- Description
- A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.2.2950 build 20241114 and later QuTS hero h5.2.2.2952 build 20241116 and later
- Source
- security@qnapsecurity.com.tw
- NVD status
- Received
CVSS 4.0
- Type
- Secondary
- Base score
- 2.1
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- LOW
- security@qnapsecurity.com.tw
- CWE-134
- Hype score
- Not currently trending
Múltiples vulnerabilidades en QNAP Vulnerabilidades en QTS y QuTS hero CVE-2024-48859 CVE-2024-48865 CVE-2024-48866 CVE-2024-48867 CVE-2024-48868 CVE-2024-50393 CVE-2024-50402 CVE-2024-50403 https://t.co/38RnaCrgDE https://t.co/J88Z1u0Vhc
@elhackernet
9 Dec 2024
5455 Impressions
24 Retweets
66 Likes
13 Bookmarks
1 Reply
5 Quotes
CVE-2024-50403 A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could a… https://t.co/4EM9JXV4Wv
@CVEnew
6 Dec 2024
254 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes