Логотип exploitDog
bind:CVE-2023-41278
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-41278

Количество 3

Количество 3

nvd логотип

CVE-2023-41278

около 2 лет назад

A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.1.2.2534 build 20230927 and later QuTScloud c5.1.5.2651 and later

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-682p-65cm-q45c

около 2 лет назад

A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.1.2.2534 build 20230927 and later QuTScloud c5.1.5.2651 and later

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2024-01051

больше 2 лет назад

Уязвимость операционных систем QTS, QuTS hero и QuTScloud сетевых устройств Qnap, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-41278

A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.1.2.2534 build 20230927 and later QuTScloud c5.1.5.2651 and later

CVSS3: 5.5
0%
Низкий
около 2 лет назад
github логотип
GHSA-682p-65cm-q45c

A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.1.2.2534 build 20230927 and later QuTScloud c5.1.5.2651 and later

CVSS3: 5.5
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-01051

Уязвимость операционных систем QTS, QuTS hero и QuTScloud сетевых устройств Qnap, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.2
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу