Vulnerabilities (CVE)

Filtered by vendor Qsan Subscribe
Filtered by product Xevo
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-32531 1 Qsan 1 Xevo 2023-12-10 7.5 HIGH 9.8 CRITICAL
OS command injection vulnerability in Init function in QSAN XEVO allows remote attackers to execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN XEVO v2.1.0.
CVE-2021-32529 1 Qsan 2 Sanos, Xevo 2023-12-10 7.5 HIGH 9.8 CRITICAL
Command injection vulnerability in QSAN XEVO, SANOS allows remote unauthenticated attackers to execute arbitrary commands. Suggest contacting with QSAN and refer to recommendations in QSAN Document.
CVE-2021-32532 1 Qsan 1 Xevo 2023-12-10 5.0 MEDIUM 7.5 HIGH
Path traversal vulnerability in back-end analysis function in QSAN XEVO allows remote attackers to download arbitrary files without permissions. The referred vulnerability has been solved with the updated version of QSAN XEVO v2.1.0.
CVE-2021-32521 1 Qsan 3 Sanos, Storage Manager, Xevo 2023-12-10 7.5 HIGH 9.8 CRITICAL
Use of MAC address as an authenticated password in QSAN Storage Manager, XEVO, SANOS allows local attackers to escalate privileges. Suggest contacting with QSAN and refer to recommendations in QSAN Document.
CVE-2021-32522 1 Qsan 3 Sanos, Storage Manager, Xevo 2023-12-10 5.0 MEDIUM 9.8 CRITICAL
Improper restriction of excessive authentication attempts vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to discover users’ credentials and obtain access via a brute force attack. Suggest contacting with QSAN and refer to recommendations in QSAN Document.
CVE-2021-32530 1 Qsan 1 Xevo 2023-12-10 7.5 HIGH 9.8 CRITICAL
OS command injection vulnerability in Array function in QSAN XEVO allows remote unauthenticated attackers to execute arbitrary commands via status parameter. The referred vulnerability has been solved with the updated version of QSAN XEVO v2.1.0.
CVE-2021-32519 1 Qsan 3 Sanos, Storage Manager, Xevo 2023-12-10 5.0 MEDIUM 7.5 HIGH
Use of password hash with insufficient computational effort vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to recover the plain-text password by brute-forcing the MD5 hash. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.2, QSAN XEVO v2.1.0, and QSAN SANOS v2.1.0.