Show plain JSON{"containers": {"cna": {"affected": [{"platforms": ["build 20200410"], "product": "QTS", "vendor": "QNAP Systems Inc.", "versions": [{"lessThan": "4.4.2.1270", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"platforms": ["build 20200330"], "product": "QTS", "vendor": "QNAP Systems Inc.", "versions": [{"lessThan": "4.4.1.1261", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "4.3.6.1263", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"platforms": ["build 20200408"], "product": "QTS", "vendor": "QNAP Systems Inc.", "versions": [{"lessThan": "4.3.4.1282", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"platforms": ["build 20200409"], "product": "QTS", "vendor": "QNAP Systems Inc.", "versions": [{"lessThan": "4.3.3.1252", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"platforms": ["build 20200421"], "product": "QTS", "vendor": "QNAP Systems Inc.", "versions": [{"lessThan": "4.2.6", "status": "affected", "version": "unspecified", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Independent Security Evaluators"}], "descriptions": [{"lang": "en", "value": "If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed these issues in the following QTS versions. QTS 4.4.2.1270 build 20200410 and later QTS 4.4.1.1261 build 20200330 and later QTS 4.3.6.1263 build 20200330 and later QTS 4.3.4.1282 build 20200408 and later QTS 4.3.3.1252 build 20200409 and later QTS 4.2.6 build 20200421 and later"}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE"}]}, {"descriptions": [{"cweId": "CWE-80", "description": "CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2020-10-28T17:55:18.000Z", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-01"}], "source": {"discovery": "EXTERNAL"}, "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security@qnap.com", "ID": "CVE-2018-19943", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "QTS", "version": {"version_data": [{"platform": "build 20200410", "version_affected": "<", "version_value": "4.4.2.1270"}, {"platform": "build 20200330", "version_affected": "<", "version_value": "4.4.1.1261"}, {"platform": "build 20200330", "version_affected": "<", "version_value": "4.3.6.1263"}, {"platform": "build 20200408", "version_affected": "<", "version_value": "4.3.4.1282"}, {"platform": "build 20200409", "version_affected": "<", "version_value": "4.3.3.1252"}, {"platform": "build 20200421", "version_affected": "<", "version_value": "4.2.6"}]}}]}, "vendor_name": "QNAP Systems Inc."}]}}, "credit": [{"lang": "eng", "value": "Independent Security Evaluators"}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed these issues in the following QTS versions. QTS 4.4.2.1270 build 20200410 and later QTS 4.4.1.1261 build 20200330 and later QTS 4.3.6.1263 build 20200330 and later QTS 4.3.4.1282 build 20200408 and later QTS 4.3.3.1252 build 20200409 and later QTS 4.2.6 build 20200421 and later"}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)"}]}, {"description": [{"lang": "eng", "value": "CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)"}]}]}, "references": {"reference_data": [{"name": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-01", "refsource": "MISC", "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-01"}]}, "source": {"discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-05T11:51:17.797Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-20-01"}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2018-19943", "role": "CISA Coordinator", "options": [{"Exploitation": "active"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "version": "2.0.3", "timestamp": "2025-02-06T20:40:22.725202Z"}}}, {"other": {"type": "kev", "content": {"dateAdded": "2022-05-24", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2018-19943"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-02-06T20:44:22.691Z"}}]}, "cveMetadata": {"assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2018-19943", "datePublished": "2020-10-28T17:55:18.000Z", "dateReserved": "2018-12-07T00:00:00.000Z", "dateUpdated": "2025-02-06T20:44:22.691Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}