diff --git a/2021/43xxx/CVE-2021-43928.json b/2021/43xxx/CVE-2021-43928.json index 76a2a62f820..7b6d9392e05 100644 --- a/2021/43xxx/CVE-2021-43928.json +++ b/2021/43xxx/CVE-2021-43928.json @@ -6,7 +6,7 @@ "ID": "CVE-2021-43928", "ASSIGNER": "security@synology.com", "STATE": "PUBLIC", - "DATE_PUBLIC": "2022-01-24T06:56:26.658790" + "DATE_PUBLIC": "2022-03-11T09:26:31.099393" }, "affects": { "vendor": { @@ -20,7 +20,7 @@ "version_data": [ { "affected": "<", - "version_value": "7.0.1-42218-2" + "version_value": "20211105-10315" } ] } @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "Improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability in mail sending and receiving component in Synology Mail Station before 7.0.1-42218-2 allows remote authenticated users to execute arbitrary commands via unspecified vectors." + "value": "Improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability in mail sending and receiving component in Synology Mail Station before 20211105-10315 allows remote authenticated users to execute arbitrary commands via unspecified vectors." } ] }, @@ -62,8 +62,8 @@ "references": { "reference_data": [ { - "name": "https://www.synology.com/security/advisory/Synology_SA_22_01", - "url": "https://www.synology.com/security/advisory/Synology_SA_22_01", + "name": "https://www.synology.com/security/advisory/Synology_SA_21_28", + "url": "https://www.synology.com/security/advisory/Synology_SA_21_28", "refsource": "CONFIRM" } ]