Filtered by vendor Qsan
Subscribe
Total
31 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-32530 | 1 Qsan | 1 Xevo | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
OS command injection vulnerability in Array function in QSAN XEVO allows remote unauthenticated attackers to execute arbitrary commands via status parameter. The referred vulnerability has been solved with the updated version of QSAN XEVO v2.1.0. | |||||
CVE-2021-32513 | 1 Qsan | 1 Storage Manager | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
QsanTorture in QSAN Storage Manager does not filter special parameters properly that allows remote unauthenticated attackers to inject and execute arbitrary commands. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | |||||
CVE-2021-32506 | 1 Qsan | 1 Storage Manager | 2023-12-10 | 4.0 MEDIUM | 6.5 MEDIUM |
Absolute Path Traversal vulnerability in GetImage in QSAN Storage Manager allows remote authenticated attackers download arbitrary files via the Url path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3 . | |||||
CVE-2021-32534 | 1 Qsan | 1 Sanos | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
QSAN SANOS factory reset function does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0. | |||||
CVE-2021-32516 | 1 Qsan | 1 Storage Manager | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
Path traversal vulnerability in share_link in QSAN Storage Manager allows remote attackers to download arbitrary files. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | |||||
CVE-2021-32526 | 1 Qsan | 1 Storage Manager | 2023-12-10 | 4.0 MEDIUM | 6.5 MEDIUM |
Incorrect permission assignment for critical resource vulnerability in QSAN Storage Manager allows authenticated remote attackers to access arbitrary password files. Suggest contacting with QSAN and refer to recommendations in QSAN Document. | |||||
CVE-2021-32514 | 1 Qsan | 1 Storage Manager | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
Improper access control vulnerability in FirmwareUpgrade in QSAN Storage Manager allows remote attackers to reboot and discontinue the device. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | |||||
CVE-2021-32507 | 1 Qsan | 1 Storage Manager | 2023-12-10 | 4.0 MEDIUM | 6.5 MEDIUM |
Absolute Path Traversal vulnerability in FileDownload in QSAN Storage Manager allows remote authenticated attackers download arbitrary files via the Url path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | |||||
CVE-2021-32512 | 1 Qsan | 1 Storage Manager | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
QuickInstall in QSAN Storage Manager does not filter special parameters properly that allows remote unauthenticated attackers to inject and execute arbitrary commands. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | |||||
CVE-2021-32519 | 1 Qsan | 3 Sanos, Storage Manager, Xevo | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
Use of password hash with insufficient computational effort vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to recover the plain-text password by brute-forcing the MD5 hash. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.2, QSAN XEVO v2.1.0, and QSAN SANOS v2.1.0. | |||||
CVE-2021-32527 | 1 Qsan | 1 Storage Manager | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
Path traversal vulnerability in QSAN Storage Manager allows remote unauthenticated attackers to download arbitrary files thru injecting file path in download function. Suggest contacting with QSAN and refer to recommendations in QSAN Document. |