Page 10 of 285 results (0.006 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

Integer overflow or wraparound vulnerability in CGI component in Synology Router Manager (SRM) before 1.2.5-8227-6 and 1.3.1-9346-3 allows remote attackers to overflow buffers via unspecified vectors. Vulnerabilidad de desbordamiento de enteros o envoltura en el componente CGI en Synology Router Manager (SRM) anterior a 1.2.5-8227-6 y 1.3.1-9346-3 permite a atacantes remotos desbordar búfers a través de vectores no especificados. • https://www.synology.com/en-global/security/advisory/Synology_SA_22_25 •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

Improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability in CGI component in Synology Router Manager (SRM) before 1.2.5-8227-6 and 1.3.1-9346-3 allows remote attackers to read arbitrary files via unspecified vectors. La neutralización inadecuada de elementos especiales en la salida utilizada por una vulnerabilidad de componente descendente ("Inyección") en el componente CGI en Synology Router Manager (SRM) anterior a v1.2.5-8227-6 y v1.3.1-9346-3 permite a atacantes remotos leer datos arbitrarios archivos a través de vectores no especificados. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology RT6600ax routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the libsynoskd library. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. • https://www.synology.com/en-global/security/advisory/Synology_SA_22_25 •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

Out-of-bounds write vulnerability in Remote Desktop Functionality in Synology VPN Plus Server before 1.4.3-0534 and 1.4.4-0635 allows remote attackers to execute arbitrary commands via unspecified vectors. • https://www.synology.com/en-global/security/advisory/Synology_SA_22_26 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in file operation management in Synology Presto File Server before 2.1.2-1601 allows remote attackers to write arbitrary files via unspecified vectors. Una limitación inapropiada de un nombre de ruta a un directorio restringido ("Salto de Ruta") es una vulnerabilidad en la administración de operaciones de archivos en Synology Presto File Server versiones anteriores a 2.1.2-1601, que permite a atacantes remotos escribir archivos arbitrarios por medio de vectores no especificados • https://www.synology.com/security/advisory/Synology_SA_22_19 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Improper privilege management vulnerability in summary report management in Synology Presto File Server before 2.1.2-1601 allows remote authenticated users to bypass security constraint via unspecified vectors. Una vulnerabilidad de administración de privilegios inapropiada en la administración de informes de resumen en Synology Presto File Server versiones anteriores a 2.1.2-1601, permite a usuarios remotos autenticados omitir la restricción de seguridad por medio de vectores no especificados • https://www.synology.com/security/advisory/Synology_SA_22_19 • CWE-269: Improper Privilege Management •