16 results (0.003 seconds)

CVSS: 8.8EPSS: 2%CPEs: 1EXPL: 0

An OS command injection vulnerability has been found to affect legacy QNAP VioStor NVR models running QVR Firmware 4.x. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following versions: QVR Firmware 5.0.0 and later Se ha descubierto que una vulnerabilidad de inyección de comandos del sistema operativo afecta a los modelos QNAP VioStor NVR heredados que ejecutan el firmware QVR 4.x. Si se explota, la vulnerabilidad podría permitir a los usuarios autenticados ejecutar comandos a través de una red. Ya hemos solucionado la vulnerabilidad en las siguientes versiones: QVR Firmware 5.0.0 y posteriores QNAP VioStar NVR contains an OS command injection vulnerability that allows authenticated users to execute commands via a network. • https://www.qnap.com/en/security-advisory/qsa-23-48 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.7EPSS: 0%CPEs: 1EXPL: 0

An insertion of sensitive information into Log file vulnerability has been reported to affect product. If exploited, the vulnerability possibly provides local authenticated administrators with an additional, less-protected path to acquiring the information via unspecified vectors. We have already fixed the vulnerability in the following version: Windows 10 SP1, Windows 11, Mac OS, and Mac M1: QVR Pro Client 2.3.0.0420 and later Se ha informado que una inserción de información confidencial en la vulnerabilidad del archivo de Log afecta al producto. Si se explota, la vulnerabilidad posiblemente proporcione a los administradores locales autenticados una ruta adicional menos protegida para adquirir la información a través de vectores no especificados. Ya se ha corregido la vulnerabilidad en las siguientes versiones: Windows 10 SP1, Windows 11, Mac OS y Mac M1: QVR Pro Client 2.3.0.0420 y posteriores • https://www.qnap.com/en/security-advisory/qsa-23-08 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 7.2EPSS: 0%CPEs: 18EXPL: 0

An OS command injection vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows remote authenticated administrators to execute commands via unspecified vectors. QES is not affected. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2346 build 20230322 and later QTS 4.5.4.2374 build 20230416 and later QuTS hero h5.0.1.2348 build 20230324 and later QuTS hero h4.5.4.2374 build 20230417 and later QuTScloud c5.0.1.2374 and later • https://www.qnap.com/en/security-advisory/qsa-23-10 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 2.7EPSS: 0%CPEs: 18EXPL: 0

A vulnerability has been reported to affect QNAP operating systems. If exploited, the out-of-bounds read vulnerability allows remote authenticated administrators to get secret values. The vulnerability affects the following QNAP operating systems: QTS, QuTS hero, QuTScloud, QVP (QVR Pro appliances) We have already fixed the vulnerability in the following versions: QTS 5.0.1.2346 build 20230322 and later QuTS hero h5.0.1.2348 build 20230324 and later • https://www.qnap.com/en/security-advisory/qsa-23-06 • CWE-125: Out-of-bounds Read CWE-489: Active Debug Code CWE-1295: Debug Messages Revealing Unnecessary Information •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

We have already fixed this vulnerability in the following versions of QVR: QVR 5.1.6 build 20220401 and later Ya hemos corregido esta vulnerabilidad en las siguientes versiones de QVR: QVR 5.1.6 build 20220401 y posteriores • https://www.qnap.com/en/security-advisory/qsa-22-07 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •