Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-32511: TWCERT/CC台灣電腦網路危機處理暨協調中心-QSAN Storage Manager - Exposure of Information Through Directory Listing Following via ViewBroserList function

QSAN Storage Manager through directory listing vulnerability in ViewBroserList allows remote authenticated attackers to list arbitrary directories via the file path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.

CVE

Related news

CVE-2020-15941: FortiGuard

A path traversal vulnerability [CWE-22] in FortiClientEMS versions 6.4.1 and below; 6.2.8 and below may allow an authenticated attacker to inject directory traversal character sequences to add/delete the files of the server via the name parameter of Deployment Packages.

CVE-2020-15941: PSIRT Advisories | FortiGuard

A path traversal vulnerability [CWE-22] in FortiClientEMS versions 6.4.1 and below; 6.2.8 and below may allow an authenticated attacker to inject directory traversal character sequences to add/delete the files of the server via the name parameter of Deployment Packages.

CVE-2021-32507: TWCERT/CC台灣電腦網路危機處理暨協調中心-QSAN Storage Manager - Absolute Path Traversal via FileDownload function

Absolute Path Traversal vulnerability in FileDownload in QSAN Storage Manager allows remote authenticated attackers download arbitrary files via the Url path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.

CVE-2021-32517: TWCERT/CC台灣電腦網路危機處理暨協調中心-QSAN Storage Manager - Improper Access Control

Improper access control vulnerability in share_link in QSAN Storage Manager allows remote attackers to download arbitrary files using particular parameter in download function. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.

CVE-2021-32518: TWCERT/CC台灣電腦網路危機處理暨協調中心-QSAN Storage Manager - UNIX Symbolic Link (Symlink) Following

A vulnerability in share_link in QSAN Storage Manager allows remote attackers to create a symbolic link then access arbitrary files. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.

CVE-2021-32509: TWCERT/CC台灣電腦網路危機處理暨協調中心-QSAN Storage Manager - UNIX Symbolic Link (Symlink) Following via FileviewDoc function

Absolute Path Traversal vulnerability in FileviewDoc in QSAN Storage Manager allows remote authenticated attackers access arbitrary files by injecting the Symbolic Link following the Url path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.

CVE-2021-32508: TWCERT/CC台灣電腦網路危機處理暨協調中心-QSAN Storage Manager - UNIX Symbolic Link (Symlink) Following via FileStreaming function

Absolute Path Traversal vulnerability in FileStreaming in QSAN Storage Manager allows remote authenticated attackers access arbitrary files by injecting the Symbolic Link following the Url path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.

CVE-2021-32515: TWCERT/CC台灣電腦網路危機處理暨協調中心-QSAN Storage Manager - Exposure of Information Through Directory Listing

Directory listing vulnerability in share_link in QSAN Storage Manager allows attackers to list arbitrary directories and further access credential information. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.

CVE-2021-32516: TWCERT/CC台灣電腦網路危機處理暨協調中心-QSAN Storage Manager - Path Traversal

Path traversal vulnerability in share_link in QSAN Storage Manager allows remote attackers to download arbitrary files. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.

CVE-2021-32527: TWCERT/CC台灣電腦網路危機處理暨協調中心-QSAN Storage Manager - Path Traversal-2

Path traversal vulnerability in QSAN Storage Manager allows remote unauthenticated attackers to download arbitrary files thru injecting file path in download function. Suggest contacting with QSAN and refer to recommendations in QSAN Document.

CVE-2021-32512: TWCERT/CC台灣電腦網路危機處理暨協調中心-QSAN Storage Manager - Command Injection Following via QuickInstall function

QuickInstall in QSAN Storage Manager does not filter special parameters properly that allows remote unauthenticated attackers to inject and execute arbitrary commands. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.

CVE-2021-32510: TWCERT/CC台灣電腦網路危機處理暨協調中心-QSAN Storage Manager - Exposure of Information Through Directory Listing Following via Antivirus function

QSAN Storage Manager through directory listing vulnerability in antivirus function allows remote authenticated attackers to list arbitrary directories by injecting file path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.

CVE-2021-32513: TWCERT/CC台灣電腦網路危機處理暨協調中心-QSAN Storage Manager - Command Injection Following via QsanTorture function

QsanTorture in QSAN Storage Manager does not filter special parameters properly that allows remote unauthenticated attackers to inject and execute arbitrary commands. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907