Page 17 of 103 results (0.009 seconds)

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

QNAP NAS application Media Streaming add-on version 421.1.0.2, 430.1.2.0, and earlier allows remote attackers to run arbitrary OS commands against the system with root privileges. El add-on Media Streaming de la aplicación NAS de QNAP en versiones 421.1.0.2, 430.1.2.0 y anteriores permite que los atacantes remotos ejecuten comandos arbitrarios del sistema operativo contra el sistema con privilegios root. • https://www.qnap.com/zh-tw/security-advisory/nas-201803-08 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

QNAP NAS application Media Streaming add-on version 421.1.0.2, 430.1.2.0, and earlier does not utilize CSRF protections. El add-on Media Streaming de la aplicación NAS de QNAP en versiones 421.1.0.2, 430.1.2.0 y anteriores no utiliza medidas de seguridad contra CSRF. • https://www.qnap.com/zh-tw/security-advisory/nas-201803-08 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 10.0EPSS: 4%CPEs: 6EXPL: 0

A buffer overflow vulnerability in login function in QNAP QTS version 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 and earlier could allow remote attackers to execute arbitrary code on NAS devices. Una vulnerabilidad de desbordamiento de búfer en la función de inicio de sesión en QNAP QTS 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 y anteriores podría permitir que los atacantes remotos ejecuten código arbitrario en los dispositivos NAS. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS. Authentication is not required to exploit this vulnerability. The specific flaw exists within authLogin.cgi. When parsing the Host header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. • http://www.securitytracker.com/id/1040018 https://www.qnap.com/zh-tw/security-advisory/nas-201712-15 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 4%CPEs: 6EXPL: 0

A buffer overflow vulnerability in password function in QNAP QTS version 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 and earlier could allow remote attackers to execute arbitrary code on NAS devices. Una vulnerabilidad de desbordamiento de búfer en la función de contraseña en QNAP QTS 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 y anteriores podría permitir que los atacantes remotos ejecuten código arbitrario en los dispositivos NAS. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the OLD_PASSWORD parameter provided to the change_password.cgi endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. • http://www.securitytracker.com/id/1040018 https://www.qnap.com/zh-tw/security-advisory/nas-201712-15 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 4%CPEs: 6EXPL: 0

A buffer overflow vulnerability in external device function in QNAP QTS version 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 and earlier could allow remote attackers to execute arbitrary code on NAS devices. Una vulnerabilidad de desbordamiento de búfer en la función del dispositivo externo en QNAP QTS 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 y anteriores podría permitir que los atacantes remotos ejecuten código arbitrario en los dispositivos NAS. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS. Authentication is not required to exploit this vulnerability. The specific flaw exists within devRequest.cgi. When parsing the password parameter, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. • http://www.securitytracker.com/id/1040018 https://www.qnap.com/zh-tw/security-advisory/nas-201712-15 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •