Page 2 of 20 results (0.005 seconds)

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

14 Apr 2021 — A stack-based buffer overflow vulnerability has been reported to affect QNAP NAS devices running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. QNAP have already fixed this vulnerability in the following versions: Surveillance Station 5.1.5.4.3 (and later) for ARM CPU NAS (64bit OS) and x86 CPU NAS (64bit OS) Surveillance Station 5.1.5.3.3 (and later) for ARM CPU NAS (32bit OS) and x86 CPU NAS (32bit OS) Se ha reportado una vulnerabilidad de desbordamiento... • https://www.qnap.com/en/security-advisory/qsa-21-07 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 3%CPEs: 3EXPL: 1

17 Feb 2021 — A stack-based buffer overflow vulnerability has been reported to affect QNAP NAS devices running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. QNAP have already fixed this vulnerability in the following versions: Surveillance Station 5.1.5.4.3 (and later) for ARM CPU NAS (64bit OS) and x86 CPU NAS (64bit OS) Surveillance Station 5.1.5.3.3 (and later) for ARM CPU NAS (32bit OS) and x86 CPU NAS (32bit OS) Se ha reportado una vulnerabilidad de desbordamiento... • https://github.com/Alonzozzz/alonzzzo • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

05 Jun 2018 — QNAP NAS application Proxy Server through version 1.2.0 does not utilize CSRF protections. El servidor proxy de la aplicación NAS de QNAP hasta la versión 1.2.0 no utiliza protecciones contra Cross-Site Request Forgery (CSRF). • http://www.securitytracker.com/id/1041025 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

05 Jun 2018 — Cross-site scripting (XSS) vulnerability in QNAP NAS application Proxy Server through version 1.2.0 allows remote attackers to inject arbitrary web script or HTML. Vulnerabilidad Cross-Site Scripting (XSS) en el servidor proxy de la aplicación NAS de QNAP hasta la versión 1.2.0 permite que los atacantes remotos inyecten scripts web o HTML arbitrarios. • http://www.securitytracker.com/id/1041025 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 3%CPEs: 1EXPL: 0

05 Jun 2018 — QNAP NAS application Proxy Server through version 1.2.0 allows remote attackers to run arbitrary OS commands against the system with root privileges. El servidor proxy de la aplicación NAS de QNAP hasta la versión 1.2.0 permite que los atacantes remotos ejecuten comandos arbitrarios del sistema operativo contra el sistema con privilegios root. • http://www.securitytracker.com/id/1041025 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

05 Jun 2018 — QNAP NAS application Proxy Server through version 1.2.0 does not authenticate requests properly. Successful exploitation can lead to change of the settings of Proxy Server. El servidor proxy de la aplicación NAS de QNAP hasta la versión 1.2.0 no autentica las peticiones correctamente. Su explotación con éxito puede provocar el cambio de la configuración del servidor proxy. • http://www.securitytracker.com/id/1041025 • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

07 Jun 2013 — QNAP VioStor NVR devices with firmware 4.0.3, and the Surveillance Station Pro component in QNAP NAS, have a hardcoded guest account, which allows remote attackers to obtain web-server login access via unspecified vectors. Los dispositivos QNAP VioStor NVR con firmware v4.0.3, y el componente Surveillance Station Pro en QNAP NAS, tiene una cuenta de invitado incluida en el código que permite que atacantes remotos consigan acceso al servidor web mediante vectores no especificados. • http://www.kb.cert.org/vuls/id/927644 • CWE-255: Credentials Management Errors •

CVSS: 8.8EPSS: 9%CPEs: 4EXPL: 1

07 Jun 2013 — cgi-bin/pingping.cgi on QNAP VioStor NVR devices with firmware 4.0.3, and in the Surveillance Station Pro component in QNAP NAS, allows remote authenticated users to execute arbitrary commands by leveraging guest access and placing shell metacharacters in the query string. cgi-bin/pingping.cgi en dispositivos QNAP VioStor NVR con firmware v4.0.3, y en el componente Surveillance Station Pro en QNAP NAS, permite que usuarios remotos autenticados ejecuten comandos de su elección haciendo uso de acceso de invit... • https://www.exploit-db.com/exploits/38550 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.1EPSS: 0%CPEs: 6EXPL: 1

21 Sep 2009 — The QNAP TS-239 Pro and TS-639 Pro with firmware 2.1.7 0613, 3.1.0 0627, and 3.1.1 0815 create an undocumented recovery key and store it in the ENCK variable in flash memory, which allows local users to bypass the passphrase requirement and decrypt the hard drive by reading this variable, deobfuscating the key, and running a cryptsetup luksOpen command. QNAP TS-239 Pro y TS-639 Pro con firmware v2.1.7 0613, v3.1.0 0627, y v3.1.1 0815 crea una clave de recuperación no documentada y la almacena en la variable... • http://forum.qnap.com/viewtopic.php?f=11&t=11214&start=20#p63346 • CWE-310: Cryptographic Issues •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 1

21 Sep 2009 — The QNAP TS-239 Pro and TS-639 Pro with firmware 2.1.7 0613, 3.1.0 0627, and 3.1.1 0815 create a LUKS partition by using the AES-256 cipher in plain CBC mode, which allows local users to obtain sensitive information via a watermark attack. El QNAP TS-239 Pro y TS-639 Pro con firmware v2.1.7 0613, v3.1.0 0627, y v3.1.1 0815 crea una partición LUKS empleando el cifrado AES-256 en modo CBC plano, lo que permite a usuarios locales obtener información sensible a través de un ataque "watermark". • http://secunia.com/advisories/36793 • CWE-310: Cryptographic Issues •