![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.154147 |
Kategorie: | General |
Titel: | QNAP QTS Multiple Vulnerabilities (QSA-24-54) |
Zusammenfassung: | QNAP QTS is prone to multiple vulnerabilities. |
Beschreibung: | Summary: QNAP QTS is prone to multiple vulnerabilities. Vulnerability Insight: The following vulnerabilities exist: - CVE-2024-50405: CRLF injection could allow remote attackers who have gained administrator access to modify application data - CVE-2024-53692: Command injection could allow remote attackers who have gained administrator access to execute arbitrary commands - CVE-2024-53693: CRLF Injection could allow remote attackers who have gained user access to modify application data - CVE-2024-53697, CVE-2024-53699: Out-of-bounds write could allow remote attackers who have gained administrator access to modify or corrupt memory - CVE-2024-53698: Double free could allow remote attackers who have gained administrator access to modify memory Affected Software/OS: QNAP QTS version 5.2.x prior to 5.2.3.3006 build 20250108. Solution: Update to version 5.2.3.3006 build 20250108 or later. CVSS Score: 6.8 CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-50405 Common Vulnerability Exposure (CVE) ID: CVE-2024-53692 Common Vulnerability Exposure (CVE) ID: CVE-2024-53693 Common Vulnerability Exposure (CVE) ID: CVE-2024-53697 Common Vulnerability Exposure (CVE) ID: CVE-2024-53698 Common Vulnerability Exposure (CVE) ID: CVE-2024-53699 |
Copyright | Copyright (C) 2025 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |