Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

synology.com

Synology Product Security Advisory

Get the latest updates from Synology Product Security Advisory directly as they happen.

Follow now 33 followers

Latest posts

Last updated about 1 month ago

Synology-SA-25:05 Mail Server

about 1 month ago

A vulnerability in Synology Mail Server allows remote authenticated attackers to read...

Synology-SA-25:04 SRM

about 2 months ago

Multiple vulnerabilities allow remote authenticated users to read or write non-sensitive files.

Synology-SA-25:03 DSM

2 months ago

A vulnerability allows attackers to read any file via writable Network File...

Synology-SA-25:02 Active Backup for Business

3 months ago

Multiple vulnerabilities allow remote authenticated users with administrator privileges to read/write/delete specific...

Synology-SA-25:01 DSM (PWN2OWN 2024)

3 months ago

A vulnerability allows man-in-the-middle attackers to hijack the authentication of administrators The...

Synology-SA-24:28 Media Server

5 months ago

A vulnerability allows remote attackers to read specific files.

Synology-SA-24:27 DSM

5 months ago

A vulnerability allow remote attackers to conduct denial-of-service attacks A vulnerability allow...

Synology-SA-24:26 BeeDrive for desktop

5 months ago

A vulnerability allows local users to execute arbitrary code A vulnerability allows...

Synology-SA-24:25 Surveillance Station

5 months ago

Multiple vulnerabilities allow remote authenticated users to inject arbitrary web script or...

Synology-SA-24:24 Synology Camera (PWN2OWN 2024)

6 months ago

Multipe vulnerabilities allow remote attackers to execute arbitrary code or execute arbitrary...

Synology-SA-24:23 BeeStation (PWN2OWN 2024)

6 months ago

The vulnerability reported in ZDI-CAN-25403 allows remote attackers to execute arbitrary code...

Synology-SA-24:22 Replication Service (PWN2OWN 2024)

6 months ago

A vulnerability allows remote attacker to execute arbitrary commands via a susceptible...