low Free Space notification settings under General...
3.1AI Score
Guidance Software EnCase allows user-assisted attackers to trigger a buffer over-read and application crash via a malformed NTFS filesystem containing a modified FILE record with a certain large offset. NOTE: the vendor disputes the significance of this issue, asserting that relevant attackers...
6.6AI Score
0.01EPSS