| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 16 of 46). |
| Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 15 of 46). |
| Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 14 of 46). |
| Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 13 of 46). |
| Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 12 of 46). |
| Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 11 of 46). |
| Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 10 of 46). |
| Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 9 of 46). |
| Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 8 of 46). |
| Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 7 of 46). |
| Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 6 of 46). |
| Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 5 of 46). |
| Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 4 of 46). |
| Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 3 of 46). |
| Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 2 of 46). |
| Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 1 of 46). |
| The 'systemui/settings_network.php' and 'systemui/settings_patching.php' scripts in the Quest KACE System Management Appliance 8.0.318 are accessible only from localhost. This restriction can be bypassed by modifying the 'Host' and 'X_Forwarded_For' HTTP headers in a POST request. An anonymous user can abuse this vulnerability to execute critical functions without authorization. |
| The 'IMAGES_JSON' and 'attachments_to_remove[]' parameters of the '/adminui/advisory.php' script in the Quest KACE System Management Virtual Appliance 8.0.318 can be abused to write and delete files respectively via Directory Traversal. Files can be at any location where the 'www' user has write permissions. |
| The 'reportID' parameter received by the '/common/run_report.php' script in the Quest KACE System Management Appliance 8.0.318 is not sanitized, leading to SQL injection (in particular, an error-based type). |
| The '/common/ajax_email_connection_test.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by any authenticated user and can be abused to execute arbitrary commands on the system. This script is vulnerable to command injection via the unsanitized user input 'TEST_SERVER' sent to the script via the POST method. |