Add CVE-2021-43928

This commit is contained in:
SynologyCVE 2022-03-11 17:26:31 +08:00
parent d5178d1d56
commit a82704460f

View File

@ -6,7 +6,7 @@
"ID": "CVE-2021-43928",
"ASSIGNER": "security@synology.com",
"STATE": "PUBLIC",
"DATE_PUBLIC": "2022-01-24T06:56:26.658790"
"DATE_PUBLIC": "2022-03-11T09:26:31.099393"
},
"affects": {
"vendor": {
@ -20,7 +20,7 @@
"version_data": [
{
"affected": "<",
"version_value": "7.0.1-42218-2"
"version_value": "20211105-10315"
}
]
}
@ -36,7 +36,7 @@
"description_data": [
{
"lang": "eng",
"value": "Improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability in mail sending and receiving component in Synology Mail Station before 7.0.1-42218-2 allows remote authenticated users to execute arbitrary commands via unspecified vectors."
"value": "Improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability in mail sending and receiving component in Synology Mail Station before 20211105-10315 allows remote authenticated users to execute arbitrary commands via unspecified vectors."
}
]
},
@ -62,8 +62,8 @@
"references": {
"reference_data": [
{
"name": "https://www.synology.com/security/advisory/Synology_SA_22_01",
"url": "https://www.synology.com/security/advisory/Synology_SA_22_01",
"name": "https://www.synology.com/security/advisory/Synology_SA_21_28",
"url": "https://www.synology.com/security/advisory/Synology_SA_21_28",
"refsource": "CONFIRM"
}
]