Sign in

Welcome, Login to your account.

Forget password?
Sign in

Recover your password.

A password will be e-mailed to you.

Trending

  • Microsoft Teams Gets “Collaboration Security” Feature against Phishing Attacks and Malware
  • Queen’s AMS email addresses hit in cyber-attack – Kingston
  • DPRK hacks for cash and intelligence. Twitter’s source-code leak. Data security and resilience. Hacktivist auxiliary updates.
  • ChatGPT Less Convincing Than Human Social Engineers in Phishing Attacks
  • CrowdStrike’s Government Summit to Feature CISA Director Jen Easterly and Rob Joyce, Director, Cybersecurity Directorate, NSA Amongst Packed Keynote Lineup
  • Future Data Breach Threats to UK Businesses
  • Europol warns of criminal use of ChatGPTSecurity Affairs
  • 3GO Launches Cyber Scores for Individuals
  • Hackers Unmasked: Exploring the Different Faces of Cyber Threats
  • Pakistan-Origin SideCopy Linked to New Cyberattack on India’s Ministry of Defence

TechAuditLab TechAuditLab - Welcome to the Tech Audit Lab

  • IT Security Guides
    • Web Application Security
    • Windows Security
    • Linux Security
    • Cloud Security
  • Cyber Feed
    • HackerNews
    • Security Affairs
    • Vulnerability Database
  • Maritime Security
  • OT Security
  • Ports and Terminals
  • Digital Freight
Tech Audit Lab
Zero Day

QSAN XEVO Back-End Analysis path traversal [CVE-2021-32532]

By Max On Jul 10, 2021



A vulnerability classified as critical has been found in QSAN XEVO (version unknown). Affected is an unknown code block of the component Back-End Analysis. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.



Source link

Back-End AnalysisCVE-2021-32532QSANXEVO
Max 52653 posts 0 comments
You might also like More from author
Zero Day

2023-23415 | Microsoft Windows ICMP Remote Code Execution

Zero Day

CVE-2022-4203 | OpenSSL up to 3.0.7 X.509 Certificate Verification buffer overflow

Zero Day

CVE-2022-48093 | SeaCMS 12.7 admin_ip.php ip code injection

Zero Day

CVE-2023-0164 | OrangeScrum 2.0.11 injection

Loading ... Load More Posts No More Posts

Latest News

Microsoft Teams Gets “Collaboration Security” Feature…

Mar 28, 2023

Exposure management can plug gaps

Mar 28, 2023

Meratus launches Indonesia’s first smart container

Mar 28, 2023

Queen’s AMS email addresses hit in cyber-attack – Kingston

Mar 28, 2023

DPRK hacks for cash and intelligence. Twitter’s source-code…

Mar 28, 2023

Port of Savannah purchases 55 hybrid yard cranes

Mar 28, 2023
Prev Next 1 of 3,165

OT Security

Exposure management can plug gaps

Mar 28, 2023

Viakoo Continues Rapid Growth in 2023, Following Major IoT Security Market Growth

Mar 28, 2023

Why Aren’t You On Slack Where I Can Interrupt You?

Mar 28, 2023
Prev Next 1 of 676

Maritime Security

Meratus launches Indonesia’s first smart container

Mar 28, 2023

Port of Savannah purchases 55 hybrid yard cranes

Mar 28, 2023

Trade set to stagnate in 2023 after record $32 trillion

Mar 28, 2023

WSC defends vessel sharing amid new US bill

Mar 28, 2023
Prev Next 1 of 1,770
  • IT Security Guides
    • Web Application Security
    • Windows Security
    • Linux Security
    • Cloud Security
  • Cyber Feed
    • HackerNews
    • Security Affairs
    • Vulnerability Database
  • Maritime Security
  • OT Security
  • Ports and Terminals
  • Digital Freight
© 2023 - Tech Audit Lab. All Rights Reserved.
Powered by the FORTRESS
Sign in
  • IT Security Guides
    • Web Application Security
    • Windows Security
    • Linux Security
    • Cloud Security
  • Cyber Feed
    • HackerNews
    • Security Affairs
    • Vulnerability Database
  • Maritime Security
  • OT Security
  • Ports and Terminals
  • Digital Freight

Welcome, Login to your account.

Forget password?
Sign in

Recover your password.

A password will be e-mailed to you.