<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[KB4831: Vulnerabilities Resolved in Veeam Backup &amp;amp; Replication 13.0.1.2067 - low priv user can do cred extraction &#x2F; authed user can do RCE https:&#x2F;&#x2F;infosec.pub&#x2F;post&#x2F;43458190 [https:&#x2F;&#x2F;infosec.pub&#x2F;u&#x2F;digicat] #blueteamsec]]></title><description><![CDATA[<p>KB4831: Vulnerabilities Resolved in Veeam Backup &amp; Replication 13.0.1.2067 - low priv user can do cred extraction / authed user can do RCE <a href="https://infosec.pub/post/43458190" rel="nofollow noopener"><span>https://</span><span>infosec.pub/post/43458190</span><span></span></a> [<a href="/user/digicat%40infosec.pub" rel="nofollow noopener"><span>https://</span><span>infosec.pub/u/digicat</span><span></span></a>] <a href="https://infosec.exchange/tags/blueteamsec" rel="tag">#<span>blueteamsec</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/46d8abf2-1089-4440-9f15-30cd5d273998/kb4831-vulnerabilities-resolved-in-veeam-backup-amp-replication-13.0.1.2067-low-priv-user-can-do-cred-extraction-authed-user-can-do-rce-https-infosec.pub-post-43458190-https-infosec.pub-u-digicat-blueteamsec</link><generator>RSS for Node</generator><lastBuildDate>Tue, 14 Apr 2026 21:08:22 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/46d8abf2-1089-4440-9f15-30cd5d273998.rss" rel="self" type="application/rss+xml"/><pubDate>Sun, 15 Mar 2026 09:00:11 GMT</pubDate><ttl>60</ttl></channel></rss>