"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-12-24 02:01:53 +00:00
parent 679bfed723
commit 1c730aad4a
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
6 changed files with 32 additions and 18 deletions

View File

@ -44,7 +44,7 @@
"description_data": [
{
"lang": "eng",
"value": "A hard-coded password vulnerability has been reported to affect earlier versions of QES. If exploited, this vulnerability could allow attackers to log in with a hard-coded password.\nQNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later.\n"
"value": "A hard-coded password vulnerability has been reported to affect earlier versions of QES. If exploited, this vulnerability could allow attackers to log in with a hard-coded password. QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later."
}
]
},
@ -98,8 +98,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-19"
"refsource": "MISC",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-19",
"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-19"
}
]
},

View File

@ -44,7 +44,7 @@
"description_data": [
{
"lang": "eng",
"value": "If exploited, this stored cross-site scripting vulnerability could allow remote attackers to inject malicious code in File Station.\nQNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later."
"value": "If exploited, this stored cross-site scripting vulnerability could allow remote attackers to inject malicious code in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later."
}
]
},
@ -98,8 +98,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17"
"refsource": "MISC",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17",
"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17"
}
]
},

View File

@ -44,7 +44,7 @@
"description_data": [
{
"lang": "eng",
"value": "If exploited, this absolute path traversal vulnerability could allow attackers to traverse files in File Station.\nQNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later."
"value": "If exploited, this absolute path traversal vulnerability could allow attackers to traverse files in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later."
}
]
},
@ -106,8 +106,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17"
"refsource": "MISC",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17",
"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17"
}
]
},

View File

@ -44,7 +44,7 @@
"description_data": [
{
"lang": "eng",
"value": "If exploited, this vulnerability could allow attackers to gain sensitive information via generation of error messages.\nQNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later."
"value": "If exploited, this vulnerability could allow attackers to gain sensitive information via generation of error messages. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later."
}
]
},
@ -90,8 +90,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17"
"refsource": "MISC",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17",
"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5681",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.epson.jp/support/misc_t/201217_oshirase.htm"
"url": "https://www.epson.jp/support/misc_t/201217_oshirase.htm",
"refsource": "MISC",
"name": "https://www.epson.jp/support/misc_t/201217_oshirase.htm"
},
{
"url": "https://jvn.jp/en/jp/JVN94244575/index.html"
"url": "https://jvn.jp/en/jp/JVN94244575/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN94244575/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5684",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://jpn.nec.com/security-info/secinfo/nv20-015.html"
"url": "https://jpn.nec.com/security-info/secinfo/nv20-015.html",
"refsource": "MISC",
"name": "https://jpn.nec.com/security-info/secinfo/nv20-015.html"
},
{
"url": "https://jvn.jp/en/jp/JVN10100024/index.html"
"url": "https://jvn.jp/en/jp/JVN10100024/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN10100024/index.html"
}
]
},