Max CVSS | 10.0 | Min CVSS | 2.1 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2018-11135 | 6.0 |
The script '/adminui/error_details.php' in the Quest KACE System Management Appliance 8.0.318 allows authenticated users to conduct PHP object injection attacks.
|
02-12-2022 - 19:13 | 31-05-2018 - 18:29 | |
CVE-2018-11132 | 9.0 |
In order to perform actions that require higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue that runs daemonized with root privileges and only allows a set of commands to be executed. A command injection v
|
24-08-2020 - 17:37 | 31-05-2018 - 18:29 | |
CVE-2018-11139 | 9.0 |
The '/common/ajax_email_connection_test.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by any authenticated user and can be abused to execute arbitrary commands on the system. This script is vulnerable to command inje
|
03-10-2019 - 00:03 | 31-05-2018 - 18:29 | |
CVE-2018-11142 | 2.1 |
The 'systemui/settings_network.php' and 'systemui/settings_patching.php' scripts in the Quest KACE System Management Appliance 8.0.318 are accessible only from localhost. This restriction can be bypassed by modifying the 'Host' and 'X_Forwarded_For'
|
03-10-2019 - 00:03 | 31-05-2018 - 18:29 | |
CVE-2018-11138 | 10.0 |
The '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by anonymous users and can be abused to execute arbitrary commands on the system.
|
03-10-2019 - 00:03 | 31-05-2018 - 18:29 | |
CVE-2018-11140 | 7.5 |
The 'reportID' parameter received by the '/common/run_report.php' script in the Quest KACE System Management Appliance 8.0.318 is not sanitized, leading to SQL injection (in particular, an error-based type).
|
02-07-2018 - 15:51 | 31-05-2018 - 18:29 | |
CVE-2018-11141 | 7.5 |
The 'IMAGES_JSON' and 'attachments_to_remove[]' parameters of the '/adminui/advisory.php' script in the Quest KACE System Management Virtual Appliance 8.0.318 can be abused to write and delete files respectively via Directory Traversal. Files can be
|
29-06-2018 - 18:52 | 31-05-2018 - 18:29 | |
CVE-2018-11134 | 9.0 |
In order to perform actions that requires higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue managed that runs with root privileges and only allows a set of commands. One of the available commands allows c
|
29-06-2018 - 18:50 | 31-05-2018 - 18:29 | |
CVE-2018-11136 | 7.5 |
The 'orgID' parameter received by the '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is not sanitized, leading to SQL injection (in particular, a blind time-based type).
|
29-06-2018 - 18:50 | 31-05-2018 - 18:29 | |
CVE-2018-11133 | 4.3 |
The 'fmt' parameter of the '/common/run_cross_report.php' script in the the Quest KACE System Management Appliance 8.0.318 is vulnerable to cross-site scripting.
|
28-06-2018 - 17:20 | 31-05-2018 - 18:29 | |
CVE-2018-11137 | 4.0 |
The 'checksum' parameter of the '/common/download_attachment.php' script in the Quest KACE System Management Appliance 8.0.318 can be abused to read arbitrary files with 'www' privileges via Directory Traversal. No administrator privileges are needed
|
28-06-2018 - 13:31 | 31-05-2018 - 18:29 |