Vulnerabilites related to QNAP - Music Station
var-202011-1202
Vulnerability from variot
If exploited, this SQL injection vulnerability could allow remote attackers to obtain application information. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.1.13; versions prior to 5.2.9; versions prior to 5.3.11. QNAP Systems TS-870 is a NAS (Network Attached Storage) device of China QNAP Systems.
A security vulnerability exists in QNAP Systems TS-870 using firmware version 4.3.4.0486. An attacker can use this vulnerability to use LIMIT and retrieve data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1202", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "music station", "scope": "lt", "trust": 1.0, "vendor": "qnap", "version": "5.2.9" }, { "model": "music station", "scope": "gte", "trust": 1.0, "vendor": "qnap", "version": "5.3.0" }, { "model": "music station", "scope": "lt", "trust": 1.0, "vendor": "qnap", "version": "5.3.11" }, { "model": "music station", "scope": "lt", "trust": 1.0, "vendor": "qnap", "version": "5.1.13" }, { "model": "music station", "scope": "gte", "trust": 1.0, "vendor": "qnap", "version": "5.2.0" }, { "model": "music station", "scope": "eq", "trust": 0.8, "vendor": "qnap", "version": "5.3.11" }, { "model": "music station", "scope": "eq", "trust": 0.8, "vendor": "qnap", "version": null }, { "model": "music station", "scope": "eq", "trust": 0.8, "vendor": "qnap", "version": "5.1.13" }, { "model": "music station", "scope": "eq", "trust": 0.8, "vendor": "qnap", "version": "5.2.9" }, { "model": "systems ts-870", "scope": "eq", "trust": 0.6, "vendor": "qnap", "version": "4.3.4.0486" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-62932" }, { "db": "JVNDB", "id": "JVNDB-2020-012822" }, { "db": "NVD", "id": "CVE-2018-19952" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Rick Ramgattie,Shaun Mirani, Joshua Meyer, and Ian Sindermann", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-923" } ], "trust": 0.6 }, "cve": "CVE-2018-19952", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-19952", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-62932", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2018-19952", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-19952", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-19952", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-19952", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-62932", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201909-923", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2018-19952", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-62932" }, { "db": "VULMON", "id": "CVE-2018-19952" }, { "db": "JVNDB", "id": "JVNDB-2020-012822" }, { "db": "CNNVD", "id": "CNNVD-201909-923" }, { "db": "NVD", "id": "CVE-2018-19952" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "If exploited, this SQL injection vulnerability could allow remote attackers to obtain application information. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.1.13; versions prior to 5.2.9; versions prior to 5.3.11. QNAP Systems TS-870 is a NAS (Network Attached Storage) device of China QNAP Systems. \n\r\n\r\nA security vulnerability exists in QNAP Systems TS-870 using firmware version 4.3.4.0486. An attacker can use this vulnerability to use LIMIT and retrieve data", "sources": [ { "db": "NVD", "id": "CVE-2018-19952" }, { "db": "JVNDB", "id": "JVNDB-2020-012822" }, { "db": "CNVD", "id": "CNVD-2020-62932" }, { "db": "VULMON", "id": "CVE-2018-19952" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-19952", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2020-012822", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-62932", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201909-923", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2018-19952", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-62932" }, { "db": "VULMON", "id": "CVE-2018-19952" }, { "db": "JVNDB", "id": "JVNDB-2020-012822" }, { "db": "CNNVD", "id": "CNNVD-201909-923" }, { "db": "NVD", "id": "CVE-2018-19952" } ] }, "id": "VAR-202011-1202", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-62932" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-62932" } ] }, "last_update_date": "2024-11-23T21:35:07.710000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "QSA-20-10", "trust": 0.8, "url": "https://www.qnap.com/en/security-advisory/qsa-20-10" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-012822" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-80", "trust": 1.0 }, { "problemtype": "CWE-89", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "CWE-943", "trust": 1.0 }, { "problemtype": "SQL injection (CWE-89) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-012822" }, { "db": "NVD", "id": "CVE-2018-19952" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://www.qnap.com/en/security-advisory/qsa-20-10" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19952" }, { "trust": 0.6, "url": "https://www.securityevaluators.com/whitepaper/sohopelessly-broken-2/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/89.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-62932" }, { "db": "VULMON", "id": "CVE-2018-19952" }, { "db": "JVNDB", "id": "JVNDB-2020-012822" }, { "db": "CNNVD", "id": "CNNVD-201909-923" }, { "db": "NVD", "id": "CVE-2018-19952" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-62932" }, { "db": "VULMON", "id": "CVE-2018-19952" }, { "db": "JVNDB", "id": "JVNDB-2020-012822" }, { "db": "CNNVD", "id": "CNNVD-201909-923" }, { "db": "NVD", "id": "CVE-2018-19952" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-13T00:00:00", "db": "CNVD", "id": "CNVD-2020-62932" }, { "date": "2020-11-02T00:00:00", "db": "VULMON", "id": "CVE-2018-19952" }, { "date": "2021-06-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-012822" }, { "date": "2019-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-923" }, { "date": "2020-11-02T16:15:13.193000", "db": "NVD", "id": "CVE-2018-19952" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-13T00:00:00", "db": "CNVD", "id": "CNVD-2020-62932" }, { "date": "2020-11-04T00:00:00", "db": "VULMON", "id": "CVE-2018-19952" }, { "date": "2021-06-04T07:39:00", "db": "JVNDB", "id": "JVNDB-2020-012822" }, { "date": "2020-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-923" }, { "date": "2024-11-21T03:58:52.637000", "db": "NVD", "id": "CVE-2018-19952" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-923" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "QNAP Systems TS-870 SQL injection vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2020-62932" }, { "db": "CNNVD", "id": "CNNVD-201909-923" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SQL injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-923" } ], "trust": 0.6 } }
var-202011-1207
Vulnerability from variot
If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.1.13; versions prior to 5.2.9; versions prior to 5.3.11. Music Station Exists in a cross-site scripting vulnerability.Information may be obtained and tampered with. QNAP Systems TS-870 is a NAS (Network Attached Storage) device of China QNAP Systems. The vulnerability stems from the lack of correct verification of client data in the WEB application. An attacker can use this vulnerability to execute client code
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1207", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "music station", "scope": "lt", "trust": 1.0, "vendor": "qnap", "version": "5.2.9" }, { "model": "music station", "scope": "gte", "trust": 1.0, "vendor": "qnap", "version": "5.3.0" }, { "model": "music station", "scope": "lt", "trust": 1.0, "vendor": "qnap", "version": "5.3.11" }, { "model": "music station", "scope": "lt", "trust": 1.0, "vendor": "qnap", "version": "5.1.13" }, { "model": "music station", "scope": "gte", "trust": 1.0, "vendor": "qnap", "version": "5.2.0" }, { "model": "music station", "scope": "eq", "trust": 0.8, "vendor": "qnap", "version": "5.1.13" }, { "model": "music station", "scope": "eq", "trust": 0.8, "vendor": "qnap", "version": "5.2.9" }, { "model": "music station", "scope": "eq", "trust": 0.8, "vendor": "qnap", "version": "5.3.11" }, { "model": "systems ts-870", "scope": "eq", "trust": 0.6, "vendor": "qnap", "version": "4.3.4.0486" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-62933" }, { "db": "JVNDB", "id": "JVNDB-2018-016470" }, { "db": "NVD", "id": "CVE-2018-19951" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:qnap:music_station", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016470" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Rick Ramgattie,Shaun Mirani, Joshua Meyer, and Ian Sindermann", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-925" } ], "trust": 0.6 }, "cve": "CVE-2018-19951", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2018-19951", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2018-016470", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2020-62933", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2018-19951", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-016470", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-19951", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2018-016470", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-62933", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201909-925", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-19951", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-62933" }, { "db": "VULMON", "id": "CVE-2018-19951" }, { "db": "JVNDB", "id": "JVNDB-2018-016470" }, { "db": "CNNVD", "id": "CNNVD-201909-925" }, { "db": "NVD", "id": "CVE-2018-19951" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.1.13; versions prior to 5.2.9; versions prior to 5.3.11. Music Station Exists in a cross-site scripting vulnerability.Information may be obtained and tampered with. QNAP Systems TS-870 is a NAS (Network Attached Storage) device of China QNAP Systems. The vulnerability stems from the lack of correct verification of client data in the WEB application. An attacker can use this vulnerability to execute client code", "sources": [ { "db": "NVD", "id": "CVE-2018-19951" }, { "db": "JVNDB", "id": "JVNDB-2018-016470" }, { "db": "CNVD", "id": "CNVD-2020-62933" }, { "db": "VULMON", "id": "CVE-2018-19951" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-19951", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2018-016470", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-62933", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201909-925", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2018-19951", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-62933" }, { "db": "VULMON", "id": "CVE-2018-19951" }, { "db": "JVNDB", "id": "JVNDB-2018-016470" }, { "db": "CNNVD", "id": "CNNVD-201909-925" }, { "db": "NVD", "id": "CVE-2018-19951" } ] }, "id": "VAR-202011-1207", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-62933" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-62933" } ] }, "last_update_date": "2024-11-23T22:20:59.617000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "QSA-20-10", "trust": 0.8, "url": "https://www.qnap.com/en/security-advisory/qsa-20-10" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2018-19951 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-19951" }, { "db": "JVNDB", "id": "JVNDB-2018-016470" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.8 }, { "problemtype": "CWE-80", "trust": 1.0 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016470" }, { "db": "NVD", "id": "CVE-2018-19951" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://www.qnap.com/en/security-advisory/qsa-20-10" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19951" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19951" }, { "trust": 0.6, "url": "https://www.securityevaluators.com/whitepaper/sohopelessly-broken-2/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/79.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2018-19951" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-62933" }, { "db": "VULMON", "id": "CVE-2018-19951" }, { "db": "JVNDB", "id": "JVNDB-2018-016470" }, { "db": "CNNVD", "id": "CNNVD-201909-925" }, { "db": "NVD", "id": "CVE-2018-19951" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-62933" }, { "db": "VULMON", "id": "CVE-2018-19951" }, { "db": "JVNDB", "id": "JVNDB-2018-016470" }, { "db": "CNNVD", "id": "CNNVD-201909-925" }, { "db": "NVD", "id": "CVE-2018-19951" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-13T00:00:00", "db": "CNVD", "id": "CNVD-2020-62933" }, { "date": "2020-11-02T00:00:00", "db": "VULMON", "id": "CVE-2018-19951" }, { "date": "2020-11-30T06:10:21", "db": "JVNDB", "id": "JVNDB-2018-016470" }, { "date": "2019-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-925" }, { "date": "2020-11-02T16:15:13.100000", "db": "NVD", "id": "CVE-2018-19951" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-13T00:00:00", "db": "CNVD", "id": "CNVD-2020-62933" }, { "date": "2022-11-16T00:00:00", "db": "VULMON", "id": "CVE-2018-19951" }, { "date": "2020-11-30T06:10:21", "db": "JVNDB", "id": "JVNDB-2018-016470" }, { "date": "2020-11-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-925" }, { "date": "2024-11-21T03:58:52.500000", "db": "NVD", "id": "CVE-2018-19951" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-925" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "QNAP Systems TS-870 cross-site scripting vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2020-62933" }, { "db": "CNNVD", "id": "CNNVD-201909-925" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-925" } ], "trust": 0.6 } }
var-202011-1206
Vulnerability from variot
If exploited, this command injection vulnerability could allow remote attackers to execute arbitrary commands. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.1.13; versions prior to 5.2.9; versions prior to 5.3.11. QNAP Music Station Has OS There are command injection vulnerabilities and command injection vulnerabilities.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. QNAP Systems TS-870 is a NAS (Network Attached Storage) device of China QNAP Systems.
The UserName of the Music Station that uses the file upload function of QNAP Systems TS-870 with firmware version 4.3.4.0486 has a command injection vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1206", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "music station", "scope": "lt", "trust": 1.0, "vendor": "qnap", "version": "5.2.9" }, { "model": "music station", "scope": "gte", "trust": 1.0, "vendor": "qnap", "version": "5.3.0" }, { "model": "music station", "scope": "lt", "trust": 1.0, "vendor": "qnap", "version": "5.3.11" }, { "model": "music station", "scope": "lt", "trust": 1.0, "vendor": "qnap", "version": "5.1.13" }, { "model": "music station", "scope": "gte", "trust": 1.0, "vendor": "qnap", "version": "5.2.0" }, { "model": "music station", "scope": "eq", "trust": 0.8, "vendor": "qnap", "version": "5.3.11" }, { "model": "music station", "scope": "eq", "trust": 0.8, "vendor": "qnap", "version": null }, { "model": "music station", "scope": "eq", "trust": 0.8, "vendor": "qnap", "version": "5.2.9" }, { "model": "music station", "scope": "eq", "trust": 0.8, "vendor": "qnap", "version": "5.1.13" }, { "model": "systems ts-870", "scope": "eq", "trust": 0.6, "vendor": "qnap", "version": "4.3.4.0486" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-62934" }, { "db": "JVNDB", "id": "JVNDB-2018-016514" }, { "db": "NVD", "id": "CVE-2018-19950" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Rick Ramgattie,Shaun Mirani, Joshua Meyer, and Ian Sindermann", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-926" } ], "trust": 0.6 }, "cve": "CVE-2018-19950", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-19950", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-62934", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2018-19950", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-19950", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-19950", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2018-19950", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-62934", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201909-926", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2018-19950", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-62934" }, { "db": "VULMON", "id": "CVE-2018-19950" }, { "db": "JVNDB", "id": "JVNDB-2018-016514" }, { "db": "CNNVD", "id": "CNNVD-201909-926" }, { "db": "NVD", "id": "CVE-2018-19950" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "If exploited, this command injection vulnerability could allow remote attackers to execute arbitrary commands. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.1.13; versions prior to 5.2.9; versions prior to 5.3.11. QNAP Music Station Has OS There are command injection vulnerabilities and command injection vulnerabilities.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. QNAP Systems TS-870 is a NAS (Network Attached Storage) device of China QNAP Systems. \n\r\n\r\nThe UserName of the Music Station that uses the file upload function of QNAP Systems TS-870 with firmware version 4.3.4.0486 has a command injection vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2018-19950" }, { "db": "JVNDB", "id": "JVNDB-2018-016514" }, { "db": "CNVD", "id": "CNVD-2020-62934" }, { "db": "VULMON", "id": "CVE-2018-19950" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-19950", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2018-016514", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-62934", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201909-926", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2018-19950", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-62934" }, { "db": "VULMON", "id": "CVE-2018-19950" }, { "db": "JVNDB", "id": "JVNDB-2018-016514" }, { "db": "CNNVD", "id": "CNNVD-201909-926" }, { "db": "NVD", "id": "CVE-2018-19950" } ] }, "id": "VAR-202011-1206", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-62934" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-62934" } ] }, "last_update_date": "2024-11-23T23:01:11.826000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "QSA-20-10", "trust": 0.8, "url": "https://www.qnap.com/en/security-advisory/qsa-20-10" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016514" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-77", "trust": 1.0 }, { "problemtype": "CWE-78", "trust": 1.0 }, { "problemtype": "Command injection (CWE-77) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "OS Command injection (CWE-78) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016514" }, { "db": "NVD", "id": "CVE-2018-19950" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://www.qnap.com/en/security-advisory/qsa-20-10" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19950" }, { "trust": 0.6, "url": "https://www.securityevaluators.com/whitepaper/sohopelessly-broken-2/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/78.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/77.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-62934" }, { "db": "VULMON", "id": "CVE-2018-19950" }, { "db": "JVNDB", "id": "JVNDB-2018-016514" }, { "db": "CNNVD", "id": "CNNVD-201909-926" }, { "db": "NVD", "id": "CVE-2018-19950" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-62934" }, { "db": "VULMON", "id": "CVE-2018-19950" }, { "db": "JVNDB", "id": "JVNDB-2018-016514" }, { "db": "CNNVD", "id": "CNNVD-201909-926" }, { "db": "NVD", "id": "CVE-2018-19950" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-13T00:00:00", "db": "CNVD", "id": "CNVD-2020-62934" }, { "date": "2020-11-02T00:00:00", "db": "VULMON", "id": "CVE-2018-19950" }, { "date": "2021-05-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016514" }, { "date": "2019-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-926" }, { "date": "2020-11-02T16:15:13.020000", "db": "NVD", "id": "CVE-2018-19950" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-13T00:00:00", "db": "CNVD", "id": "CNVD-2020-62934" }, { "date": "2020-11-02T00:00:00", "db": "VULMON", "id": "CVE-2018-19950" }, { "date": "2021-05-31T07:26:00", "db": "JVNDB", "id": "JVNDB-2018-016514" }, { "date": "2020-11-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-926" }, { "date": "2024-11-21T03:58:52.370000", "db": "NVD", "id": "CVE-2018-19950" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-926" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "QNAP\u00a0Music\u00a0Station\u00a0 In \u00a0OS\u00a0 Command injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016514" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "command injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-926" } ], "trust": 0.6 } }
CVE-2018-0718 (GCVE-0-2018-0718)
Vulnerability from cvelistv5
- Command Injection
▼ | URL | Tags |
---|---|---|
https://www.qnap.com/zh-tw/security-advisory/nas-201809-14 | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
QNAP | Music Station |
Version: 5.1.2 and earlier versions in QTS 4.3.3 and 4.3.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:35:49.370Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qnap.com/zh-tw/security-advisory/nas-201809-14" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Music Station", "vendor": "QNAP", "versions": [ { "status": "affected", "version": "5.1.2 and earlier versions in QTS 4.3.3 and 4.3.4" } ] } ], "datePublic": "2018-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Command injection vulnerability in Music Station 5.1.2 and earlier versions in QNAP QTS 4.3.3 and 4.3.4 could allow remote attackers to run arbitrary commands in the compromised application." } ], "problemTypes": [ { "descriptions": [ { "description": "Command Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-14T12:57:02", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qnap.com/zh-tw/security-advisory/nas-201809-14" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@qnap.com", "DATE_PUBLIC": "2018-09-14T00:00:00", "ID": "CVE-2018-0718", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Music Station", "version": { "version_data": [ { "version_value": "5.1.2 and earlier versions in QTS 4.3.3 and 4.3.4" } ] } } ] }, "vendor_name": "QNAP" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Command injection vulnerability in Music Station 5.1.2 and earlier versions in QNAP QTS 4.3.3 and 4.3.4 could allow remote attackers to run arbitrary commands in the compromised application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qnap.com/zh-tw/security-advisory/nas-201809-14", "refsource": "CONFIRM", "url": "https://www.qnap.com/zh-tw/security-advisory/nas-201809-14" } ] } } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2018-0718", "datePublished": "2018-09-14T13:00:00Z", "dateReserved": "2017-11-28T00:00:00", "dateUpdated": "2024-09-16T20:12:02.881Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }