Page 10 of 58 results (0.008 seconds)

CVSS: 10.0EPSS: 3%CPEs: 6EXPL: 0

A buffer overflow vulnerability in password function in QNAP QTS version 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 and earlier could allow remote attackers to execute arbitrary code on NAS devices. Una vulnerabilidad de desbordamiento de búfer en la función de contraseña en QNAP QTS 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 y anteriores podría permitir que los atacantes remotos ejecuten código arbitrario en los dispositivos NAS. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the lang parameter provided to the sysinfoReq.cgi endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. • http://www.securitytracker.com/id/1040018 https://www.qnap.com/zh-tw/security-advisory/nas-201712-15 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

QNAP has patched a remote code execution vulnerability affecting the QTS Media Library in all versions prior to QTS 4.2.6 build 20170905 and QTS 4.3.3.0299 build 20170901. This particular vulnerability allows a remote attacker to execute commands on a QNAP NAS using a transcoding service on port 9251. A remote user does not require any privileges to successfully execute an attack. QNAP ha parcheado una vulnerabilidad de ejecución remota de código que afecta a la biblioteca multimedia de QTS en todas sus versiones anteriores a la QTS 4.2.6 build 20170905 y QTS 4.3.3.0299 build 20170901. Esta vulnerabilidad permite que un atacante remoto ejecute comandos en un NAS de QNAP utilizando un servicio de transcodificación en el puerto 9251. • https://www.qnap.com/zh-hk/releasenotes •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

QNAP QTS before 4.2.6 build 20170517 has a flaw in the change password function. QNAP QTS anterior a versión 4.2.6, build 20170517, presenta un fallo en la función change password. • https://www.qnap.com/en-us/releasenotes • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •

CVSS: 10.0EPSS: 29%CPEs: 1EXPL: 0

This command injection vulnerability in QTS allows attackers to run arbitrary commands in the compromised application. QNAP have already fixed the issue in QTS 4.2.6 build 20170517, QTS 4.3.3.0174 build 20170503 and later versions. Esta vulnerabilidad de inyección de comandos en el QTS permite a los atacantes ejecutar comandos arbitrarios en la aplicación comprometida. QNAP ya ha solucionado el problema en QTS 4.2.6 build 20170517, QTS 4.3.3.0174 build 20170503 y versiones posteriores • https://www.qnap.com/en/release-notes/qts/4.2.6/20170517 https://www.qnap.com/en/release-notes/qts/4.3.3.0174/20170503 https://www.qnap.com/zh-tw/security-advisory/nas-201707-12 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 10.0EPSS: 65%CPEs: 1EXPL: 1

QNAP QTS before 4.2.4 Build 20170313 allows attackers to gain administrator privileges and execute arbitrary commands via unspecified vectors. QNAP QTS en versiones anteriores a 4.2.4 revisión 20170313 permite a atacantes remotos obtener privilegios de administrador y ejecutar comandos arbitrarios a través de vectores no especificados. QNAP QTS suffers from multiple command injection vulnerabilities. • https://www.exploit-db.com/exploits/41842 http://www.securityfocus.com/bid/97059 http://www.securityfocus.com/bid/97072 http://www.securitytracker.com/id/1038091 https://www.qnap.com/en-us/releasenotes https://www.qnap.com/en/support/con_show.php?cid=113 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •