Vulnerabilities (CVE)

Filtered by vendor Starwindsoftware Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-41617 5 Fedoraproject, Netapp, Openbsd and 2 more 14 Fedora, Active Iq Unified Manager, Aff 500f and 11 more 2023-12-26 4.4 MEDIUM 7.0 HIGH
sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2022-24552 1 Starwindsoftware 2 Nas, San 2023-08-08 10.0 HIGH 9.8 CRITICAL
A flaw was found in the REST API in StarWind Stack. REST command, which manipulates a virtual disk, doesn’t check input parameters. Some of them go directly to bash as part of a script. An attacker with non-root user access can inject arbitrary data into the command that will be executed with root privileges. This affects StarWind SAN and NAS v0.2 build 1633.
CVE-2022-32268 1 Starwindsoftware 1 Starwind San \& Nas 2022-06-12 9.0 HIGH 7.2 HIGH
StarWind SAN and NAS v0.2 build 1914 allow remote code execution.
CVE-2022-24551 1 Starwindsoftware 2 Nas, San 2022-02-11 9.0 HIGH 8.8 HIGH
StarWind SAN and NAS before 0.2 build 1685 allows users to reset other users' passwords.
CVE-2007-20001 1 Starwindsoftware 1 Iscsi San 2022-02-11 5.0 MEDIUM 7.5 HIGH
StarWind iSCSI SAN before 3.5 build 2007-08-09 allows socket exhaustion.
CVE-2013-20004 1 Starwindsoftware 1 Iscsi San 2022-02-11 7.5 HIGH 9.8 CRITICAL
StarWind iSCSI SAN before 6.0 build 2013-03-20 allows a memory leak.
CVE-2022-23858 1 Starwindsoftware 1 Command Center 2022-01-28 9.0 HIGH 8.8 HIGH
In StarWind Command Center before V2 build 6021, an authenticated read-only user can elevate privileges to administrator through the REST API.