Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2020-2503
Analyzed
More InfoOfficial Page
Source-security@qnapsecurity.com.tw
View Known Exploited Vulnerability (KEV) details
Published At-24 Dec, 2020 | 02:15
Updated At-28 Dec, 2020 | 15:33

If exploited, this stored cross-site scripting vulnerability could allow remote attackers to inject malicious code in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.4MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Secondary3.19.0CRITICAL
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Primary2.03.5LOW
AV:N/AC:M/Au:S/C:N/I:P/A:N
CPE Matches

QNAP Systems, Inc.
qnap
>>qes>>Versions before 2.1.1(exclusive)
cpe:2.3:a:qnap:qes:*:*:*:*:*:*:*:*
QNAP Systems, Inc.
qnap
>>qes>>2.1.1
cpe:2.3:a:qnap:qes:2.1.1:-:*:*:*:*:*:*
QNAP Systems, Inc.
qnap
>>qes>>2.1.1
cpe:2.3:a:qnap:qes:2.1.1:build_20200211:*:*:*:*:*:*
QNAP Systems, Inc.
qnap
>>qes>>2.1.1
cpe:2.3:a:qnap:qes:2.1.1:build_20200303:*:*:*:*:*:*
QNAP Systems, Inc.
qnap
>>qes>>2.1.1
cpe:2.3:a:qnap:qes:2.1.1:build_20200319:*:*:*:*:*:*
QNAP Systems, Inc.
qnap
>>qes>>2.1.1
cpe:2.3:a:qnap:qes:2.1.1:build_20200424:*:*:*:*:*:*
QNAP Systems, Inc.
qnap
>>qes>>2.1.1
cpe:2.3:a:qnap:qes:2.1.1:build_20200515:*:*:*:*:*:*
QNAP Systems, Inc.
qnap
>>qes>>2.1.1
cpe:2.3:a:qnap:qes:2.1.1:build_20200811:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarynvd@nist.gov
CWE-749Secondarysecurity@qnapsecurity.com.tw
CWE-79Secondarysecurity@qnapsecurity.com.tw
CWE-80Secondarysecurity@qnapsecurity.com.tw
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.qnap.com/zh-tw/security-advisory/qsa-20-17security@qnapsecurity.com.tw
Vendor Advisory
Change History
0Changes found

Details not found