Vulnerabilites related to qnap - qes
cve-2020-2503
Vulnerability from cvelistv5
Published
2020-12-24 01:39
Modified
2024-09-17 03:07
Severity ?
EPSS score ?
Summary
If exploited, this stored cross-site scripting vulnerability could allow remote attackers to inject malicious code in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later.
References
▼ | URL | Tags |
---|---|---|
https://www.qnap.com/zh-tw/security-advisory/qsa-20-17 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
QNAP Systems Inc. | QES |
Version: unspecified < 2.1.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:09:54.672Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "build 20201006" ], "product": "QES", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "2.1.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "TIM Security Red Team Research" } ], "datePublic": "2020-12-23T00:00:00", "descriptions": [ { "lang": "en", "value": "If exploited, this stored cross-site scripting vulnerability could allow remote attackers to inject malicious code in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-749", "description": "CWE-749 Exposed Dangerous Method or Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-31T16:33:28", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17" } ], "solutions": [ { "lang": "en", "value": "QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later." } ], "source": { "advisory": "QSA-20-17", "discovery": "EXTERNAL" }, "title": "Stored cross-site scripting vulnerability in QES", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@qnap.com", "DATE_PUBLIC": "2020-12-23T05:49:00.000Z", "ID": "CVE-2020-2503", "STATE": "PUBLIC", "TITLE": "Stored cross-site scripting vulnerability in QES" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "QES", "version": { "version_data": [ { "platform": "build 20201006", "version_affected": "\u003c", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "QNAP Systems Inc." } ] } }, "credit": [ { "lang": "eng", "value": "TIM Security Red Team Research" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "If exploited, this stored cross-site scripting vulnerability could allow remote attackers to inject malicious code in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-749 Exposed Dangerous Method or Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17", "refsource": "MISC", "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17" } ] }, "solution": [ { "lang": "en", "value": "QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later." } ], "source": { "advisory": "QSA-20-17", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2020-2503", "datePublished": "2020-12-24T01:39:08.389271Z", "dateReserved": "2019-12-09T00:00:00", "dateUpdated": "2024-09-17T03:07:20.826Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2499
Vulnerability from cvelistv5
Published
2020-12-24 01:38
Modified
2024-09-17 03:18
Severity ?
EPSS score ?
Summary
A hard-coded password vulnerability has been reported to affect earlier versions of QES. If exploited, this vulnerability could allow attackers to log in with a hard-coded password. QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later.
References
▼ | URL | Tags |
---|---|---|
https://www.qnap.com/zh-tw/security-advisory/qsa-20-19 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
QNAP Systems Inc. | QES |
Version: unspecified < 2.1.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:09:54.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "build 20200515" ], "product": "QES", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "2.1.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Lodestone Security" } ], "datePublic": "2020-12-23T00:00:00", "descriptions": [ { "lang": "en", "value": "A hard-coded password vulnerability has been reported to affect earlier versions of QES. If exploited, this vulnerability could allow attackers to log in with a hard-coded password. QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-259", "description": "CWE-259 Use of Hard-coded Password", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798 Use of Hard-coded Credentials", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522 Insufficiently Protected Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-31T16:33:28", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-19" } ], "solutions": [ { "lang": "en", "value": "QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later." } ], "source": { "advisory": "QSA-20-19", "discovery": "EXTERNAL" }, "title": "Hard-coded Password Vulnerability in QES", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@qnap.com", "DATE_PUBLIC": "2020-12-23T05:49:00.000Z", "ID": "CVE-2020-2499", "STATE": "PUBLIC", "TITLE": "Hard-coded Password Vulnerability in QES" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "QES", "version": { "version_data": [ { "platform": "build 20200515", "version_affected": "\u003c", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "QNAP Systems Inc." } ] } }, "credit": [ { "lang": "eng", "value": "Lodestone Security" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A hard-coded password vulnerability has been reported to affect earlier versions of QES. If exploited, this vulnerability could allow attackers to log in with a hard-coded password. QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-259 Use of Hard-coded Password" } ] }, { "description": [ { "lang": "eng", "value": "CWE-798 Use of Hard-coded Credentials" } ] }, { "description": [ { "lang": "eng", "value": "CWE-522 Insufficiently Protected Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-19", "refsource": "MISC", "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-19" } ] }, "solution": [ { "lang": "en", "value": "QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later." } ], "source": { "advisory": "QSA-20-19", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2020-2499", "datePublished": "2020-12-24T01:38:14.895132Z", "dateReserved": "2019-12-09T00:00:00", "dateUpdated": "2024-09-17T03:18:12.926Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2505
Vulnerability from cvelistv5
Published
2020-12-24 01:39
Modified
2024-09-16 21:07
Severity ?
EPSS score ?
Summary
If exploited, this vulnerability could allow attackers to gain sensitive information via generation of error messages. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later.
References
▼ | URL | Tags |
---|---|---|
https://www.qnap.com/zh-tw/security-advisory/qsa-20-17 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
QNAP Systems Inc. | QES |
Version: unspecified < 2.1.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:09:54.406Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "build 20201006" ], "product": "QES", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "2.1.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "TIM Security Red Team Research" } ], "datePublic": "2020-12-23T00:00:00", "descriptions": [ { "lang": "en", "value": "If exploited, this vulnerability could allow attackers to gain sensitive information via generation of error messages. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-209", "description": "CWE-209 Information Exposure Through an Error Message", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755 Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-31T16:33:28", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17" } ], "solutions": [ { "lang": "en", "value": "QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later." } ], "source": { "advisory": "QSA-20-17", "discovery": "EXTERNAL" }, "title": "Sensitive information via generation of error messages vulnerability in QES", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@qnap.com", "DATE_PUBLIC": "2020-12-23T05:49:00.000Z", "ID": "CVE-2020-2505", "STATE": "PUBLIC", "TITLE": "Sensitive information via generation of error messages vulnerability in QES" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "QES", "version": { "version_data": [ { "platform": "build 20201006", "version_affected": "\u003c", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "QNAP Systems Inc." } ] } }, "credit": [ { "lang": "eng", "value": "TIM Security Red Team Research" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "If exploited, this vulnerability could allow attackers to gain sensitive information via generation of error messages. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-209 Information Exposure Through an Error Message" } ] }, { "description": [ { "lang": "eng", "value": "CWE-755 Improper Handling of Exceptional Conditions" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17", "refsource": "MISC", "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17" } ] }, "solution": [ { "lang": "en", "value": "QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later." } ], "source": { "advisory": "QSA-20-17", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2020-2505", "datePublished": "2020-12-24T01:39:48.218705Z", "dateReserved": "2019-12-09T00:00:00", "dateUpdated": "2024-09-16T21:07:28.461Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2504
Vulnerability from cvelistv5
Published
2020-12-24 01:39
Modified
2024-09-17 00:25
Severity ?
EPSS score ?
Summary
If exploited, this absolute path traversal vulnerability could allow attackers to traverse files in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later.
References
▼ | URL | Tags |
---|---|---|
https://www.qnap.com/zh-tw/security-advisory/qsa-20-17 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
QNAP Systems Inc. | QES |
Version: unspecified < 2.1.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:09:54.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "build 20201006" ], "product": "QES", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "2.1.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "TIM Security Red Team Research" } ], "datePublic": "2020-12-23T00:00:00", "descriptions": [ { "lang": "en", "value": "If exploited, this absolute path traversal vulnerability could allow attackers to traverse files in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-73", "description": "CWE-73 External Control of File Name or Path", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-31T16:33:28", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17" } ], "solutions": [ { "lang": "en", "value": "QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later." } ], "source": { "advisory": "QSA-20-17", "discovery": "EXTERNAL" }, "title": "Absolute path traversal vulnerability in QES", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@qnap.com", "DATE_PUBLIC": "2020-12-23T05:49:00.000Z", "ID": "CVE-2020-2504", "STATE": "PUBLIC", "TITLE": "Absolute path traversal vulnerability in QES" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "QES", "version": { "version_data": [ { "platform": "build 20201006", "version_affected": "\u003c", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "QNAP Systems Inc." } ] } }, "credit": [ { "lang": "eng", "value": "TIM Security Red Team Research" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "If exploited, this absolute path traversal vulnerability could allow attackers to traverse files in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-73 External Control of File Name or Path" } ] }, { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] }, { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17", "refsource": "MISC", "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17" } ] }, "solution": [ { "lang": "en", "value": "QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later." } ], "source": { "advisory": "QSA-20-17", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2020-2504", "datePublished": "2020-12-24T01:39:28.422487Z", "dateReserved": "2019-12-09T00:00:00", "dateUpdated": "2024-09-17T00:25:31.081Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-12-24 02:15
Modified
2024-11-21 05:25
Severity ?
2.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
2.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
2.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
Summary
If exploited, this vulnerability could allow attackers to gain sensitive information via generation of error messages. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qnap:qes:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5DBF31A-5D26-4C7D-8E69-31061FC16C6D", "versionEndExcluding": "2.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:-:*:*:*:*:*:*", "matchCriteriaId": "B075440F-4DEA-494D-AE27-1182CA4889D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200211:*:*:*:*:*:*", "matchCriteriaId": "67632014-C383-490C-B048-4DFE88AD3F30", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200303:*:*:*:*:*:*", "matchCriteriaId": "AF83A348-E7B1-4008-8313-9F28B9A9B020", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200319:*:*:*:*:*:*", "matchCriteriaId": "AAF45709-BE55-45A4-8DD1-0D3E417D8382", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200424:*:*:*:*:*:*", "matchCriteriaId": "7C956E79-D019-4AE3-BB65-9A70282CD780", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200515:*:*:*:*:*:*", "matchCriteriaId": "DB21A827-5B92-468F-9BD0-09EB3E8A2ED4", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200811:*:*:*:*:*:*", "matchCriteriaId": "DA11F0F0-236A-4A24-9AF7-DC8E78D5AA3C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "If exploited, this vulnerability could allow attackers to gain sensitive information via generation of error messages. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later." }, { "lang": "es", "value": "Si se explota, esta vulnerabilidad podr\u00eda permitir a atacantes obtener informaci\u00f3n confidencial por medio de la generaci\u00f3n de mensajes de error.\u0026#xa0;QNAP ya ha corregido estos problemas en QES versiones 2.1.1 Build 20201006 y posteriores" } ], "id": "CVE-2020-2505", "lastModified": "2024-11-21T05:25:22.497", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 1.4, "source": "security@qnapsecurity.com.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-24T02:15:12.750", "references": [ { "source": "security@qnapsecurity.com.tw", "tags": [ "Vendor Advisory" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17" } ], "sourceIdentifier": "security@qnapsecurity.com.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-209" }, { "lang": "en", "value": "CWE-755" } ], "source": "security@qnapsecurity.com.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-209" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-24 02:15
Modified
2024-11-21 05:25
Severity ?
9.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
If exploited, this stored cross-site scripting vulnerability could allow remote attackers to inject malicious code in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qnap:qes:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5DBF31A-5D26-4C7D-8E69-31061FC16C6D", "versionEndExcluding": "2.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:-:*:*:*:*:*:*", "matchCriteriaId": "B075440F-4DEA-494D-AE27-1182CA4889D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200211:*:*:*:*:*:*", "matchCriteriaId": "67632014-C383-490C-B048-4DFE88AD3F30", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200303:*:*:*:*:*:*", "matchCriteriaId": "AF83A348-E7B1-4008-8313-9F28B9A9B020", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200319:*:*:*:*:*:*", "matchCriteriaId": "AAF45709-BE55-45A4-8DD1-0D3E417D8382", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200424:*:*:*:*:*:*", "matchCriteriaId": "7C956E79-D019-4AE3-BB65-9A70282CD780", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200515:*:*:*:*:*:*", "matchCriteriaId": "DB21A827-5B92-468F-9BD0-09EB3E8A2ED4", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200811:*:*:*:*:*:*", "matchCriteriaId": "DA11F0F0-236A-4A24-9AF7-DC8E78D5AA3C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "If exploited, this stored cross-site scripting vulnerability could allow remote attackers to inject malicious code in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later." }, { "lang": "es", "value": "Si se explota, esta vulnerabilidad de tipo cross-site scripting almacenado podr\u00eda permitir a atacantes remotos inyectar c\u00f3digo malicioso en File Station.\u0026#xa0;QNAP ya ha corregido estos problemas en QES versiones 2.1.1 Build 20201006 y posteriores" } ], "id": "CVE-2020-2503", "lastModified": "2024-11-21T05:25:22.063", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "security@qnapsecurity.com.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-24T02:15:12.547", "references": [ { "source": "security@qnapsecurity.com.tw", "tags": [ "Vendor Advisory" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17" } ], "sourceIdentifier": "security@qnapsecurity.com.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" }, { "lang": "en", "value": "CWE-80" }, { "lang": "en", "value": "CWE-749" } ], "source": "security@qnapsecurity.com.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-24 02:15
Modified
2024-11-21 05:25
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
If exploited, this absolute path traversal vulnerability could allow attackers to traverse files in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qnap:qes:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5DBF31A-5D26-4C7D-8E69-31061FC16C6D", "versionEndExcluding": "2.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:-:*:*:*:*:*:*", "matchCriteriaId": "B075440F-4DEA-494D-AE27-1182CA4889D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200211:*:*:*:*:*:*", "matchCriteriaId": "67632014-C383-490C-B048-4DFE88AD3F30", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200303:*:*:*:*:*:*", "matchCriteriaId": "AF83A348-E7B1-4008-8313-9F28B9A9B020", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200319:*:*:*:*:*:*", "matchCriteriaId": "AAF45709-BE55-45A4-8DD1-0D3E417D8382", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200424:*:*:*:*:*:*", "matchCriteriaId": "7C956E79-D019-4AE3-BB65-9A70282CD780", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200515:*:*:*:*:*:*", "matchCriteriaId": "DB21A827-5B92-468F-9BD0-09EB3E8A2ED4", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200811:*:*:*:*:*:*", "matchCriteriaId": "DA11F0F0-236A-4A24-9AF7-DC8E78D5AA3C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "If exploited, this absolute path traversal vulnerability could allow attackers to traverse files in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later." }, { "lang": "es", "value": "Si se explota, esta vulnerabilidad de salto de ruta absoluta podr\u00eda permitir a atacantes saltar archivos en File Station.\u0026#xa0;QNAP ya ha corregido estos problemas en QES versiones 2.1.1 Build 20201006 y posteriores" } ], "id": "CVE-2020-2504", "lastModified": "2024-11-21T05:25:22.290", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security@qnapsecurity.com.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-24T02:15:12.657", "references": [ { "source": "security@qnapsecurity.com.tw", "tags": [ "Vendor Advisory" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-17" } ], "sourceIdentifier": "security@qnapsecurity.com.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-22" }, { "lang": "en", "value": "CWE-73" }, { "lang": "en", "value": "CWE-284" } ], "source": "security@qnapsecurity.com.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-24 02:15
Modified
2024-11-21 05:25
Severity ?
6.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A hard-coded password vulnerability has been reported to affect earlier versions of QES. If exploited, this vulnerability could allow attackers to log in with a hard-coded password. QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qnap:qes:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5DBF31A-5D26-4C7D-8E69-31061FC16C6D", "versionEndExcluding": "2.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:-:*:*:*:*:*:*", "matchCriteriaId": "B075440F-4DEA-494D-AE27-1182CA4889D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200211:*:*:*:*:*:*", "matchCriteriaId": "67632014-C383-490C-B048-4DFE88AD3F30", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200303:*:*:*:*:*:*", "matchCriteriaId": "AF83A348-E7B1-4008-8313-9F28B9A9B020", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200319:*:*:*:*:*:*", "matchCriteriaId": "AAF45709-BE55-45A4-8DD1-0D3E417D8382", "vulnerable": true }, { "criteria": "cpe:2.3:a:qnap:qes:2.1.1:build_20200424:*:*:*:*:*:*", "matchCriteriaId": "7C956E79-D019-4AE3-BB65-9A70282CD780", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A hard-coded password vulnerability has been reported to affect earlier versions of QES. If exploited, this vulnerability could allow attackers to log in with a hard-coded password. QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later." }, { "lang": "es", "value": "Se ha reportado de una vulnerabilidad de contrase\u00f1a embebida que afecta a versiones anteriores de QES.\u0026#xa0;Si es explotada, esta vulnerabilidad podr\u00eda permitir a atacantes iniciar sesi\u00f3n con una contrase\u00f1a embebida.\u0026#xa0;QNAP ya ha corregido el problema en QES versi\u00f3n 2.1.1 Build 20200515 y posteriores" } ], "id": "CVE-2020-2499", "lastModified": "2024-11-21T05:25:21.283", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 4.7, "source": "security@qnapsecurity.com.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-24T02:15:12.423", "references": [ { "source": "security@qnapsecurity.com.tw", "tags": [ "Vendor Advisory" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-19" } ], "sourceIdentifier": "security@qnapsecurity.com.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-259" }, { "lang": "en", "value": "CWE-522" }, { "lang": "en", "value": "CWE-798" } ], "source": "security@qnapsecurity.com.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }