Page 7 of 38 results (0.009 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

A design flaw in SYNO.API.Encryption in Synology DiskStation Manager (DSM) before 6.1.3-15152 allows remote attackers to bypass the encryption protection mechanism via the crafted version parameter. Un fallo de diseño en el archivo SYNO.API.Encryption en Synology DiskStation Manager (DSM) anterior a versión 6.1.3-15152 permite a los atacantes remotos omitir el mecanismo de protección de encriptación mediante el parámetro de versión creado. • https://www.2-sec.com/2017/06/2-secs-expert-team-uncovers-new-vulnerability-popular-synology-nas-device https://www.synology.com/en-global/support/security/Synology_SA_17_29_DSM •

CVSS: 5.3EPSS: 3%CPEs: 1EXPL: 3

An information exposure vulnerability in forget_passwd.cgi in Synology DiskStation Manager (DSM) before 6.1.3-15152 allows remote attackers to enumerate valid usernames via unspecified vectors. Una vulnerabilidad de exposición de información en el archivo forget_passwd.cgi en Synology DiskStation Manager (DSM) anterior a la versión 6.1.3-15152, permite a los atacantes remotos enumerar nombres de usuario válidos por medio de vectores no especificados. Synology DiskStation Manager (DMS) versions prior to 6.1.3-15152 suffer from a forget_passwd.cgi user enumeration vulnerability. • https://www.exploit-db.com/exploits/43455 https://github.com/rfcl/Synology-DiskStation-User-Enumeration-CVE-2017-9554- https://github.com/Ez0-yf/CVE-2017-9554-Exploit-Tool https://www.synology.com/en-global/support/security/Synology_SA_17_29_DSM • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Cross-site scripting (XSS) vulnerability in Synology DiskStation Manager (DSM) before 5.2-5565 Update 1 allows remote attackers to inject arbitrary web script or HTML via the "compound" parameter to entry.cgi. Vulnerabilidad de XSS en Synology DiskStation Manager (DSM) anterior a 5.2-5565 Update 1 permite a atacantes remotos inyectar secuencias de comandos web arbitrarios o HTML a través del parámetro 'compound' en entry.cgi. • http://seclists.org/fulldisclosure/2015/May/109 http://www.securityfocus.com/bid/74811 https://www.securify.nl/advisory/SFY20150503/reflected_cross_site_scripting_in_synology_diskstation_manager.html https://www.synology.com/en-global/releaseNote/DS214play • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The Multicast DNS (mDNS) responder in Synology DiskStation Manager (DSM) before 3.1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets to the Avahi component. El contestador Multicast DNS (mDNS) en Synology DiskStation Manager (DSM) anterior a 3.1 responde inadvertidamente a consultas unicast con las direcciones de fuentes que no son enlazadas locales, lo que permite a atacantes remotos causar una denegación de servicio (amplificación de trafico) o obtener información potencialmente sensible a través de paquetes UDP del puerto 5353 en el componente Avahi. • http://www.kb.cert.org/vuls/id/550620 http://www.kb.cert.org/vuls/id/BLUU-9TLSHD http://www.securityfocus.com/bid/73683 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

The OpenVPN module in Synology DiskStation Manager (DSM) 4.3-3810 update 1 has a hardcoded root password of synopass, which makes it easier for remote attackers to obtain access via a VPN session. El módulo OpenVPN en Synology DiskStation Manager (DSM) 4.3-3810 actualización 1 tiene una contraseña root embebida de synopass, lo que facilita a atacantes remotos obtener acceso a través de una sesión VPN. • http://forum.synology.com/enu/viewtopic.php?f=173&t=77644 http://www.kb.cert.org/vuls/id/534284 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-255: Credentials Management Errors •