CVE-2023-41287 – Video Station
https://notcve.org/view.php?id=CVE-2023-41287
A SQL injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow users to inject malicious code via a network. We have already fixed the vulnerability in the following version: Video Station 5.7.2 ( 2023/11/23 ) and later Se ha informado que una vulnerabilidad de inyección SQL afecta a Video Station. Si se explota, la vulnerabilidad podría permitir a los usuarios inyectar código malicioso a través de una red. Ya hemos solucionado la vulnerabilidad en la siguiente versión: Video Station 5.7.2 (2023/11/23) y posteriores • https://www.qnap.com/en/security-advisory/qsa-23-55 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2023-41288 – Video Station
https://notcve.org/view.php?id=CVE-2023-41288
An OS command injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following version: Video Station 5.7.2 ( 2023/11/23 ) and later Se ha informado que una vulnerabilidad de inyección de comandos del sistema operativo afecta a Video Station. Si se explota, la vulnerabilidad podría permitir a los usuarios ejecutar comandos a través de una red. Ya hemos solucionado la vulnerabilidad en la siguiente versión: Video Station 5.7.2 (2023/11/23) y posteriores • https://www.qnap.com/en/security-advisory/qsa-23-55 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2023-41289 – QcalAgent
https://notcve.org/view.php?id=CVE-2023-41289
An OS command injection vulnerability has been reported to affect QcalAgent. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following version: QcalAgent 1.1.8 and later Se ha informado que una vulnerabilidad de inyección de comandos del sistema operativo afecta a QcalAgent. Si se explota, la vulnerabilidad podría permitir a los usuarios autenticados ejecutar comandos a través de una red. Ya hemos solucionado la vulnerabilidad en la siguiente versión: QcalAgent 1.1.8 y posteriores • https://www.qnap.com/en/security-advisory/qsa-23-34 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2023-45044 – QTS, QuTS hero
https://notcve.org/view.php?id=CVE-2023-45044
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later La vulnerabilidad de copia de búfer sin comprobar el tamaño de la entrada afecta a varias versiones del sistema operativo QNAP. Si se explota, la vulnerabilidad podría permitir a los administradores autenticados ejecutar código a través de una red. Ya hemos solucionado la vulnerabilidad en las siguientes versiones: QTS 5.1.4.2596 build 20231128 y posteriores QuTS hero h5.1.4.2596 build 20231128 y posteriores • https://www.qnap.com/en/security-advisory/qsa-23-27 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2023-45043 – QTS, QuTS hero
https://notcve.org/view.php?id=CVE-2023-45043
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later La vulnerabilidad de copia de búfer sin comprobar el tamaño de la entrada afecta a varias versiones del sistema operativo QNAP. Si se explota, la vulnerabilidad podría permitir a los administradores autenticados ejecutar código a través de una red. Ya hemos solucionado la vulnerabilidad en las siguientes versiones: QTS 5.1.4.2596 build 20231128 y posteriores QuTS hero h5.1.4.2596 build 20231128 y posteriores • https://www.qnap.com/en/security-advisory/qsa-23-27 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •