Vulnerabilities > Qnap > QTS

DATE CVE VULNERABILITY TITLE RISK
2017-09-14 CVE-2017-13067 Unspecified vulnerability in Qnap QTS
QNAP has patched a remote code execution vulnerability affecting the QTS Media Library in all versions prior to QTS 4.2.6 build 20170905 and QTS 4.3.3.0299 build 20170901.
network
low complexity
qnap
critical
9.8
2017-06-15 CVE-2017-7629 Weak Password Recovery Mechanism for Forgotten Password vulnerability in Qnap QTS
QNAP QTS before 4.2.6 build 20170517 has a flaw in the change password function.
network
low complexity
qnap CWE-640
7.5
2017-03-23 CVE-2017-6361 OS Command Injection vulnerability in Qnap QTS
QNAP QTS before 4.2.4 Build 20170313 allows attackers to execute arbitrary commands via unspecified vectors.
network
low complexity
qnap CWE-78
critical
9.8
2017-03-23 CVE-2017-6360 OS Command Injection vulnerability in Qnap QTS
QNAP QTS before 4.2.4 Build 20170313 allows attackers to gain administrator privileges and obtain sensitive information via unspecified vectors.
network
low complexity
qnap CWE-78
critical
9.8
2017-03-23 CVE-2017-6359 OS Command Injection vulnerability in Qnap QTS
QNAP QTS before 4.2.4 Build 20170313 allows attackers to gain administrator privileges and execute arbitrary commands via unspecified vectors.
network
low complexity
qnap CWE-78
critical
9.8
2017-03-23 CVE-2017-5227 Information Exposure vulnerability in Qnap QTS
QNAP QTS before 4.2.4 Build 20170313 allows local users to obtain sensitive Domain Administrator password information by reading data in an XOR format within the /etc/config/uLinux.conf configuration file.
network
low complexity
qnap CWE-200
7.5
2016-07-03 CVE-2015-5664 Cross-site Scripting vulnerability in Qnap QTS
Cross-site scripting (XSS) vulnerability in File Station in QNAP QTS before 4.2.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
network
low complexity
qnap CWE-79
6.1
2014-09-25 CVE-2014-7169 OS Command Injection vulnerability in multiple products
GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.
9.8
2014-09-24 CVE-2014-6271 OS Command Injection vulnerability in multiple products
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
9.8