Multiple vulnerabilities allow remote authenticated users to read specific files, remote authenticated users to delete specific files and remote authenticated users to obtain non-sensitive information.
Continue reading...
- - -
Synology Product Security Advisory: check the list
Source: synology.com
Continue reading...
- - -
Synology Product Security Advisory: check the list
Source: synology.com