Filtered by vendor Starwindsoftware
Subscribe
Search
Total
7 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2021-41617 | 5 Fedoraproject, Netapp, Openbsd and 2 more | 14 Fedora, Active Iq Unified Manager, Aff 500f and 11 more | 2023-12-26 | 4.4 MEDIUM | 7.0 HIGH |
| sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user. | |||||
| CVE-2022-24552 | 1 Starwindsoftware | 2 Nas, San | 2023-08-08 | 10.0 HIGH | 9.8 CRITICAL |
| A flaw was found in the REST API in StarWind Stack. REST command, which manipulates a virtual disk, doesn’t check input parameters. Some of them go directly to bash as part of a script. An attacker with non-root user access can inject arbitrary data into the command that will be executed with root privileges. This affects StarWind SAN and NAS v0.2 build 1633. | |||||
| CVE-2022-32268 | 1 Starwindsoftware | 1 Starwind San \& Nas | 2022-06-12 | 9.0 HIGH | 7.2 HIGH |
| StarWind SAN and NAS v0.2 build 1914 allow remote code execution. | |||||
| CVE-2022-24551 | 1 Starwindsoftware | 2 Nas, San | 2022-02-11 | 9.0 HIGH | 8.8 HIGH |
| StarWind SAN and NAS before 0.2 build 1685 allows users to reset other users' passwords. | |||||
| CVE-2007-20001 | 1 Starwindsoftware | 1 Iscsi San | 2022-02-11 | 5.0 MEDIUM | 7.5 HIGH |
| StarWind iSCSI SAN before 3.5 build 2007-08-09 allows socket exhaustion. | |||||
| CVE-2013-20004 | 1 Starwindsoftware | 1 Iscsi San | 2022-02-11 | 7.5 HIGH | 9.8 CRITICAL |
| StarWind iSCSI SAN before 6.0 build 2013-03-20 allows a memory leak. | |||||
| CVE-2022-23858 | 1 Starwindsoftware | 1 Command Center | 2022-01-28 | 9.0 HIGH | 8.8 HIGH |
| In StarWind Command Center before V2 build 6021, an authenticated read-only user can elevate privileges to administrator through the REST API. | |||||
