Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
qsan sanos vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2021-32529
Command injection vulnerability in QSAN XEVO, SANOS allows remote unauthenticated malicious users to execute arbitrary commands. Suggest contacting with QSAN and refer to recommendations in QSAN Document.
Qsan Sanos
Qsan Xevo
7.5
CVSSv2
CVE-2021-32521
Use of MAC address as an authenticated password in QSAN Storage Manager, XEVO, SANOS allows local malicious users to escalate privileges. Suggest contacting with QSAN and refer to recommendations in QSAN Document.
Qsan Sanos
Qsan Storage Manager
Qsan Xevo
5
CVSSv2
CVE-2021-32519
Use of password hash with insufficient computational effort vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote malicious users to recover the plain-text password by brute-forcing the MD5 hash. The referred vulnerability has been solved with the updated version of QS...
Qsan Sanos
Qsan Storage Manager
Qsan Xevo
5
CVSSv2
CVE-2021-32522
Improper restriction of excessive authentication attempts vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote malicious users to discover users’ credentials and obtain access via a brute force attack. Suggest contacting with QSAN and refer to recommendations in...
Qsan Sanos
Qsan Storage Manager
Qsan Xevo
7.5
CVSSv2
CVE-2021-32535
The vulnerability of hard-coded default credentials in QSAN SANOS allows unauthenticated remote malicious users to obtain administrator’s permission and execute arbitrary functions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
Qsan Sanos
7.5
CVSSv2
CVE-2021-32533
The QSAN SANOS setting page does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
Qsan Sanos
7.5
CVSSv2
CVE-2021-32534
QSAN SANOS factory reset function does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
Qsan Sanos
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started