Lucene search

K
QuestKace System Management Appliance

6 matches found

CVE
CVE
added 2018/05/31 6:29 p.m.56 views

CVE-2018-11134

In order to perform actions that requires higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue managed that runs with root privileges and only allows a set of commands. One of the available commands allows changing any user's password (including root). A l...

9CVSS8.8AI score0.00584EPSS
CVE
CVE
added 2018/05/31 6:29 p.m.53 views

CVE-2018-11139

The '/common/ajax_email_connection_test.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by any authenticated user and can be abused to execute arbitrary commands on the system. This script is vulnerable to command injection via the unsanitized user input 'TEST_SERVER...

9CVSS9AI score0.26107EPSS
Web
CVE
CVE
added 2018/05/31 6:29 p.m.48 views

CVE-2018-11132

In order to perform actions that require higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue that runs daemonized with root privileges and only allows a set of commands to be executed. A command injection vulnerability exists within this message queue whi...

9CVSS8.9AI score0.10111EPSS
CVE
CVE
added 2018/05/31 6:29 p.m.45 views

CVE-2018-11136

The 'orgID' parameter received by the '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is not sanitized, leading to SQL injection (in particular, a blind time-based type).

9.8CVSS9.2AI score0.00328EPSS
Web
CVE
CVE
added 2018/05/31 6:29 p.m.45 views

CVE-2018-11141

The 'IMAGES_JSON' and 'attachments_to_remove[]' parameters of the '/adminui/advisory.php' script in the Quest KACE System Management Virtual Appliance 8.0.318 can be abused to write and delete files respectively via Directory Traversal. Files can be at any location where the 'www' user has write pe...

9.8CVSS8.9AI score0.00782EPSS
Web
CVE
CVE
added 2018/05/31 6:29 p.m.39 views

CVE-2018-11140

The 'reportID' parameter received by the '/common/run_report.php' script in the Quest KACE System Management Appliance 8.0.318 is not sanitized, leading to SQL injection (in particular, an error-based type).

9.8CVSS9.3AI score0.00328EPSS
Web