{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T21:12:39.560","vulnerabilities":[{"cve":{"id":"CVE-2020-2496","sourceIdentifier":"security@qnapsecurity.com.tw","published":"2020-12-10T04:15:11.923","lastModified":"2024-11-21T05:25:20.680","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code in File Station. QANP have already fixed these vulnerabilities in the following versions of QTS and QuTS hero. QuTS hero h4.5.1.1472 build 20201031 and later QTS 4.5.1.1456 build 20201015 and later QTS 4.4.3.1354 build 20200702 and later QTS 4.3.6.1333 build 20200608 and later QTS 4.3.4.1368 build 20200703 and later QTS 4.3.3.1315 build 20200611 and later QTS 4.2.6 build 20200611 and later"},{"lang":"es","value":"Si era explotada, esta vulnerabilidad de tipo cross-site scripting podría permitir a atacantes remotos inyectar código malicioso en File Station.&#xa0;QNAP ya ha corregido estas vulnerabilidades en las siguientes versiones de QTS y QuTS hero.&#xa0;QuTS hero versión h4.5.1.1472 build 20201031 y posterior, QTS versión 4.5.1.1456 build 20201015 y posterior, QTS versión 4.4.3.1354 build 20200702 y posterior, QTS versión 4.3.6.1333 build 20200608 y posterior, QTS versión 4.3.4.1368 build 20200703 y posterior, QTS versión 4.3.3.1315 build 20200611 y posterior, QTS versión 4.2.6 build 20200611 y posterior"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security@qnapsecurity.com.tw","type":"Secondary","description":[{"lang":"en","value":"CWE-79"},{"lang":"en","value":"CWE-80"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.1.1472","matchCriteriaId":"ACABFEAE-2A93-4E81-9F73-706FEE68C1DF"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.1.1456","matchCriteriaId":"0DF58F11-5E71-4EFB-8039-B4EA21C2C810"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*","versionEndExcluding":"4.4.3.1354","matchCriteriaId":"5C993531-A910-4F15-ABD3-31261D560C76"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*","versionEndExcluding":"4.3.6.1333","matchCriteriaId":"CED08145-C2CF-484B-B66D-5469591040E8"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*","versionEndExcluding":"4.3.4.1368","matchCriteriaId":"BA15CC08-00FA-4682-8DD9-0B1AF10E40E7"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*","versionEndExcluding":"4.3.3.1315","matchCriteriaId":"87533C7A-38F8-4487-A753-EBB911F2A76C"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*","versionEndExcluding":"4.2.6","matchCriteriaId":"3777F6CC-9189-4BC0-B336-62BA1EFB91A7"}]}]}],"references":[{"url":"https://www.qnap.com/en/security-advisory/qsa-20-12","source":"security@qnapsecurity.com.tw","tags":["Vendor Advisory"]},{"url":"https://www.qnap.com/en/security-advisory/qsa-20-12","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}