"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-06-11 07:00:54 +00:00
parent 0746a1d785
commit 6fe87a16a6
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
3 changed files with 12 additions and 9 deletions

View File

@ -54,7 +54,7 @@
"description_data": [
{
"lang": "eng",
"value": "An out-of-bounds read vulnerability has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read sensitive information on the system.\nThis issue affects:\nQNAP Systems Inc. QSS\nversions prior to 1.0.2 build 20210122 on QSW-M2108-2C;\nversions prior to 1.0.2 build 20210122 on QSW-M2108-2S;\nversions prior to 1.0.2 build 20210122 on QSW-M2108R-2C."
"value": "An out-of-bounds read vulnerability has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read sensitive information on the system. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.2 build 20210122 on QSW-M2108-2C; versions prior to 1.0.2 build 20210122 on QSW-M2108-2S; versions prior to 1.0.2 build 20210122 on QSW-M2108R-2C."
}
]
},
@ -92,8 +92,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-23"
"refsource": "MISC",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-23",
"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-23"
}
]
},

View File

@ -59,7 +59,7 @@
"description_data": [
{
"lang": "eng",
"value": "Inclusion of sensitive information in the source code has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read application data.\nThis issue affects:\nQNAP Systems Inc. QSS\nversions prior to 1.0.3 build 20210505 on QSW-M2108-2C;\nversions prior to 1.0.3 build 20210505 on QSW-M2108-2S;\nversions prior to 1.0.3 build 20210505 on QSW-M2108R-2C;\nversions prior to 1.0.12 build 20210506 on QSW-M408."
"value": "Inclusion of sensitive information in the source code has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read application data. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.3 build 20210505 on QSW-M2108-2C; versions prior to 1.0.3 build 20210505 on QSW-M2108-2S; versions prior to 1.0.3 build 20210505 on QSW-M2108R-2C; versions prior to 1.0.12 build 20210506 on QSW-M408."
}
]
},
@ -97,8 +97,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-24"
"refsource": "MISC",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-24",
"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-24"
}
]
},

View File

@ -43,7 +43,7 @@
"description_data": [
{
"lang": "eng",
"value": "An improper access control vulnerability has been reported to affect QNAP NAS. If exploited, this vulnerability allows remote attackers to compromise the security of the software.\nThis issue affects:\nQNAP Systems Inc. Helpdesk\nversions prior to 3.0.4."
"value": "An improper access control vulnerability has been reported to affect QNAP NAS. If exploited, this vulnerability allows remote attackers to compromise the security of the software. This issue affects: QNAP Systems Inc. Helpdesk versions prior to 3.0.4."
}
]
},
@ -81,8 +81,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-25"
"refsource": "MISC",
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-25",
"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-25"
}
]
},