mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-05 18:28:42 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
679bfed723
commit
1c730aad4a
@ -44,7 +44,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A hard-coded password vulnerability has been reported to affect earlier versions of QES. If exploited, this vulnerability could allow attackers to log in with a hard-coded password.\nQNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later.\n"
|
||||
"value": "A hard-coded password vulnerability has been reported to affect earlier versions of QES. If exploited, this vulnerability could allow attackers to log in with a hard-coded password. QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -98,8 +98,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-19"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-19",
|
||||
"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-19"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -44,7 +44,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "If exploited, this stored cross-site scripting vulnerability could allow remote attackers to inject malicious code in File Station.\nQNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later."
|
||||
"value": "If exploited, this stored cross-site scripting vulnerability could allow remote attackers to inject malicious code in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -98,8 +98,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17",
|
||||
"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -44,7 +44,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "If exploited, this absolute path traversal vulnerability could allow attackers to traverse files in File Station.\nQNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later."
|
||||
"value": "If exploited, this absolute path traversal vulnerability could allow attackers to traverse files in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -106,8 +106,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17",
|
||||
"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -44,7 +44,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "If exploited, this vulnerability could allow attackers to gain sensitive information via generation of error messages.\nQNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later."
|
||||
"value": "If exploited, this vulnerability could allow attackers to gain sensitive information via generation of error messages. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -90,8 +90,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17",
|
||||
"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5681",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.epson.jp/support/misc_t/201217_oshirase.htm"
|
||||
"url": "https://www.epson.jp/support/misc_t/201217_oshirase.htm",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.epson.jp/support/misc_t/201217_oshirase.htm"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN94244575/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN94244575/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN94244575/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5684",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv20-015.html"
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv20-015.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jpn.nec.com/security-info/secinfo/nv20-015.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN10100024/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN10100024/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN10100024/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user