mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 19:17:10 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
a65afa1165
commit
5d3230e6e4
@ -73,7 +73,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running QTS, QuTS hero and QuTScloud. If exploited, this vulnerability allows remote attackers to inject malicious code.\nWe have already fixed this vulnerability in the following versions of QTS, QuTS hero and QuTScloud:\nQTS 4.5.4.1991 build 20220329 and later\nQTS 5.0.0.1986 build 20220324 and later\nQuTS hero h5.0.0.1986 build 20220324 and later\nQuTS hero h4.5.4.1971 build 20220310 and later\nQuTScloud c5.0.1.1949 and later"
|
||||
"value": "A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running QTS, QuTS hero and QuTScloud. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of QTS, QuTS hero and QuTScloud: QTS 4.5.4.1991 build 20220329 and later QTS 5.0.0.1986 build 20220324 and later QuTS hero h5.0.0.1986 build 20220324 and later QuTS hero h4.5.4.1971 build 20220310 and later QuTScloud c5.0.1.1949 and later"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -111,8 +111,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-22-16"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-22-16",
|
||||
"name": "https://www.qnap.com/en/security-advisory/qsa-22-16"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,7 +73,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An open redirect vulnerability has been reported to affect QNAP device running QuTScloud, QuTS hero and QTS. If exploited, this vulnerability allows attackers to redirect users to an untrusted page that contains malware.\nWe have already fixed this vulnerability in the following versions of QuTScloud, QuTS hero and QTS:\nQuTScloud c5.0.1.1949 and later\nQuTS hero h5.0.0.1949 build 20220215 and later\nQuTS hero h4.5.4.1951 build 20220218 and later\nQTS 5.0.0.1986 build 20220324 and later\nQTS 4.5.4.1991 build 20220329 and later\n"
|
||||
"value": "An open redirect vulnerability has been reported to affect QNAP device running QuTScloud, QuTS hero and QTS. If exploited, this vulnerability allows attackers to redirect users to an untrusted page that contains malware. We have already fixed this vulnerability in the following versions of QuTScloud, QuTS hero and QTS: QuTScloud c5.0.1.1949 and later QuTS hero h5.0.0.1949 build 20220215 and later QuTS hero h4.5.4.1951 build 20220218 and later QTS 5.0.0.1986 build 20220324 and later QTS 4.5.4.1991 build 20220329 and later"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -111,8 +111,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-22-16"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-22-16",
|
||||
"name": "https://www.qnap.com/en/security-advisory/qsa-22-16"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -43,7 +43,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An missing authorization vulnerability has been reported to affect QNAP device running Video Station. If exploited, this vulnerability allows remote attackers to access data or perform actions that they should not be allowed to perform.\nWe have already fixed this vulnerability in the following versions of Video Station:\nVideo Station 5.5.9 ( 2022/02/16 ) and later\n"
|
||||
"value": "An missing authorization vulnerability has been reported to affect QNAP device running Video Station. If exploited, this vulnerability allows remote attackers to access data or perform actions that they should not be allowed to perform. We have already fixed this vulnerability in the following versions of Video Station: Video Station 5.5.9 ( 2022/02/16 ) and later"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -81,8 +81,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-22-14"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-22-14",
|
||||
"name": "https://www.qnap.com/en/security-advisory/qsa-22-14"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -51,7 +51,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An improper authentication vulnerability has been reported to affect QNAP device running Video Station. If exploited, this vulnerability allows attackers to compromise the security of the system.\nWe have already fixed this vulnerability in the following versions of Video Station:\nVideo Station 5.5.9 and later\nVideo Station 5.3.13 and later\nVideo Station 5.1.8 and later\n"
|
||||
"value": "An improper authentication vulnerability has been reported to affect QNAP device running Video Station. If exploited, this vulnerability allows attackers to compromise the security of the system. We have already fixed this vulnerability in the following versions of Video Station: Video Station 5.5.9 and later Video Station 5.3.13 and later Video Station 5.1.8 and later"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -89,8 +89,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-22-14"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-22-14",
|
||||
"name": "https://www.qnap.com/en/security-advisory/qsa-22-14"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -51,7 +51,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An improper authentication vulnerability has been reported to affect QNAP device running Photo Station. If exploited, this vulnerability allows attackers to compromise the security of the system.\nWe have already fixed this vulnerability in the following versions of Photo Station:\nPhoto Station 6.0.20 ( 2022/02/15 ) and later\nPhoto Station 5.7.16 ( 2022/02/11 ) and later\nPhoto Station 5.4.13 ( 2022/02/11 ) and later\n"
|
||||
"value": "An improper authentication vulnerability has been reported to affect QNAP device running Photo Station. If exploited, this vulnerability allows attackers to compromise the security of the system. We have already fixed this vulnerability in the following versions of Photo Station: Photo Station 6.0.20 ( 2022/02/15 ) and later Photo Station 5.7.16 ( 2022/02/11 ) and later Photo Station 5.4.13 ( 2022/02/11 ) and later"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -89,8 +89,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-22-15"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-22-15",
|
||||
"name": "https://www.qnap.com/en/security-advisory/qsa-22-15"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -43,7 +43,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "We have already fixed this vulnerability in the following versions of QVR:\nQVR 5.1.6 build 20220401 and later\n"
|
||||
"value": "We have already fixed this vulnerability in the following versions of QVR: QVR 5.1.6 build 20220401 and later"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -81,8 +81,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-22-07"
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-22-07",
|
||||
"name": "https://www.qnap.com/en/security-advisory/qsa-22-07"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user