"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-09-27 01:01:00 +00:00
parent 56d68cdaf0
commit 0ed49a6e90
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
3 changed files with 15 additions and 12 deletions

View File

@ -33,7 +33,7 @@
"credit": [
{
"lang": "eng",
"value": "360 的安全研究员 侯留洋houliuyang@360.cn和叶根深yegenshen@360.cn"
"value": "360 \u7684\u5b89\u5168\u7814\u7a76\u5458 \u4faf\u7559\u6d0b\uff08houliuyang@360.cn\uff09\u548c\u53f6\u6839\u6df1\uff08yegenshen@360.cn\uff09"
}
],
"data_format": "MITRE",
@ -43,7 +43,7 @@
"description_data": [
{
"lang": "eng",
"value": "A command injection vulnerability has been reported to affect QNAP device running QVR. If exploited, this vulnerability could allow remote attackers to run arbitrary commands.\nWe have already fixed this vulnerability in the following versions of QVR:\nQVR 5.1.5 build 20210803 and later\n"
"value": "A command injection vulnerability has been reported to affect QNAP device running QVR. If exploited, this vulnerability could allow remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QVR: QVR 5.1.5 build 20210803 and later"
}
]
},
@ -81,8 +81,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.qnap.com/en/security-advisory/qsa-21-35"
"refsource": "MISC",
"url": "https://www.qnap.com/en/security-advisory/qsa-21-35",
"name": "https://www.qnap.com/en/security-advisory/qsa-21-35"
}
]
},

View File

@ -33,7 +33,7 @@
"credit": [
{
"lang": "eng",
"value": "360 的安全研究员 侯留洋houliuyang@360.cn和叶根深yegenshen@360.cn"
"value": "360 \u7684\u5b89\u5168\u7814\u7a76\u5458 \u4faf\u7559\u6d0b\uff08houliuyang@360.cn\uff09\u548c\u53f6\u6839\u6df1\uff08yegenshen@360.cn\uff09"
}
],
"data_format": "MITRE",
@ -43,7 +43,7 @@
"description_data": [
{
"lang": "eng",
"value": "A command injection vulnerability has been reported to affect QNAP device running QVR. If exploited, this vulnerability could allow remote attackers to run arbitrary commands.\nWe have already fixed this vulnerability in the following versions of QVR:\nQVR 5.1.5 build 20210803 and later\n"
"value": "A command injection vulnerability has been reported to affect QNAP device running QVR. If exploited, this vulnerability could allow remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QVR: QVR 5.1.5 build 20210803 and later"
}
]
},
@ -81,8 +81,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.qnap.com/en/security-advisory/qsa-21-35"
"refsource": "MISC",
"url": "https://www.qnap.com/en/security-advisory/qsa-21-35",
"name": "https://www.qnap.com/en/security-advisory/qsa-21-35"
}
]
},

View File

@ -33,7 +33,7 @@
"credit": [
{
"lang": "eng",
"value": "360 的安全研究员 侯留洋houliuyang@360.cn和叶根深yegenshen@360.cn"
"value": "360 \u7684\u5b89\u5168\u7814\u7a76\u5458 \u4faf\u7559\u6d0b\uff08houliuyang@360.cn\uff09\u548c\u53f6\u6839\u6df1\uff08yegenshen@360.cn\uff09"
}
],
"data_format": "MITRE",
@ -43,7 +43,7 @@
"description_data": [
{
"lang": "eng",
"value": "A command injection vulnerability has been reported to affect QNAP device running QVR. If exploited, this vulnerability could allow remote attackers to run arbitrary commands.\nWe have already fixed this vulnerability in the following versions of QVR:\nQVR 5.1.5 build 20210803 and later\n"
"value": "A command injection vulnerability has been reported to affect QNAP device running QVR. If exploited, this vulnerability could allow remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QVR: QVR 5.1.5 build 20210803 and later"
}
]
},
@ -81,8 +81,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.qnap.com/en/security-advisory/qsa-21-35"
"refsource": "MISC",
"url": "https://www.qnap.com/en/security-advisory/qsa-21-35",
"name": "https://www.qnap.com/en/security-advisory/qsa-21-35"
}
]
},