{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T00:04:09.096","vulnerabilities":[{"cve":{"id":"CVE-2022-27592","sourceIdentifier":"security@qnapsecurity.com.tw","published":"2024-09-06T17:15:11.173","lastModified":"2024-09-24T16:44:35.460","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An unquoted search path or element vulnerability has been reported to affect QVR Smart Client. If exploited, the vulnerability could allow local authenticated administrators to execute unauthorized code or commands via unspecified vectors.\n\nWe have already fixed the vulnerability in the following version:\nWindows 10 SP1, Windows 11, Mac OS, and Mac M1: QVR Smart Client 2.4.0.0570 and later"},{"lang":"es","value":"Se ha informado de una vulnerabilidad de ruta o elemento de búsqueda sin comillas que afecta a QVR Smart Client. Si se explota, la vulnerabilidad podría permitir que los administradores locales autenticados ejecuten código o comandos no autorizados a través de vectores no especificados. Ya hemos corregido la vulnerabilidad en la siguiente versión: Windows 10 SP1, Windows 11, Mac OS y Mac M1: QVR Smart Client 2.4.0.0570 y posteriores"}],"metrics":{"cvssMetricV31":[{"source":"security@qnapsecurity.com.tw","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@qnapsecurity.com.tw","type":"Secondary","description":[{"lang":"en","value":"CWE-428"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qnap:qvr_smart_client:*:*:*:*:*:*:*:*","versionStartIncluding":"2.4.0","versionEndExcluding":"2.4.0.0570","matchCriteriaId":"269F312B-87D7-4B02-BC84-2E37244EFFEE"}]}]}],"references":[{"url":"https://www.qnap.com/en/security-advisory/qsa-24-22","source":"security@qnapsecurity.com.tw","tags":["Vendor Advisory"]}]}}]}