quest CVE Vulnerabilities & Metrics

Focus on quest vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About quest Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with quest. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total quest CVEs: 127
Earliest CVE date: 01 May 2012, 23:55 UTC
Latest CVE date: 21 May 2023, 22:15 UTC

Latest CVE reference: CVE-2023-33254

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical quest CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 6.44

Max CVSS: 10.0

Critical CVEs (≥9): 19

CVSS Range vs. Count

Range Count
0.0-3.9 14
4.0-6.9 65
7.0-8.9 32
9.0-10.0 19

CVSS Distribution Chart

Top 5 Highest CVSS quest CVEs

These are the five CVEs with the highest CVSS scores for quest, sorted by severity first and recency.

All CVEs for quest

CVE-2023-33254 quest vulnerability CVSS: 0 21 May 2023, 22:15 UTC

There is an LDAP bind credentials exposure on KACE Systems Deployment and Remote Site appliances 9.0.146. The captured credentials may provide a higher privilege level on the Active Directory domain. To exploit this, an authenticated attacker edits the user-authentication settings to specify an attacker-controlled LDAP server, clicks the Test Settings button, and captures the cleartext credentials.

CVE-2022-38220 quest vulnerability CVSS: 0 01 Mar 2023, 00:15 UTC

An XSS vulnerability exists within Quest KACE Systems Management Appliance (SMA) through 12.1 that may allow remote injection of arbitrary web script or HTML.

CVE-2022-30285 quest vulnerability CVSS: 0 02 Aug 2022, 22:15 UTC

In Quest KACE Systems Management Appliance (SMA) through 12.0, a hash collision is possible during authentication. This may allow authentication with invalid credentials.

CVE-2022-29808 quest vulnerability CVSS: 0 02 Aug 2022, 22:15 UTC

In Quest KACE Systems Management Appliance (SMA) through 12.0, predictable token generation occurs when appliance linking is enabled.

CVE-2022-29807 quest vulnerability CVSS: 0 02 Aug 2022, 22:15 UTC

A SQL injection vulnerability exists within Quest KACE Systems Management Appliance (SMA) through 12.0 that can allow for remote code execution via download_agent_installer.php.

CVE-2021-44031 quest vulnerability CVSS: 7.5 22 Dec 2021, 06:15 UTC

An issue was discovered in Quest KACE Desktop Authority before 11.2. /dacomponentui/profiles/profileitems/outlooksettings/Insertimage.aspx contains a vulnerability that could allow pre-authentication remote code execution. An attacker could upload a .ASP file to reside at /images/{GUID}/{filename}.

CVE-2021-44030 quest vulnerability CVSS: 4.3 22 Dec 2021, 06:15 UTC

Quest KACE Desktop Authority before 11.2 allows XSS because it does not prevent untrusted HTML from reaching the jQuery.htmlPrefilter method of jQuery.

CVE-2021-44029 quest vulnerability CVSS: 7.5 22 Dec 2021, 06:15 UTC

An issue was discovered in Quest KACE Desktop Authority before 11.2. This vulnerability allows attackers to execute remote code through a deserialization exploitation in the RadAsyncUpload function of ASP.NET AJAX. An attacker can leverage this vulnerability when the encryption keys are known (due to the presence of CVE-2017-11317, CVE-2017-11357, or other means). A default setting for the type whitelisting feature in more current versions of ASP.NET AJAX prevents exploitation.

CVE-2021-44028 quest vulnerability CVSS: 4.3 22 Dec 2021, 06:15 UTC

XXE can occur in Quest KACE Desktop Authority before 11.2 because the log4net configuration file might be controlled by an attacker, a related issue to CVE-2018-1285.

CVE-2020-35727 quest vulnerability CVSS: 3.5 11 Jan 2021, 03:15 UTC

Reflected XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to inject malicious code into the browser via a specially crafted link to the BrowseDirs.do file via the title parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

CVE-2020-35726 quest vulnerability CVSS: 4.3 11 Jan 2021, 03:15 UTC

Reflected XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to inject malicious code into the browser via a specially crafted link to the /WebCM/Applications/Reports/index.jsp file via the by parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

CVE-2020-35725 quest vulnerability CVSS: 4.3 11 Jan 2021, 03:15 UTC

Reflected XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to inject malicious code into the browser via a specially crafted link to the /WebCM/index.jsp file via the msg parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

CVE-2020-35724 quest vulnerability CVSS: 3.5 11 Jan 2021, 03:15 UTC

Reflected XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to inject malicious code into the browser via a specially crafted link to the Error.jsp file via the err parameter (or indirectly via the cpr, tcp, or abs parameter). NOTE: This vulnerability only affects products that are no longer supported by the maintainer

CVE-2020-35723 quest vulnerability CVSS: 3.5 11 Jan 2021, 03:15 UTC

Reflected XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to inject malicious code into the browser via a specially crafted link to the ReportPreview.do file via the referer parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

CVE-2020-35722 quest vulnerability CVSS: 4.3 11 Jan 2021, 03:15 UTC

CSRF in Web Compliance Manager in Quest Policy Authority 8.1.2.200 allows remote attackers to force user modification/creation via a specially crafted link to the submitUser.jsp file. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

CVE-2020-35721 quest vulnerability CVSS: 3.5 11 Jan 2021, 03:15 UTC

Reflected XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to inject malicious code into the browser via a specially crafted link to the BrowseAssets.do file via the title parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

CVE-2020-35720 quest vulnerability CVSS: 3.5 11 Jan 2021, 03:15 UTC

Stored XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to store malicious code in multiple fields (first name, last name, and logon name) when creating or modifying a user via the submitUser.jsp file. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

CVE-2020-35719 quest vulnerability CVSS: 4.3 11 Jan 2021, 03:15 UTC

Reflected XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to inject malicious code into the browser via a specially crafted link to the /WebCM/Applications/Search/index.jsp file via the added parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

CVE-2020-35206 quest vulnerability CVSS: 4.3 11 Jan 2021, 03:15 UTC

Reflected XSS in Web Compliance Manager in Quest Policy Authority version 8.1.2.200 allows attackers to inject malicious code into the browser via a specially crafted link to the cConn.jsp file via the ur parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

CVE-2020-35205 quest vulnerability CVSS: 7.5 11 Jan 2021, 03:15 UTC

Server Side Request Forgery (SSRF) in Web Compliance Manager in Quest Policy Authority version 8.1.2.200 allows attackers to scan internal ports and make outbound connections via the initFile.jsp file. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

CVE-2020-35204 quest vulnerability CVSS: 4.3 11 Jan 2021, 03:15 UTC

Reflected XSS in Quest Policy Authority version 8.1.2.200 allows attackers to inject malicious code into the browser via a specially crafted link to the PolicyAuthority/Common/FolderControl.jsp file via the unqID parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

CVE-2020-35203 quest vulnerability CVSS: 4.3 11 Jan 2021, 03:15 UTC

Reflected XSS in Web Compliance Manager in Quest Policy Authority version 8.1.2.200 allows attackers to inject malicious code into the browser via a specially crafted link to the initFile.jsp file via the msg parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

CVE-2020-8868 quest vulnerability CVSS: 10.0 23 Mar 2020, 21:15 UTC

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Quest Foglight Evolve 9.0.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the __service__ user account. The product contains a hard-coded password for this account. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-9553.

CVE-2019-13081 quest vulnerability CVSS: 3.5 06 Nov 2019, 15:15 UTC

Quest KACE Systems Management Appliance Server Center 9.1.317 has an XSS vulnerability (via the title field in the /common/ticket_associated_tickets.php service desk ticket functionality) that allows an authenticated user to execute arbitrary JavaScript in a service desk user's browser.

CVE-2019-13080 quest vulnerability CVSS: 3.5 06 Nov 2019, 15:15 UTC

Quest KACE Systems Management Appliance Server Center 9.1.317 has an XSS vulnerability (via an SVG image and HTML file) that allows an authenticated user to execute arbitrary JavaScript in an administrator's browser.

CVE-2019-13079 quest vulnerability CVSS: 6.5 06 Nov 2019, 15:15 UTC

Quest KACE Systems Management Appliance Server Center 9.1.317 is vulnerable to SQL injection. An authenticated user has the ability to execute arbitrary commands against the database. The affected component is /adminui/history_log.php. The affected parameter is TYPE_NAME.

CVE-2019-13078 quest vulnerability CVSS: 6.5 06 Nov 2019, 15:15 UTC

Quest KACE Systems Management Appliance Server Center 9.1.317 is vulnerable to SQL injection. An authenticated user has the ability to execute arbitrary commands against the database. The affected component is /common/user_profile.php. The affected parameter is sort_column.

CVE-2019-13077 quest vulnerability CVSS: 4.3 06 Nov 2019, 15:15 UTC

Quest KACE Systems Management Appliance Server Center 9.1.317 has an XSS vulnerability (via the sam_detail_titled.php SAM_TYPE parameter) that allows an attacker to create a malicious link in order to attack authenticated users.

CVE-2019-13076 quest vulnerability CVSS: 6.5 06 Nov 2019, 15:15 UTC

Quest KACE Systems Management Appliance Server Center 9.1.317 is vulnerable to SQL injection. An authenticated user has the ability to execute arbitrary commands against the database. The affected component is /userui/ticket_list.php, and affected parameters are order[0][column] and order[0][dir].

CVE-2019-12918 quest vulnerability CVSS: 7.5 06 Nov 2019, 15:15 UTC

Quest KACE Systems Management Appliance Server Center version 9.1.317 is vulnerable to SQL injection. The affected file is software_library.php and affected parameters are order[0][column] and order[0][dir].

CVE-2019-12917 quest vulnerability CVSS: 4.3 06 Nov 2019, 15:15 UTC

A reflected XSS vulnerability exists in Quest KACE Systems Management Appliance Server Center 9.1.317 affecting the userui/software_library.php component via the PATH_INFO.

CVE-2019-10973 quest vulnerability CVSS: 9.0 08 Jul 2019, 18:15 UTC

Quest KACE, all versions prior to version 8.0.x, 8.1.x, and 9.0.x, allows unintentional access to the appliance leveraging functions of the troubleshooting tools located in the administrator user interface.

CVE-2018-5406 quest vulnerability CVSS: 9.3 03 Jun 2019, 19:29 UTC

The Quest Kace K1000 Appliance, versions prior to 9.0.270, allows a remote attacker to exploit the misconfigured Cross-Origin Resource Sharing (CORS) mechanism. An unauthenticated, remote attacker could exploit this vulnerability to perform sensitive actions such as adding a new administrator account or changing the appliance’s settings. A malicious internal user could also gain administrator privileges of this appliance and use it to visit a malicious link that exploits this vulnerability. This could cause the application to perform sensitive actions such as adding a new administrator account or changing the appliance’s settings. An unauthenticated, remote attacker could add an administrator-level account or change the appliance's settings.

CVE-2018-5405 quest vulnerability CVSS: 3.5 03 Jun 2019, 19:29 UTC

The Quest Kace K1000 Appliance, versions prior to 9.0.270, allows an authenticated least privileged user with 'User Console Only' rights to potentially inject arbitrary JavaScript code on the tickets page. Script execution could allow a malicious user of the system to steal session cookies of other users including Administrator and take over their session. This can further be exploited to launch other attacks. The software also does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other user. An authenticated user with 'user console only' rights may inject arbitrary JavaScript, which could result in an attacker taking over a session of others, including an Administrator.

CVE-2018-5404 quest vulnerability CVSS: 4.0 03 Jun 2019, 19:29 UTC

The Quest Kace K1000 Appliance, versions prior to 9.0.270, allows an authenticated, remote attacker with least privileges ('User Console Only' role) to potentially exploit multiple Blind SQL Injection vulnerabilities to retrieve sensitive information from the database or copy the entire database. An authenticated remote attacker could leverage Blind SQL injections to obtain sensitive data.

CVE-2019-11604 quest vulnerability CVSS: 4.3 24 May 2019, 17:29 UTC

An issue was discovered in Quest KACE Systems Management Appliance before 9.1. The script at /service/kbot_service_notsoap.php is vulnerable to unauthenticated reflected XSS when user-supplied input to the METHOD GET parameter is processed by the web application. Since the application does not properly validate and sanitize this parameter, it is possible to place arbitrary script code into the context of the same page.

CVE-2018-11194 quest vulnerability CVSS: 9.0 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows privilege escalation (issue 6 of 6).

CVE-2018-11193 quest vulnerability CVSS: 9.0 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows privilege escalation (issue 5 of 6).

CVE-2018-11192 quest vulnerability CVSS: 9.0 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows privilege escalation (issue 4 of 6).

CVE-2018-11191 quest vulnerability CVSS: 9.0 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows privilege escalation (issue 3 of 6).

CVE-2018-11190 quest vulnerability CVSS: 9.0 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows privilege escalation (issue 2 of 6).

CVE-2018-11189 quest vulnerability CVSS: 9.0 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows privilege escalation (issue 1 of 6).

CVE-2018-11188 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 46 of 46).

CVE-2018-11187 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 45 of 46).

CVE-2018-11186 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 44 of 46).

CVE-2018-11185 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 43 of 46).

CVE-2018-11184 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 42 of 46).

CVE-2018-11183 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 41 of 46).

CVE-2018-11182 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 40 of 46).

CVE-2018-11181 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 39 of 46).

CVE-2018-11180 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 38 of 46).

CVE-2018-11179 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 37 of 46).

CVE-2018-11178 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 36 of 46).

CVE-2018-11177 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 35 of 46).

CVE-2018-11176 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 34 of 46).

CVE-2018-11175 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 33 of 46).

CVE-2018-11174 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 32 of 46).

CVE-2018-11173 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 31 of 46).

CVE-2018-11172 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 30 of 46).

CVE-2018-11171 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 29 of 46).

CVE-2018-11170 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 28 of 46).

CVE-2018-11169 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 27 of 46).

CVE-2018-11168 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 26 of 46).

CVE-2018-11167 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 25 of 46).

CVE-2018-11166 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 24 of 46).

CVE-2018-11165 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 23 of 46).

CVE-2018-11164 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 22 of 46).

CVE-2018-11163 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 21 of 46).

CVE-2018-11162 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 20 of 46).

CVE-2018-11161 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 19 of 46).

CVE-2018-11160 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 18 of 46).

CVE-2018-11159 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 17 of 46).

CVE-2018-11158 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 16 of 46).

CVE-2018-11157 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 15 of 46).

CVE-2018-11156 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 14 of 46).

CVE-2018-11155 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 13 of 46).

CVE-2018-11154 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 12 of 46).

CVE-2018-11153 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 11 of 46).

CVE-2018-11152 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 10 of 46).

CVE-2018-11151 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 9 of 46).

CVE-2018-11150 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 8 of 46).

CVE-2018-11149 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 7 of 46).

CVE-2018-11148 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 6 of 46).

CVE-2018-11147 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 5 of 46).

CVE-2018-11146 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 4 of 46).

CVE-2018-11145 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 3 of 46).

CVE-2018-11144 quest vulnerability CVSS: 6.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 2 of 46).

CVE-2018-11143 quest vulnerability CVSS: 7.5 02 Jun 2018, 01:29 UTC

Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 1 of 46).

CVE-2018-11142 quest vulnerability CVSS: 2.1 31 May 2018, 18:29 UTC

The 'systemui/settings_network.php' and 'systemui/settings_patching.php' scripts in the Quest KACE System Management Appliance 8.0.318 are accessible only from localhost. This restriction can be bypassed by modifying the 'Host' and 'X_Forwarded_For' HTTP headers in a POST request. An anonymous user can abuse this vulnerability to execute critical functions without authorization.

CVE-2018-11141 quest vulnerability CVSS: 7.5 31 May 2018, 18:29 UTC

The 'IMAGES_JSON' and 'attachments_to_remove[]' parameters of the '/adminui/advisory.php' script in the Quest KACE System Management Virtual Appliance 8.0.318 can be abused to write and delete files respectively via Directory Traversal. Files can be at any location where the 'www' user has write permissions.

CVE-2018-11140 quest vulnerability CVSS: 7.5 31 May 2018, 18:29 UTC

The 'reportID' parameter received by the '/common/run_report.php' script in the Quest KACE System Management Appliance 8.0.318 is not sanitized, leading to SQL injection (in particular, an error-based type).

CVE-2018-11139 quest vulnerability CVSS: 9.0 31 May 2018, 18:29 UTC

The '/common/ajax_email_connection_test.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by any authenticated user and can be abused to execute arbitrary commands on the system. This script is vulnerable to command injection via the unsanitized user input 'TEST_SERVER' sent to the script via the POST method.

CVE-2018-11138 quest vulnerability CVSS: 10.0 31 May 2018, 18:29 UTC

The '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by anonymous users and can be abused to execute arbitrary commands on the system.

CVE-2018-11137 quest vulnerability CVSS: 4.0 31 May 2018, 18:29 UTC

The 'checksum' parameter of the '/common/download_attachment.php' script in the Quest KACE System Management Appliance 8.0.318 can be abused to read arbitrary files with 'www' privileges via Directory Traversal. No administrator privileges are needed to execute this script.

CVE-2018-11136 quest vulnerability CVSS: 7.5 31 May 2018, 18:29 UTC

The 'orgID' parameter received by the '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is not sanitized, leading to SQL injection (in particular, a blind time-based type).

CVE-2018-11135 quest vulnerability CVSS: 6.0 31 May 2018, 18:29 UTC

The script '/adminui/error_details.php' in the Quest KACE System Management Appliance 8.0.318 allows authenticated users to conduct PHP object injection attacks.

CVE-2018-11134 quest vulnerability CVSS: 9.0 31 May 2018, 18:29 UTC

In order to perform actions that requires higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue managed that runs with root privileges and only allows a set of commands. One of the available commands allows changing any user's password (including root). A low-privilege user could abuse this feature by changing the password of the 'kace_support' account, which comes disabled by default but has full sudo privileges.

CVE-2018-11133 quest vulnerability CVSS: 4.3 31 May 2018, 18:29 UTC

The 'fmt' parameter of the '/common/run_cross_report.php' script in the the Quest KACE System Management Appliance 8.0.318 is vulnerable to cross-site scripting.

CVE-2018-11132 quest vulnerability CVSS: 9.0 31 May 2018, 18:29 UTC

In order to perform actions that require higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue that runs daemonized with root privileges and only allows a set of commands to be executed. A command injection vulnerability exists within this message queue which allows low-privilege users to append arbitrary commands that will be run as root.

CVE-2018-1163 quest vulnerability CVSS: 10.0 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to bypass authentication on vulnerable installations of Quest NetVault Backup 11.2.0.13. The specific flaw exists within JSON RPC Request handling. By setting the checksession parameter to a specific value, it is possible to bypass authentication to critical functions. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-4752.

CVE-2018-1162 quest vulnerability CVSS: 8.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to create a denial-of-service condition on vulnerable installations of Quest NetVault Backup 11.2.0.13. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be easily bypassed. The specific flaw exists within the handling of Export requests. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to arbitrarily overwrite files resulting in a denial-of-service condition. Was ZDI-CAN-4222.

CVE-2018-1161 quest vulnerability CVSS: 10.0 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.2.0.13. Authentication is not required to exploit this vulnerability. The specific flaw exists within nvwsworker.exe. When parsing the boundary header of a multipart request, the process does not properly validate the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of SYSTEM. Was ZDI-CAN-4215.

CVE-2017-17659 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUJobHistory Get method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4906.

CVE-2017-17658 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUJobDefinitions Get method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4316.

CVE-2017-17657 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUBackup TimeRange method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4294.

CVE-2017-17656 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUBackup JobList method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4292.

CVE-2017-17655 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUBackup PluginList method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4289.

CVE-2017-17654 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUBackup ClientList method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4287.

CVE-2017-17653 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUBackupOptionSet Get method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4286.

CVE-2017-17652 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUBackup Count method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4238.

CVE-2017-17425 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUSourceDeviceSet Get method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4237.

CVE-2017-17424 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUScheduleSet Get method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4235.

CVE-2017-17423 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUBackupSegment Get method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4234.

CVE-2017-17422 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUBackup Get method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4233.

CVE-2017-17421 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUSelectionSet Get method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4232.

CVE-2017-17420 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUJobCountHistory Get method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4231.

CVE-2017-17419 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUTransferHistory Get method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4230.

CVE-2017-17418 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUPolicy Get method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4229.

CVE-2017-17417 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUPhaseStatus Acknowledge method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4228.

CVE-2017-17416 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUPhaseStatus GetPlugins method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4227.

CVE-2017-17415 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUPhaseStatus Count method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4226.

CVE-2017-17414 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUPhaseStatus Get method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4225.

CVE-2017-17413 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUBackupTargetSet Get method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4224.

CVE-2017-17412 quest vulnerability CVSS: 7.5 08 Feb 2018, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of GET method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute arbitrary code in the context of the underlying database. Was ZDI-CAN-4223.

CVE-2017-12567 quest vulnerability CVSS: 7.5 07 Aug 2017, 16:29 UTC

SQL injection exists in Quest KACE Asset Management Appliance 6.4.120822 through 7.2, Systems Management Appliance 6.4.120822 through 7.2.101, and K1000 as a Service 7.0 through 7.2.

CVE-2017-6553 quest vulnerability CVSS: 10.0 29 Apr 2017, 16:59 UTC

Buffer Overflow in Quest One Identity Privilege Manager for Unix before 6.0.0.061 allows remote attackers to obtain full access to the policy server via an ACT_ALERT_EVENT request that causes memory corruption in the pmmasterd daemon.

CVE-2017-6554 quest vulnerability CVSS: 9.0 14 Apr 2017, 18:59 UTC

pmmasterd in Quest Privilege Manager before 6.0.0.061, when configured as a policy server, allows remote attackers to write to arbitrary files and consequently execute arbitrary code with root privileges via an ACT_NEWFILESENT action.

CVE-2012-5897 quest vulnerability CVSS: 9.3 17 Nov 2012, 21:55 UTC

The (1) SimpleTree and (2) ReportTree classes in the ARDoc ActiveX control (ARDoc.dll) in Quest InTrust 10.4.0.853 and earlier do not properly implement the SaveToFile method, which allows remote attackers to write or overwrite arbitrary files via the bstrFileName argument.

CVE-2012-5896 quest vulnerability CVSS: 10.0 17 Nov 2012, 21:55 UTC

The Annotation Objects Extension ActiveX control in AnnotateX.dll in Quest InTrust 10.4.0.853 and earlier does not properly implement the Add method, which allows remote attackers to execute arbitrary code via a memory address in the first argument, related to an "uninitialized pointer."

CVE-2012-0279 quest vulnerability CVSS: 6.9 01 May 2012, 23:55 UTC

Quest Toad for Data Analysts 3.0.1 uses weak permissions (Everyone: Full Control) for the %COMMONPROGRAMFILES%\Quest Shared directory, which allows local users to gain privileges via a Trojan horse file.