Page 21 of 115 results (0.023 seconds)

CVSS: 10.0EPSS: 4%CPEs: 6EXPL: 0

A buffer overflow vulnerability in password function in QNAP QTS version 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 and earlier could allow remote attackers to execute arbitrary code on NAS devices. Una vulnerabilidad de desbordamiento de búfer en la función de contraseña en QNAP QTS 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 y anteriores podría permitir que los atacantes remotos ejecuten código arbitrario en los dispositivos NAS. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the lang parameter provided to the sysinfoReq.cgi endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. • http://www.securitytracker.com/id/1040018 https://www.qnap.com/zh-tw/security-advisory/nas-201712-15 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

QNAP has already patched this vulnerability. This security concern allows a remote attacker to run arbitrary commands on the QNAP Video Station 5.1.3 (for QTS 4.3.3), 5.2.0 (for QTS 4.3.4), and earlier. QNAP ya ha parcheado esta vulnerabilidad. Este problema de seguridad permite que un atacante remoto ejecute comandos arbitrarios en QNAP Video Station 5.1.3 (para QTS 4.3.3), 5.2.0 (para QTS 4.3.4) y anteriores. • https://www.qnap.com/zh-tw/security-advisory/nas-201711-21 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

In the medialibrary component in QNAP NAS 4.3.3.0229, an un-authenticated, remote attacker can execute arbitrary system commands as the root user of the NAS application. En el componente medialibrary en QNAP NAS 4.3.3.0229, un atacante remoto sin autenticar puede ejecutar comandos arbitrarios del sistema como el usuario root de la aplicación NAS. • https://www.lateralsecurity.com/downloads/Lateral_Security-Advisory-QNAP_QTS_CVE-2017-10700.pdf https://www.qnap.com/en/support/con_show.php?cid=128 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 2%CPEs: 2EXPL: 0

QNAP has patched a remote code execution vulnerability affecting the QTS Media Library in all versions prior to QTS 4.2.6 build 20170905 and QTS 4.3.3.0299 build 20170901. This particular vulnerability allows a remote attacker to execute commands on a QNAP NAS using a transcoding service on port 9251. A remote user does not require any privileges to successfully execute an attack. QNAP ha parcheado una vulnerabilidad de ejecución remota de código que afecta a la biblioteca multimedia de QTS en todas sus versiones anteriores a la QTS 4.2.6 build 20170905 y QTS 4.3.3.0299 build 20170901. Esta vulnerabilidad permite que un atacante remoto ejecute comandos en un NAS de QNAP utilizando un servicio de transcodificación en el puerto 9251. • https://www.qnap.com/zh-hk/releasenotes •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

QNAP QTS before 4.2.6 build 20170517 has a flaw in the change password function. QNAP QTS anterior a versión 4.2.6, build 20170517, presenta un fallo en la función change password. • https://www.qnap.com/en-us/releasenotes • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •