Lucene search

K

AVEVA Software, LLC. Security Vulnerabilities

nessus
nessus

Malicious Process Detection: Potentially Unwanted Software

The md5sum of one or more running process on the remote Windows host matches software known to violate some corporate policies. Verify that the remote processes are authorized in your...

2.4AI Score

2012-06-21 12:00 AM
11
cve
cve

CVE-2006-4349

PHP remote file inclusion vulnerability in ToendaCMS 1.0.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the tcms_administer_site parameter to an unspecified script, probably index.php. NOTE: this issue has been disputed by a third party, who states that...

8AI Score

0.086EPSS

2006-08-24 09:04 PM
18
nessus
nessus

Malicious File Detection: Potentially Unwanted Software

The md5sum of one or more files on the remote Windows host matches software known to violate some corporate policies. Verify that the remote files are authorized in your...

2.4AI Score

2016-04-11 12:00 AM
7
veeam
veeam

Granular Log Collection Guide for SOBR Capacity/Archive Tier Issues

This article documents an advanced granular log collection method designed to minimize the log bundle size when submitting Veeam Support cases for issues related to the capacity tier or archive tier of a Scale-Out Backup...

6.9AI Score

2023-07-25 12:00 AM
5
nessus
nessus

List Installed Mac OS X Software

This plugin gathers information about all managed / packaged software installed on the remote Mac OS X...

2.3AI Score

2015-06-04 12:00 AM
14
nessus
nessus

Oracle Installed Software Enumeration (Linux / Unix)

Nessus was able to enumerate installed Oracle software on the remote Linux / Unix...

1.2AI Score

2013-12-27 12:00 AM
20
veeam
veeam

How to Enable Changed Block Tracking for Guest Cluster on vSphere with Tanzu

Changed Block Tracking is a VMware feature that tracks changes in virtual disks. Veeam Kasten for Kubernetes uses this feature in vSphere with Tanzu Guest Clusters to efficiently backup Persistent...

7AI Score

2024-06-10 12:00 AM
cve
cve

CVE-2005-4515

SQL injection vulnerability in WebDB 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified search parameters, possibly Search0. NOTE: the vendor has disputed this issue, saying that "WebDB is a generic online database system used by many of the clients of Lois...

8.8AI Score

0.008EPSS

2005-12-23 01:03 AM
20
veeam
veeam

Troubleshooting '401 - Unauthorized' or 'x509' Errors When Accessing the Veeam Kasten for Kubernetes Dashboard

Veeam Support Knowledge Base answer to: Troubleshooting '401 - Unauthorized' or 'x509' Errors When Accessing the Veeam Kasten for Kubernetes...

7.2AI Score

2024-06-07 12:00 AM
veeam
veeam

What Data Does Veeam Kasten for Kubernetes Include in the Phone Home Reports

This article documents what data is included in the phone home reports sent by Veeam Kasten for...

7.1AI Score

2024-06-07 12:00 AM
3
nessus
nessus

IBM Netezza Platform Software Detection (Linux)

Support software for IBM Netezza, a enterprise data warehousing suite, is installed on the remote Linux...

1.2AI Score

2018-02-09 12:00 AM
11
nessus
nessus

Intel Chipset Device Software Installed (Windows)

Intel Chipset Device Software is installed on the remote Windows...

7.4AI Score

2023-11-30 12:00 AM
1
githubexploit
githubexploit

Exploit for Infinite Loop in Cisco Adaptive Security Appliance Software

CVE-2024-20353-CiscoASAandFTD Exploit for DoS Cisco ASA and...

8.6CVSS

7.7AI Score

0.002EPSS

2024-05-03 12:46 PM
182
veeam
veeam

How to Properly Off-Board a Namespace From Veeam Kasten for Kubernetes Backups

This article documents the procedure to properly off-board a namespace in Veeam Kasten for...

7AI Score

2024-06-07 12:00 AM
veeam
veeam

How to ‘Transform’ Multiple Resources with Regex

Veeam Support Knowledge Base answer to: How to ‘Transform’ Multiple Resources with...

7.1AI Score

2024-06-07 12:00 AM
4
veeam
veeam

How to Connect to an Object Storage Repository via AWS Privatelink / Direct Connect

This article documents how to configure Veeam Backup & Replication to use AWS PrivateLink or AWS Direct Connect for Scale-Out Backup Repository offload to Capacity Tier or Archive...

6.9AI Score

2021-10-17 12:00 AM
11
cve
cve

CVE-2023-2565

A vulnerability has been found in SourceCodester Multi Language Hotel Management Software 1.0 and classified as problematic. This vulnerability affects unknown code of the file ajax.php of the component POST Parameter Handler. The manipulation of the argument complaint_type with the input...

6.1CVSS

6.1AI Score

0.001EPSS

2023-05-07 03:15 PM
25
veeam
veeam

How to Configure EKS Clusters to Use AWS IAM Users/Roles for Veeam Kasten for Kubernetes Access

Follow this guide to provide appropriate Veeam Kasten for Kubernetes role-based access using AWS IAM users or...

7.1AI Score

2024-06-06 12:00 AM
2
veeam
veeam

Unexpected Snapshot Deletion Failures in the Job Sessions for ONTAP 9.13.1

Due to a change in ONTAP 9.13.1, cloned volumes in this version fall into the recovery queue for 12 hours by default. The parent snapshot receives a 'busy' state and cannot be deleted before the clone leaves the queue and is removed completely from...

6.8AI Score

2023-08-03 12:00 AM
4
veeam
veeam

How to Collect Logs for Veeam Backup Enterprise Manager

How to Collect Logs for Veeam Backup Enterprise...

7.1AI Score

2023-12-13 12:00 AM
3
veeam
veeam

Antivirus Exclusions for Veeam Plug-ins for Enterprise Applications

This article documents antivirus exclusions that may be created to reduce the impact that antivirus software has on the functionality of Antivirus Exclusions for Veeam Plug-ins for Enterprise...

7.1AI Score

2023-02-13 12:00 AM
19
veeam
veeam

How to Collect Logs for Veeam ONE

The article explains how to collect logs for Veeam...

1.7AI Score

2014-04-03 12:00 AM
5
veeam
veeam

How to Override Volume storageClass During Export

Veeam Support Knowledge Base answer to: How to Override Volume storageClass During...

7.1AI Score

2024-06-07 12:00 AM
2
veeam
veeam

Debugging Backups with Longhorn CSI

Veeam Support Knowledge Base answer to: Debugging Backups with Longhorn...

7.1AI Score

2024-06-07 12:00 AM
veeam
veeam

Veeam Agent for Linux - veeamsnap and blksnap Extended Linux Distribution Support

This article describesVeeam Agent for Linux support for distribution versions released after the latest release of Veeam Agent for...

2.5AI Score

2018-11-29 12:00 AM
12
nessus
nessus

OpenX Source Unsupported Software Detection

OpenX Source, an open source ad server application is no longer maintained and is unsupported by the vendor. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security...

7.5AI Score

2014-06-30 12:00 AM
18
veeam
veeam

Antivirus Exclusions for Veeam Backup & Replication

This article documents antivirus exclusions that may be created to reduce the impact that antivirus software has on the functionality of Veeam Backup &...

2.4AI Score

2015-02-03 12:00 AM
13
veeam
veeam

VM Loses Connection During Snapshot Removal

During snapshot removal phase of backup or replication job, VM loses connectivity either momentarily or for extended periods of...

1.6AI Score

2012-10-04 12:00 AM
5
veeam
veeam

Veeam Recovery Media for Linux OS, Workarounds

Veeam Support Knowledge Base answer to: Veeam Recovery Media for Linux OS,...

3.5AI Score

2021-06-17 12:00 AM
9
veeam
veeam

Veeam Cloud Connect - Compiling Provider/Tenant Logs for Support Cases

Veeam Cloud Connect - Compiling Provider/Tenant Logs for Support...

1.5AI Score

2016-02-09 12:00 AM
6
veeam
veeam

Veeam Backup & Replication support for VMware vSphere

This article provides VMware vSphere compatibility information for the most recent version of Veeam Backup &...

6.5AI Score

2018-02-12 12:00 AM
30
nessus
nessus

Detect Unmanaged Software Install Location (Windows)

Locate software that is not managed by standard operating system install techniques. This software is often installed in non-standard directories or packaged with other software. The discovery of this software will allow plugins to determine if the software is vulnerable. Scan settings and how...

1.9AI Score

2021-08-09 12:00 AM
8
nessus
nessus

Microsoft Windows Start Menu Software Version Enumeration

This plugin enumerates the installed software version by interrogating information obtained from various registry entries and files on disk. This plugin provides a best guess at the software version and a confidence level for that version. Note that the versions detected here do not necessarily...

7.1AI Score

2024-06-13 12:00 AM
1
vulnrichment
vulnrichment

CVE-2024-35751 WordPress Woody code snippets plugin <= 2.4.10 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Creative Motion, Will Bontrager Software, LLC Woody ad snippets allows Stored XSS.This issue affects Woody ad snippets: from n/a through...

5.9CVSS

6.8AI Score

0.0004EPSS

2024-06-08 12:35 PM
1
veeam
veeam

How to restore vCenter Server without a vCenter Server

The vCenter Server is not available and the vCenter Server VM needs to be...

1.8AI Score

2014-08-06 12:00 AM
4
veeam
veeam

“Cannot change WebPart ExportMode to ‘All’. WebPart will be skipped” - Warning When Performing Backup of SharePoint Sites

To back up Web Parts with the Modern App-Only Authentication method, Veeam Backup for Microsoft 365 requires setting the "Export Mode" property of the web part from "None" to "All" to make this Web Part exportable and available for...

1.5AI Score

2021-01-21 12:00 AM
152
veeam
veeam

Scale-Out Backup Repository Offload task fails with "There is not enough space on the disk"

Veeam Support Knowledge Base answer to: Scale-Out Backup Repository Offload task fails with "There is not enough space on the...

1.9AI Score

2022-03-02 12:00 AM
11
veeam
veeam

How-To Export Windows Event Logs

This article provides step-by-step instructions to export Windows events for Veeam...

3AI Score

2014-04-21 12:00 AM
8
veeam
veeam

Dell PowerPath - Veeam Agent for Linux Limitations

If a Linux server has Dell PowerPath devices attached, all the underlying block devices representing the network paths to the server are skipped from processing. This will result in the error "No objects to backup" or PowerPath devices missing from the backup. If non-PowerPath devices are part of.....

7.1AI Score

2018-09-19 12:00 AM
8
hp
hp

Intel Graphics Command Center Service Software May 2024 Security Update

Intel has informed HP of a potential security vulnerability in some Intel® Graphics Command Center Service software (bundled in some Intel® Graphics Windows DCH driver software), which might allow escalation of privilege. Intel is releasing software updates to mitigate this potential...

6.7CVSS

7.5AI Score

0.0004EPSS

2024-05-14 12:00 AM
5
ibm
ibm

Security Bulletin: IBM Planning Analytics Workspace is affected by vulnerabilities in multiple Open Source Software (OSS) components

Summary There are vulnerabilities in multiple Open Source Software (OSS) components consumed by IBM Planning Analytics Workspace. These issues have been addressed in IBM Planning Analytics 2.1.3 and IBM Planning Analytics 2.0.96 by upgrading or removing the vulnerable libraries. Please refer to...

9.8CVSS

9.2AI Score

0.975EPSS

2024-05-30 08:42 PM
3
nvd
nvd

CVE-2024-35751

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Creative Motion, Will Bontrager Software, LLC Woody ad snippets allows Stored XSS.This issue affects Woody ad snippets: from n/a through...

5.9CVSS

0.0004EPSS

2024-06-08 01:15 PM
3
cvelist
cvelist

CVE-2024-35751 WordPress Woody code snippets plugin <= 2.4.10 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Creative Motion, Will Bontrager Software, LLC Woody ad snippets allows Stored XSS.This issue affects Woody ad snippets: from n/a through...

5.9CVSS

0.0004EPSS

2024-06-08 12:35 PM
6
ibm
ibm

Security Bulletin: Multiple Vulnerabilities in IBM® SDK, Java™ Technology Java affect IBM Cloud Pak System

Summary Vulnerabilities in IBM Java SDK affect IBM Cloud Pak System. Vulnerability Details ** CVEID: CVE-2023-21930 DESCRIPTION: **An unspecified vulnerability in Oracle Java SE, Oracle GraalVM Enterprise Edition related to the JSSE component could allow an unauthenticated attacker to cause high...

9.1CVSS

8.6AI Score

0.002EPSS

2024-04-24 01:04 PM
11
veeam
veeam

Datastore Named 'VeeamBackup_' Listed as Inaccessible

The datastore appears "inaccessible" because the ESXi host cannot access the NFS share hosted by the vPower NFS Service on the Mount Server listed in the datastore's name. If no restores are actively utilizing the Veeam vPower NFS feature, the datastore's inaccessible state is expected...

3.8AI Score

2022-09-27 12:00 AM
22
veeam
veeam

Release Information for Dell PowerStore Plug-In for Veeam Backup & Replication

Release Information for Dell PowerStore Plug-In for Veeam Backup &...

3.1AI Score

2021-11-22 12:00 AM
15
cve
cve

CVE-2024-35751

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Creative Motion, Will Bontrager Software, LLC Woody ad snippets allows Stored XSS.This issue affects Woody ad snippets: from n/a through...

5.9CVSS

5.7AI Score

0.0004EPSS

2024-06-08 01:15 PM
23
veeam
veeam

Job For .local Domain Fails When Using Ubuntu-base VMware Backup Proxy

This issue occurs because .local is only intended for multicast DNS, and Ubuntu's default configuration prevents the use of .local for unicast DNS. As a result, the Ubuntu-based machine does not contact the network's DNS server when attempting to resolve .local...

7.1AI Score

2024-06-03 12:00 AM
4
veeam
veeam

Error: Skipping VM processing due to insufficient free disk space on datastore

These alerts are related to the Production Datastore Low Free Space notification settings under General...

3.1AI Score

2022-11-11 12:00 AM
39
cve
cve

CVE-2007-4037

Guidance Software EnCase allows user-assisted attackers to trigger a buffer over-read and application crash via a malformed NTFS filesystem containing a modified FILE record with a certain large offset. NOTE: the vendor disputes the significance of this issue, asserting that relevant attackers...

6.6AI Score

0.01EPSS

2007-07-27 10:30 PM
19
Total number of security vulnerabilities624176