mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-06 02:32:02 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
bc79ef6183
commit
2723c564ab
@ -89,7 +89,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A cross-site scripting (XSS) vulnerability has been reported to affect earlier versions of File Station. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions:\nQTS 4.5.2.1566 build 20210202 (and later)\nQTS 4.5.1.1456 build 20201015 (and later)\nQTS 4.3.6.1446 build 20200929 (and later)\nQTS 4.3.4.1463 build 20201006 (and later)\nQTS 4.3.3.1432 build 20201006 (and later)\nQTS 4.2.6 build 20210327 (and later)\nQuTS hero h4.5.1.1472 build 20201031 (and later)\nQuTScloud c4.5.4.1601 build 20210309 (and later)\nQuTScloud c4.5.3.1454 build 20201013 (and later)"
|
||||
"value": "A cross-site scripting (XSS) vulnerability has been reported to affect earlier versions of File Station. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 build 20210202 (and later) QTS 4.5.1.1456 build 20201015 (and later) QTS 4.3.6.1446 build 20200929 (and later) QTS 4.3.4.1463 build 20201006 (and later) QTS 4.3.3.1432 build 20201006 (and later) QTS 4.2.6 build 20210327 (and later) QuTS hero h4.5.1.1472 build 20201031 (and later) QuTScloud c4.5.4.1601 build 20210309 (and later) QuTScloud c4.5.3.1454 build 20201013 (and later)"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -119,8 +119,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-04"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-04",
|
||||
"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-04"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -625,6 +625,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[beam-issues] 20210410 [jira] [Comment Edited] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
|
||||
"url": "https://lists.apache.org/thread.html/r6b83ca85c8f9a6794b1f85bc70d1385ed7bc1ad07750d0977537154a@%3Cissues.beam.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[beam-issues] 20210415 [jira] [Updated] (BEAM-11227) Upgrade beam-vendor-grpc-1_26_0-0.3 to fix CVE-2020-27216",
|
||||
"url": "https://lists.apache.org/thread.html/r6f51a654ac2e67e3d1c65a8957cbbb127c3f15b64b4fcd626df03633@%3Cissues.beam.apache.org%3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -93,6 +93,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[openoffice-users] 20210415 Re: CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks",
|
||||
"url": "https://lists.apache.org/thread.html/ra2cabdc083d5160a84de9a6436296ee5030fb3a16dc490dee4f983d5@%3Cusers.openoffice.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[announce] 20210415 CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks",
|
||||
"url": "https://lists.apache.org/thread.html/r7c01173f763b0c4212ada0e6ab283984d6e058d72258efce85c006ab@%3Cannounce.apache.org%3E"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user