This improper input validation vulnerability allows remote attackers to inject arbitrary code to the system. To fix the vulnerability, QNAP recommend updating QTS to their latest versions.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:o:qnap:qts:4.3.6.0907:*:*:*:*:*:*:* cpe:2.3:o:qnap:qts:4.3.6.0923:*:*:*:*:*:*:* cpe:2.3:o:qnap:qts:4.3.6.0944:*:*:*:*:*:*:* cpe:2.3:o:qnap:qts:4.3.6.0959:*:*:*:*:*:*:* cpe:2.3:o:qnap:qts:4.3.6.0979:*:*:*:*:*:*:* cpe:2.3:o:qnap:qts:4.3.6.0993:*:*:*:*:*:*:* cpe:2.3:o:qnap:qts:4.3.6.1013:*:*:*:*:*:*:* cpe:2.3:o:qnap:qts:4.3.6.1033:*:*:*:*:*:*:* |
cpe:2.3:o:qnap:qts:4.3.6.0895:-:*:*:*:*:*:* cpe:2.3:o:qnap:qts:4.3.6.0907:-:*:*:*:*:*:* cpe:2.3:o:qnap:qts:4.3.6.0923:-:*:*:*:*:*:* cpe:2.3:o:qnap:qts:4.3.6.0944:-:*:*:*:*:*:* cpe:2.3:o:qnap:qts:4.3.6.0959:-:*:*:*:*:*:* cpe:2.3:o:qnap:qts:4.3.6.0979:-:*:*:*:*:*:* cpe:2.3:o:qnap:qts:4.3.6.0993:-:*:*:*:*:*:* cpe:2.3:o:qnap:qts:4.3.6.1013:-:*:*:*:*:*:* cpe:2.3:o:qnap:qts:4.3.6.1033:-:*:*:*:*:*:* |
Thu, 06 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|

Status: PUBLISHED
Assigner: qnap
Published:
Updated: 2025-02-06T20:44:23.111Z
Reserved: 2019-01-29T00:00:00.000Z
Link: CVE-2019-7193

Updated: 2024-08-04T20:38:33.543Z

Status : Analyzed
Published: 2019-12-05T17:15:13.027
Modified: 2025-02-13T14:16:18.827
Link: CVE-2019-7193

No data.