Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2023-52946
Disclosure Date: September 26, 2024 (last updated October 09, 2024)
Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in vss service component in Synology Drive Client before 3.5.0-16084 allows remote attackers to overwrite trivial buffers and crash the client via unspecified vectors.
0
Attacker Value
Unknown
CVE-2022-49041
Disclosure Date: September 26, 2024 (last updated October 09, 2024)
Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in backup task management functionality in Synology Drive Client before 3.4.0-15721 allows local users with administrator privileges to crash the client via unspecified vectors.
0
Attacker Value
Unknown
CVE-2022-49040
Disclosure Date: September 26, 2024 (last updated October 09, 2024)
Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in connection management functionality in Synology Drive Client before 3.4.0-15721 allows local users with administrator privileges to crash the client via unspecified vectors.
0
Attacker Value
Unknown
CVE-2022-49039
Disclosure Date: September 26, 2024 (last updated October 09, 2024)
Out-of-bounds write vulnerability in backup task management functionality in Synology Drive Client before 3.4.0-15721 allows local users with administrator privileges to execute arbitrary commands via unspecified vectors.
0
Attacker Value
Unknown
CVE-2022-49038
Disclosure Date: September 26, 2024 (last updated October 09, 2024)
Inclusion of functionality from untrusted control sphere vulnerability in OpenSSL DLL component in Synology Drive Client before 3.3.0-15082 allows local users to execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown
CVE-2022-49037
Disclosure Date: September 26, 2024 (last updated October 09, 2024)
Insertion of sensitive information into log file vulnerability in proxy settings component in Synology Drive Client before 3.3.0-15082 allows remote authenticated users to obtain sensitive information via unspecified vectors.
0
Attacker Value
Unknown
CVE-2019-9486
Disclosure Date: April 30, 2019 (last updated November 27, 2024)
STRATO HiDrive Desktop Client 5.0.1.0 for Windows suffers from a SYSTEM privilege escalation vulnerability through the HiDriveMaintenanceService service. This service establishes a NetNamedPipe endpoint that allows applications to connect and call publicly exposed methods. An attacker can inject and execute code by hijacking the insecure communications with the service. This vulnerability also affects Telekom MagentaCLOUD through 5.7.0.0 and 1&1 Online Storage through 6.1.0.0.
0