{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T19:03:29.168","vulnerabilities":[{"cve":{"id":"CVE-2021-28805","sourceIdentifier":"security@qnapsecurity.com.tw","published":"2021-06-11T07:15:06.593","lastModified":"2024-11-21T06:00:14.223","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Inclusion of sensitive information in the source code has been reported to affect certain QNAP switches running QSS. If exploited, this vulnerability allows attackers to read application data. This issue affects: QNAP Systems Inc. QSS versions prior to 1.0.3 build 20210505 on QSW-M2108-2C; versions prior to 1.0.3 build 20210505 on QSW-M2108-2S; versions prior to 1.0.3 build 20210505 on QSW-M2108R-2C; versions prior to 1.0.12 build 20210506 on QSW-M408."},{"lang":"es","value":"Se ha reportado la inclusión de información confidencial en el código fuente que afecta a determinados switches de QNAP que ejecutan QSS. Si es explotada, esta vulnerabilidad permite a atacantes leer datos de la aplicación. Este problema afecta: QNAP Systems Inc. QSS versiones anteriores a 1.0.3 build 20210505 en QSW-M2108-2C; versiones anteriores a 1.0.3 build 20210505 en QSW-M2108-2S; versiones anteriores a 1.0.3 build 20210505 en QSW-M2108R-2C; versiones anteriores a 1.0.12 build 20210506 en QSW-M408"}],"metrics":{"cvssMetricV31":[{"source":"security@qnapsecurity.com.tw","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security@qnapsecurity.com.tw","type":"Secondary","description":[{"lang":"en","value":"CWE-540"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qnap:qss:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.3","matchCriteriaId":"74B6E008-6B5D-48EB-99B4-DB9BC1120F8E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qnap:qsw-m2108-2c:-:*:*:*:*:*:*:*","matchCriteriaId":"A690794E-3F9B-47DA-A365-E8F100C730E2"},{"vulnerable":false,"criteria":"cpe:2.3:h:qnap:qsw-m2108-2s:-:*:*:*:*:*:*:*","matchCriteriaId":"21692724-A864-4CEB-898C-4E6691C403C1"},{"vulnerable":false,"criteria":"cpe:2.3:h:qnap:qsw-m2108r-2c:-:*:*:*:*:*:*:*","matchCriteriaId":"37F5E9FC-2CE2-473F-81C1-676BCCFFBD3D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qnap:qss:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.12","matchCriteriaId":"4D07C936-1C05-4269-8DC9-9AF534B5177B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qnap:qsw-m408:-:*:*:*:*:*:*:*","matchCriteriaId":"9D7605B1-0C50-4CF5-81A8-61FE897DA748"}]}]}],"references":[{"url":"https://www.qnap.com/zh-tw/security-advisory/qsa-21-24","source":"security@qnapsecurity.com.tw","tags":["Vendor Advisory"]},{"url":"https://www.qnap.com/zh-tw/security-advisory/qsa-21-24","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}