JVNDB RSS Feed - New Entry
https://jvndb.jvn.jp/en/
JVN iPedia New Entry2024-11-23T17:00:41+09:002024-11-23T17:00:41+09:00Multiple vulnerabilities in Edgecross Basic Software for Windows
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-013260.html
Edgecross Basic Software for Windows provided by Edgecross Consortium contains multiple vulnerabilities listed below.
* Incorrect default permissions (CWE-276) - CVE-2024-4229
* External control of file name or path (CWE-73) - CVE-2024-4230
Edgecross Consortium reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2024-013260https://jvn.jp/en/vu/JVNVU92857077/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-4229https://www.cve.org/CVERecord?id=CVE-2024-4230https://cwe.mitre.org/data/definitions/276.htmlhttps://cwe.mitre.org/data/definitions/73.htmlcpe:/a:misc:edgecross_ecp-bs1-wcpe:/a:misc:edgecross_ecp-bs1-w-d2024-11-22T10:59+09:002024-11-22T10:59+09:002024-11-22T10:59+09:00"Kura Sushi Official App Produced by EPARK" for Android uses a hard-coded cryptographic key
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000120.html
"Kura Sushi Official App Produced by EPARK" for Android provided by EPARK, Inc. uses a hard-coded cryptographic key (CWE-321).
Nishimura Reiji of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000120https://jvn.jp/en/jp/JVN16114985/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-52614https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html2024-11-20T13:56+09:002024-11-20T13:56+09:002024-11-20T13:56+09:00Multiple vulnerabilities in Rakuten Turbo 5G
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-012941.html
Rakuten Turbo 5G provided by Rakuten Mobile, Inc. contains multiple vulnerabilities listed below.
* Missing authentication for critical function (CWE-306) - CVE-2024-47865
* OS command injection (CWE-78) - CVE-2024-48895
* Exposure of sensitive system information to an unauthorized control sphere (CWE-497) - CVE-2024-52033
Samy Younsi of NeroTeam Security Labs reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
JVNDB-2024-012941https://jvn.jp/en/vu/JVNVU90667116/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-47865https://www.cve.org/CVERecord?id=CVE-2024-48895https://www.cve.org/CVERecord?id=CVE-2024-52033https://cwe.mitre.org/data/definitions/306.htmlhttps://cwe.mitre.org/data/definitions/497.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:rakuten:rakuten_turbo_5g2024-11-19T10:41+09:002024-11-19T10:41+09:002024-11-19T10:41+09:00Multiple vulnerabilities in FitNesse
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000119.html
FitNesse provided by unclebob contains multiple vulnerabilities listed below.
<ul><li>Cross-site scripting (CWE-79) - CVE-2024-39610</li>
<li>Path traversal (CWE-22) - CVE-2024-42499</li></ul>
Takeshi Kaneko of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000119https://jvn.jp/en/jp/JVN36791327/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-39610https://www.cve.org/CVERecord?id=CVE-2024-42499https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:fitnesse:fitnesse2024-11-20T11:18+09:002024-11-15T13:37+09:002024-11-20T11:18+09:00Multiple vulnerabilities in SoftBank Mesh Wi-Fi router RP562B
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-012461.html
Mesh Wi-Fi router RP562B provided by SoftBank Corp. contains multiple vulnerabilities listed below.
* Active debug code (CWE-489) - CVE-2024-29075
* OS command injection (CWE-78) - CVE-2024-45827
* Exposure of sensitive system information to an unauthorized control sphere (CWE-497) - CVE-2024-47799
Samy Younsi of NeroTeam Security Labs reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-012461https://jvn.jp/en/vu/JVNVU90676195/https://www.cve.org/CVERecord?id=CVE-2024-29075https://www.cve.org/CVERecord?id=CVE-2024-45827https://www.cve.org/CVERecord?id=CVE-2024-47799https://cwe.mitre.org/data/definitions/489.htmlhttps://cwe.mitre.org/data/definitions/497.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:softbank:mesh_wi-fi_router2024-11-13T14:26+09:002024-11-13T14:26+09:002024-11-13T14:26+09:00WordPress Plugin "VK All in One Expansion Unit" vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000118.html
"Custom Alert Content" of WordPress Plugin "VK All in One Expansion Unit" provided by Vektor,Inc. contains a stored cross-site scripting vulnerability (CWE-79).
Umeda Yuugo of Tokyo Denki University reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000118https://jvn.jp/en/jp/JVN05136799/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-52268https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:vektor-inc:vk_all_in_one_expansion_unit2024-11-13T13:50+09:002024-11-13T13:50+09:002024-11-13T13:50+09:00Trend Micro Deep Security 20 Agent for Windows vulnerable to improper access control
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-012017.html
Trend Micro Incorporated has released a security update for Deep Security 20 Agent (for Windows) to fix a improper access control vulnerability (CVE-2024-48903).
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.JVNDB-2024-012017https://jvn.jp/en/vu/JVNVU96058081/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-48903cpe:/a:trendmicro:deep_security_agent2024-11-06T11:00+09:002024-11-06T11:00+09:002024-11-06T11:00+09:00Incorrect authorization vulnerability in OMRON Sysmac Studio
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-011833.html
Sysmac Studio provided by OMRON Corporation contains an incorrect authorization vulnerability (CWE-863, CVE-2024-49501).
OMRON Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC coordinated with OMRON Corporation for the JVN advisory publication.JVNDB-2024-011833https://jvn.jp/en/vu/JVNVU95685374/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-49501https://cwe.mitre.org/data/definitions/863.htmlcpe:/a:omron:sysmac-se22024-11-05T15:29+09:002024-11-05T15:29+09:002024-11-05T15:29+09:00Command injection vulnerability in Trend Micro Cloud Edge
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-011747.html
Trend Micro Incorporated has released a security update for Cloud Edge to fix a command injection vulnerability (CVE-2024-48904).
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.JVNDB-2024-011747https://jvn.jp/en/vu/JVNVU94153896/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-48904cpe:/a:trendmicro:cloud_edge2024-11-01T14:28+09:002024-11-01T14:28+09:002024-11-01T14:28+09:00REST-APIs unintentionally enabled in Century Systems FutureNet NXR series routers
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-011744.html
FutureNet NXR series routers provided by Century Systems Co., Ltd. have REST-APIs, which are configured as disabled in the initial (factory default) configuration.
But, REST-APIs are unexpectedly enabled when the affected product is powered up, provided either http-server (GUI) or Web authentication is enabled (CWE-684).
The factory default configuration makes http-server (GUI) enabled, which means REST-APIs are also enabled.
The username and the password for REST-APIs are configured in the factory default configuration.
Century Systems Co., Ltd. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.JVNDB-2024-011744https://jvn.jp/en/vu/JVNVU95001899/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-50357https://cwe.mitre.org/data/definitions/684.htmlcpe:/o:centurysys:futurenet_nxr-g050cpe:/o:centurysys:futurenet_nxr-g060cpe:/o:centurysys:futurenet_nxr-g1102024-11-01T13:49+09:002024-11-01T13:49+09:002024-11-01T13:49+09:00Stack-based buffer overflow vulnerability in multiple Ricoh laser printers and MFPs which implement Web Image Monitor
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000117.html
Web Image Monitor provided by Ricoh Company, Ltd. is an web server included and runs in Ricoh laser printers and MFPs (multifunction printers). Web Image Monitor contains a stack-based buffer overflow vulnerability (CWE-121) due to inappropriate parsing process of HTTP request.
Zhihong Tian, Hui Lu, Guocheng Wu, and Xingchi Chen of the Cyberspace Advanced Technology Institute of Guangzhou University reported this vulnerability to Ricoh Company, Ltd. directly and coordinated.
After the coordination, Ricoh Company, Ltd. reported this case to IPA under Information Security Early Warning Partnership, and JPCERT/CC coordinated with Ricoh Company, Ltd. for JVN publication.JVNDB-2024-000117https://jvn.jp/en/jp/JVN87770340/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-47939https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ricoh:web_image_monitor2024-10-31T16:44+09:002024-10-31T16:44+09:002024-10-31T16:44+09:00Hikvision network camera security enhancement to prevent cleartext transmission of Dynamic DNS credentials
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000116.html
Multiple network cameras provided by Hangzhou Hikvision Digital Technology Co., Ltd. support two Dynamic DNS services, DynDNS and NO-IP.The user can select which to use on the GUI configuration page.
Both the services provide their APIs accessible via HTTP and HTTPS, but old firmware versions of Hikvision devices only support HTTP.This means the credential information is transmitted in unencrypted form.
As a security enhancement, the new firmware versions are provided, which change the behavior to communicate with the APIs via HTTPS only.JVNDB-2024-000116https://jvn.jp/en/jp/JVN11779839/index.html2024-10-30T15:07+09:002024-10-30T15:07+09:002024-10-30T15:07+09:00Multiple vulnerabilities in Sharp and Toshiba Tec MFPs
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-011256.html
MFPs (multifunction printers) provided by Sharp and Toshiba Tec Corporation contain multiple vulnerabilites listed below.
<ul>
<li>Out-of-bounds Read (CWE-125)
<ul>
<li>CVE-2024-42420</li>
<li>Out-of-bounds read vulnerabilities coming from improper processing of keyword search input and improper processing of SOAP messages</li>
</ul>
</li>
<li>Out-of-bounds Read (CWE-125)
<ul>
<li>CVE-2024-43424</li>
<li>Out-of-bounds read vulnerability coming from improper processing of HTTP request headers</li>
</ul>
</li>
<li>Out-of-bounds Read (CWE-125)
<ul>
<li>CVE-2024-45829</li>
<li>Out-of-bounds read vulnerability in the web page providing data downloading, where query parameters in HTTP requests are improperly processed</li>
</ul>
</li>
<li>Path traversal (CWE-22)
<ul>
<li>CVE-2024-45842</li>
<li>Improper processing of URI data in HTTP PUT requests leads to path traversal vulnerability, unintended internal files may be retrieved</li>
</ul>
</li>
<li>Improper access restriction on some configuration related APIs (CWE-749)
<ul>
<li>CVE-2024-47005</li>
<li>Some configuration related APIs are expected to be called by administrative users only, but insufficiently restricted</li>
</ul>
</li>
<li>Authentication Bypass Using an Alternate Path (CWE-288)
<ul>
<li>CVE-2024-47406</li>
<li>Improper processing of HTTP authentication requests may lead to authentication bypass</li>
</ul>
</li>
<li>Improper processing of query parameters in HTTP requests (CWE-644)
<ul>
<li>CVE-2024-47549</li>
<li>Improper processing of query parameters of HTTP requests may allow contamination of unintended data to HTTP response headers</li>
</ul>
</li>
<li>Reflected Cross-site Scripting (CWE-79)
<ul>
<li>CVE-2024-47801</li>
<li>Reflected cross-site scripting vulnerability coming from improper processing of query parameters in HTTP requests</li>
</ul>
</li>
<li>Stored Cross-site Scripting (CWE-79)
<ul>
<li>CVE-2024-48870</li>
<li>Stored cross-site scripting vulnerability coming from improper input data validation in URI data registration</li>
</ul>
</li>
</ul>
Sharp Corporation reported these vulnerabilities to JPCERT/CC to notify users of its solution through JVN.JVNDB-2024-011256https://jvn.jp/en/vu/JVNVU95063136/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-42420https://www.cve.org/CVERecord?id=CVE-2024-43424https://www.cve.org/CVERecord?id=CVE-2024-45829https://www.cve.org/CVERecord?id=CVE-2024-45842https://www.cve.org/CVERecord?id=CVE-2024-47005https://www.cve.org/CVERecord?id=CVE-2024-47406https://www.cve.org/CVERecord?id=CVE-2024-47549https://www.cve.org/CVERecord?id=CVE-2024-47801https://www.cve.org/CVERecord?id=CVE-2024-48870https://cwe.mitre.org/data/definitions/125.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/288.htmlhttps://cwe.mitre.org/data/definitions/644.htmlhttps://cwe.mitre.org/data/definitions/749.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:sharp:multiple_productcpe:/a:toshibatec:multiple_product2024-10-28T17:33+09:002024-10-28T17:33+09:002024-10-28T17:33+09:00Chatwork Desktop Application (Windows) uses a potentially dangerous function
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000115.html
Chatwork Desktop Application (Windows) provided by kubell Co., Ltd. contains an issue with use of potentially dangerous function (CWE-676), which allows a user to access an external website via a link in the application.
RyotaK of Flatt Security Inc. directly reported this vulnerability to the developer and coordinated. After the coordination was completed, the developer reported this case to IPA under Information Security Early Warning Partnership to notify the users of the solution through JVN, and JPCERT/CC coordinated with the developer for JVN advisory publication.JVNDB-2024-000115https://jvn.jp/en/jp/JVN78335885/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-50307https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:kubell_chatwork_desktop_application_for_windows2024-10-28T14:29+09:002024-10-28T14:29+09:002024-10-28T14:29+09:00Multiple vulnerabilities in baserCMS
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000114.html
baserCMS provided by baserCMS Users Community contains multiple vulnerabilities listed below.<ul><li>Stored cross-site scripting vulnerability due to inappropriate Slug handling on Article Edit (CWE-79) - CVE-2024-46996</li><li>Stored cross-site scripting vulnerability on Edit Email Form Settings (CWE-79) - CVE-2024-46998</li><li>Reflected cross-site scripting vulnerability due to inadequate error page generation process (CWE-81) - CVE-2024-46995</li><li>Stored cross-site scripting vulnerability due to inappropriate input data handling on Article Edit and Content List (CWE-79) - CVE-2024-46994</li></ul>CVE-2024-46996
Ayato Shitomi of Fore-Z co.ltd and Rikuto Tauchi reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-46998
Ayato Shitomi of Fore-Z co.ltd reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-46995
Yusuke Uchida reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-46994
Kyohei Ota of LEON TECHNOLOGY,Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
JVNDB-2024-000114https://jvn.jp/en/jp/JVN00876083/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-46996https://www.cve.org/CVERecord?id=CVE-2024-46998https://www.cve.org/CVERecord?id=CVE-2024-46995https://www.cve.org/CVERecord?id=CVE-2024-46994https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:basercms:basercmscpe:/a:basercms:basercms2024-10-25T15:07+09:002024-10-25T15:07+09:002024-10-25T15:07+09:00Multiple SQL injection vulnerabilities in Trend Micro Deep Discovery Inspector
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-010802.html
Trend Micro Incorporated has released a security update for Trend Micro Deep Discovery Inspector.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2024-010802http://jvn.jp/en/vu/JVNVU93072012/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-46902https://www.cve.org/CVERecord?id=CVE-2024-46903cpe:/a:trendmicro:deep_discovery_inspector2024-10-22T13:02+09:002024-10-22T13:02+09:002024-10-22T13:02+09:00Multiple vulnerabilities in AIPHONE IX SYSTEM, IXG SYSTEM, and System Support Software
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000106.html
AIPHONE IX SYSTEM is an IP Network Audio-Video Intercom and IXG SYSTEM is an IP-based Residential System.
IX SYSTEM, IXG SYSTEM, and System Support Software contain multiple vulnerabilities listed below.
<ul>
<li><b>OS command injection (CWE-78)</b> - CVE-2024-31408</li>
<li><b>Insufficiently protected credentials (CWE-522)</b> - CVE-2024-39290</li>
<li><b>Use of hard-coded cryptographic key (CWE-321)</b> - CVE-2024-45837</li>
<li><b>Improper access control (CWE-522)</b> - CVE-2024-47142</li>
</ul>
Vera Mens of Claroty Research - Team82 reported these vulnerabilities to AIPHONE CO., LTD. and coordinated.
After the coordination was completed, AIPHONE CO., LTD. reported this case to IPA to notify users of the solution through JVN. JPCERT/CC coordinated with the developer for the publication.JVNDB-2024-000106https://jvn.jp/en/jp/JVN41397971/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-31408https://www.cve.org/CVERecord?id=CVE-2024-39290https://www.cve.org/CVERecord?id=CVE-2024-45837https://www.cve.org/CVERecord?id=CVE-2024-47142https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:aiphone:ix-supporttoolcpe:/a:aiphone:ixg-supporttoolcpe:/o:aiphone:ix-bau_firmwarecpe:/o:aiphone:ix-ba_firmwarecpe:/o:aiphone:ix-bbt_firmwarecpe:/o:aiphone:ix-bb_firmwarecpe:/o:aiphone:ix-bu_firmwarecpe:/o:aiphone:ix-dau_firmwarecpe:/o:aiphone:ix-da_firmwarecpe:/o:aiphone:ix-dbt_firmwarecpe:/o:aiphone:ix-db_firmwarecpe:/o:aiphone:ix-du_firmwarecpe:/o:aiphone:ix-dvf-2ra_firmwarecpe:/o:aiphone:ix-dvf-l_firmwarecpe:/o:aiphone:ix-dvf-p_firmwarecpe:/o:aiphone:ix-dvf-ra_firmwarecpe:/o:aiphone:ix-dvf_firmwarecpe:/o:aiphone:ix-dvm_firmwarecpe:/o:aiphone:ix-dvt_firmwarecpe:/o:aiphone:ix-dv_firmwarecpe:/o:aiphone:ix-eat_firmwarecpe:/o:aiphone:ix-eau_firmwarecpe:/o:aiphone:ix-ea_firmwarecpe:/o:aiphone:ix-fa_firmwarecpe:/o:aiphone:ix-mv7-bt_firmwarecpe:/o:aiphone:ix-mv7-b_firmwarecpe:/o:aiphone:ix-mv7-hbt_firmwarecpe:/o:aiphone:ix-mv7-hb_firmwarecpe:/o:aiphone:ix-mv7-hw-jp_firmwarecpe:/o:aiphone:ix-mv7-hwt_firmwarecpe:/o:aiphone:ix-mv7-hw_firmwarecpe:/o:aiphone:ix-mv7-wt_firmwarecpe:/o:aiphone:ix-mv7-w_firmwarecpe:/o:aiphone:ix-mv_firmwarecpe:/o:aiphone:ix-rs-bt_firmwarecpe:/o:aiphone:ix-rs-b_firmwarecpe:/o:aiphone:ix-rs-wt_firmwarecpe:/o:aiphone:ix-rs-w_firmwarecpe:/o:aiphone:ix-spmic_firmwarecpe:/o:aiphone:ix-ss-2g-n_firmwarecpe:/o:aiphone:ix-ss-2gt_firmwarecpe:/o:aiphone:ix-ss-2g_firmwarecpe:/o:aiphone:ix-ssa-2ra_firmwarecpe:/o:aiphone:ix-ssa-ra_firmwarecpe:/o:aiphone:ix-ssa_firmwarecpe:/o:aiphone:ixg-2c7-l_firmwarecpe:/o:aiphone:ixg-2c7_firmwarecpe:/o:aiphone:ixg-dm7-10k_firmwarecpe:/o:aiphone:ixg-dm7-hida_firmwarecpe:/o:aiphone:ixg-dm7-hid_firmwarecpe:/o:aiphone:ixg-dm7_firmwarecpe:/o:aiphone:ixg-mk_firmwarecpe:/o:aiphone:ixgw-gw_firmwarecpe:/o:aiphone:ixgw-lc_firmwarecpe:/o:aiphone:ixgw-tgw_firmwarecpe:/o:aiphone:ixw-ma_firmware2024-11-21T11:37+09:002024-10-21T11:58+09:002024-11-21T11:37+09:00N-LINE vulnerable to HTML injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000113.html
N-LINE provided by NEUMANN CO.LTD. is an online learning management system for driving schools.
N-LINE processes inputs with insufficient check (CWE-94), and malicious inputs from an student's device may badly impact the instructor's screen.
Ayato Shitomi of Fore-Z co.ltd reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000113https://jvn.jp/en/jp/JVN57285747/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-47158https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:neumann_n-line2024-10-25T16:48+09:002024-10-18T14:48+09:002024-10-25T16:48+09:00MUSASI version 3 performing authentication on client-side
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000112.html
MUSASI provided by NEUMANN CO.LTD. is an e-learning system for driving schools.
MUSASI version 3 performs authentication within the client-side code (CWE-603), and the client in pre-authentication state retrieves the credential information from the server just when a user ID is input.
This behavior may be exploited to fetch other users' credential information.
JVNDB-2024-000112https://jvn.jp/en/jp/JVN31982676/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-45785https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:neumann_musasi2024-10-25T16:55+09:002024-10-18T14:40+09:002024-10-25T16:55+09:00SHIRASAGI vulnerable to path traversal
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000111.html
SHIRASAGI provided by SHIRASAGI Project processes URLs in HTTP requests improperly, resulting in a path traversal vulnerability (CWE-22).
Shogo Kumamaru of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000111https://jvn.jp/en/jp/JVN58721679/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-46898https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ss-proj:shirasagi2024-10-23T17:35+09:002024-10-16T14:12+09:002024-10-23T17:35+09:00Multiple vulnerabilities in Exment
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000110.html
Exment provided by Kajitori Co.,Ltd contains multiple vulnerabilities listed below.
<ul><li>Incorrect Permission Assignment for Critical Resource (CWE-732) - CVE-2024-46897</li>
<li>Stored Cross-site Scripting (CWE-79) - CVE-2024-47793</li></ul>
CVE-2024-46897
masataka sato of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-47793
Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000110https://jvn.jp/en/jp/JVN74538317/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-46897https://www.cve.org/CVERecord?id=CVE-2024-47793https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:exceedone:exment2024-10-11T14:13+09:002024-10-11T14:13+09:002024-10-11T14:13+09:00baserCMS plugin "BurgerEditor" vulnerable to directory listing
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000109.html
baserCMS plugin "BurgerEditor" provided by D-ZERO CO.,LTD. contains a directory listing vulnerability (CWE-548, CVE-2024-44807).
If accessing a URL of the web site using the plugin that has a specific string added to the end, a list of uploaded files may be obtained.
In addition, the uploaded file itself may be obtained through the list information.
Koh You Liang of SOMPO Holdings and Orel Gispan of Sompo Digital Lab Tel Aviv reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000109https://jvn.jp/en/jp/JVN54676967/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-44807https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:d-zero_burger_editor2024-11-06T14:45+09:002024-10-10T14:57+09:002024-11-06T14:45+09:00Multiple vulnerabilities in JTEKT ELECTRONICS Kostac PLC Programming Software
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-009667.html
Kostac PLC Programming Software provided by JTEKT ELECTRONICS CORPORATION contains multiple vulnerabilities listed below.
* Out-of-bounds write (CWE-787) - CVE-2024-47134
* Stack-based buffer overflow (CWE-121) - CVE-2024-47135
* Out-of-bounds read (CWE-125) - CVE-2024-47136
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-009667https://jvn.jp/en/vu/JVNVU92808077/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-47134https://www.cve.org/CVERecord?id=CVE-2024-47135https://www.cve.org/CVERecord?id=CVE-2024-47136https://cwe.mitre.org/data/definitions/121.htmlhttps://cwe.mitre.org/data/definitions/125.htmlhttps://cwe.mitre.org/data/definitions/787.htmlcpe:/a:jtekt:kostac_plc2024-10-03T13:42+09:002024-10-03T13:42+09:002024-10-03T13:42+09:00Apache Tomcat improper handling of TLS handshake process data
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000108.html
Apache Tomcat provided by The Apache Software Foundation improperly handles TLS handshake process data, which may lead to a denial-of-service (DoS) condition (CWE-770, CVE-2024-38286).
The reporter, Ozaki of North Grid Corporation, reported this issue directly to and coordinated with the developer.
After the coordination, the reporter also reported the case to IPA, and JPCERT/CC coordinated with the developer to publish the advisory on JVN.JVNDB-2024-000108https://jvn.jp/en/jp/JVN72148744/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-38286https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:apache:tomcat2024-10-01T17:51+09:002024-10-01T17:51+09:002024-10-01T17:51+09:00Vulnerability in Cosminexus
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-009498.html
Vulnerability has been found in Cosminexus.
JVNDB-2024-009498https://www.cve.org/CVERecord?id=CVE-2024-24549cpe:/a:hitachi:hitachi_application_server_rcpe:/a:hitachi:ucosminexus_application_servercpe:/a:hitachi:ucosminexus_developercpe:/a:hitachi:ucosminexus_primary_server_basecpe:/a:hitachi:ucosminexus_service_architectcpe:/a:hitachi:ucosminexus_service_platform2024-10-01T16:01+09:002024-10-01T16:01+09:002024-10-01T16:01+09:00Insecure initial password configuration issue in SEIKO EPSON Web Config
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-009481.html
Web Config is software that allows users to check the status and change the settings of SEIKO EPSON products, e.g., printers and scanners, via a web browser. In the initial setting no administrative password is set, and when a user connects the device and configures Web Config settings for the first time, the user is requested to set the password.
Therefore, when a product is connected to network without the Web Config settings configured, arbitrary password may be set and the device may be operated with an administrative privilege by an attacker (CWE-1188).
George Puckett reported this vulnerability to CERT/CC.
Requested by CERT/CC, JPCERT/CC coordinated with the developer.JVNDB-2024-009481https://jvn.jp/en/vu/JVNVU95133448/index.htmlhttps://www.cve.org/CVERecord?id= CVE-2024-47295https://cwe.mitre.org/data/definitions/1188.htmlcpe:/a:epson:web_config2024-11-12T10:25+09:002024-10-01T14:14+09:002024-11-12T10:25+09:00RevoWorks Cloud vulnerable to unintended process execution
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000107.html
RevoWorks Cloud provided by J's Communication Co., Ltd. is software to build a sandbox environment isolated from a client's local environment. In the sandbox environment, the product provides the function enabling execution of web browsers and detection and blocking of unauthorized processes. However, a defect in this function was found which fails to detect unauthorized processes (CWE-863).
J's Communication Co., Ltd. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and J's Communication Co., Ltd. coordinated under the Information Security Early Warning Partnership.JVNDB-2024-000107https://jvn.jp/en/jp/JVN39280069/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-47560https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:jscom:revoworks_cloudclient2024-09-30T15:17+09:002024-09-30T15:17+09:002024-09-30T15:17+09:00File Permissions Vulnerability in Hitachi Ops Center Common Services
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003932.html
File permissions vulnerability exists in Hitachi Ops Center Common Services.
* <a href="https://www.cve.org/CVERecord?id=CVE-2024-2819"target="blank">CVE-2024-2819: File permission vulnerability in Hitachi Ops Center Common Services (Display new window)</a>JVNDB-2024-003932https://www.cve.org/CVERecord?id=CVE-2024-2819https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:ops_center_common_services2024-09-30T14:15+09:002024-09-30T14:15+09:002024-09-30T14:15+09:00Multiple vulnerabilities in Smart-tab
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000105.html
Smart-tab provided by TECHNO SUPPORT COMPANY is a multi-functional guest room tablet system for hotels and other accommodation facilities. Smart-tab contains multiple vulnerabilities listed below.
* Active debug code (CWE-489) - CVE-2024-41999
* Plaintext storage of a password (CWE-256) - CVE-2024-42496
Shuto Imai of LAC Co., Ltd. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000105https://jvn.jp/en/jp/JVN42445661/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-41999https://www.cve.org/CVERecord?id=CVE-2024-42496https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:techno_support_company_smart_tab2024-09-30T14:14+09:002024-09-30T14:14+09:002024-09-30T14:14+09:00SNMP service is enabled by default in Sharp NEC Display Solutions projectors
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-009396.html
Multiple projectors provided by Sharp NEC Display Solutions, Ltd. are configured with SNMP service enabled by default, therefore can be accessed by specifying SNMP community name "public" (CWE-1242 ,CVE-2024-7011).
SNMP service configuration (enable/disable) cannot be changed on the management page of the projectors either.
This vulnerability was directly reported to Sharp NEC Display Solutions, Ltd. by the reporter. Sharp NEC Display Solutions, Ltd. reported the case to JPCERT/CC to notify users of the solution through JVN.
Reporter: JP Hofmeyr of Southern Metropolitan Cemeteries TrustJVNDB-2024-009396https://jvn.jp/en/vu/JVNVU91077448/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-7011https://cwe.mitre.org/data/definitions/1242.htmlcpe:/a:sharp-nec-displays:multiple_product2024-09-30T12:46+09:002024-09-30T12:46+09:002024-09-30T12:46+09:00MF Teacher Performance Management System vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000104.html
MF Teacher Performance Management System provided by Media Fusion Co.,Ltd. contains a cross-site scripting vulnerability (CWE-79).
Akira Sumiyoshi, Takuto Matsuhashi, Kei Watanabe, Akio Yamaguchi, Syunji Yazaki and Hideaki Tsuchiya of UEC-CSIRT, The University of Electro-Communications reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000104https://jvn.jp/en/jp/JVN21176842/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-41930https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:media_fusion_mf_teacher_performance_management_system2024-10-10T11:14+09:002024-09-27T15:00+09:002024-10-10T11:14+09:00The installer of e-Tax software(common program) vulnerable to privilege escalation
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000103.html
The installer of e-Tax software(common program) provided by National Tax Agency contains a vulnerability which allows uploading a malicious DLL to be executed with higher privileges than that of an general user by altering registry (CWE-268).
Takashi Yoshikawa of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000103https://jvn.jp/en/jp/JVN57749899/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-47045https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:nta:e-tax2024-09-24T16:12+09:002024-09-24T16:12+09:002024-09-24T16:12+09:00Multiple NTT EAST Home GateWay/Hikari Denwa routers fail to restrict access permissions
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000102.html
Multiple Home GateWay/Hikari Denwa routers provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION fail to restrict access permissions (CWE-451).
Keishi Awata of logicalmixed reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000102https://jvn.jp/en/jp/JVN78356367/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-47044https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/h:ntt_east:pr-500micpe:/h:ntt_east:rs-500micpe:/h:ntt_east:rt-500micpe:/o:ntt_east:pr-400mi_firmwarecpe:/o:ntt_east:pr-600micpe:/o:ntt_east:rt-400mi_firmwarecpe:/o:ntt_east:rv-440mi_firmwarecpe:/o:ntt_east:rx-600mi2024-10-18T11:02+09:002024-09-24T16:00+09:002024-10-18T11:02+09:00Multiple vulnerabilities in PLANEX COMMUNICATIONS network devices
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000101.html
Multiple network devices (network cameras and a router) provided by PLANEX COMMUNICATIONS INC. contain multiple vulnerabilities listed below.<ul><li>Cross-site request forgery (CWE-352) - CVE-2024-45372</li><li>Cross-site scripting vulnerability in the web management page (CWE-79) - CVE-2024-45836</li></ul>
CVE-2024-45372
Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.
CVE-2024-45836
Ryota Honda, Akihito Takeuchi, Daichi Uezono, Junnosuke Kushibiki, Ryu Kuki, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-000101https://jvn.jp/en/jp/JVN81966868/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-45372https://www.cve.org/CVERecord?id=CVE-2024-45836https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:planex:cs-qr10cpe:/o:planex:cs-qr20cpe:/o:planex:cs-qr22cpe:/o:planex:cs-qr220cpe:/o:planex:cs-qr300cpe:/o:planex:mzk-dp300n2024-09-24T15:26+09:002024-09-24T15:26+09:002024-09-24T15:26+09:00Multiple vulnerabilities in TAKENAKA ENGINEERING digital video recorders
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-008391.html
Multiple digital video recorders provided by TAKENAKA ENGINEERING CO., LTD. contain multiple vulnerabilities listed below.
<ul>
<li>Improper authentication (CWE-287) - CVE-2024-41929</li>
<li>OS command injection (CWE-78) - CVE-2024-43778</li>
<li>Hidden functionality (CWE-912) - CVE-2024-47001</li>
</ul>
Yoshiki Mori, Ushimaru Hayato, Yuki Umemura and Masaki Kubo of Cybersecurity Research Institute, National Institute of Information and Communications Technology reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-008391https://jvn.jp/en/vu/JVNVU90142679/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-41929https://www.cve.org/CVERecord?id=CVE-2024-43778https://www.cve.org/CVERecord?id=CVE-2024-47001https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/912.htmlcpe:/o:misc:takenaka_engineering_ahd04t-acpe:/o:misc:takenaka_engineering_ahd08t-acpe:/o:misc:takenaka_engineering_ahd16t-acpe:/o:misc:takenaka_engineering_hdvr-1600cpe:/o:misc:takenaka_engineering_hdvr-400cpe:/o:misc:takenaka_engineering_hdvr-800cpe:/o:misc:takenaka_engineering_nvr04t-acpe:/o:misc:takenaka_engineering_nvr08t-acpe:/o:misc:takenaka_engineering_nvr16t-a2024-09-19T14:07+09:002024-09-19T14:07+09:002024-09-19T14:07+09:00Multiple vulnerabilities in WordPress plugin "Welcart e-Commerce"
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000100.html
WordPress plugin "Welcart e-Commerce" provided by Welcart Inc. contains multiple vulnerabilities listed below.
<ul><li>SQL injection (CWE-89) - CVE-2024-42404</li><li>Cross-site scripting (CWE-79) - CVE-2024-45366</li></ul>Shogo Kumamaru of LAC CyberLink Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000100https://jvn.jp/en/jp/JVN19766555/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-42404https://www.cve.org/CVERecord?id=CVE-2024-45366https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:welcart:welcart_e-commerce2024-09-18T14:34+09:002024-09-18T14:34+09:002024-09-18T14:34+09:00Assimp vulnerable to heap-based buffer overflow
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000099.html
PlyLoader.cpp of Assimp provided by Open Asset Import Library contains a heap-based buffer overflow vulnerability (CWE-122).
Yuhei Kawakoya of NTT Security Holdings reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000099https://jvn.jp/en/jp/JVN42386607/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-45679https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:open_asset_import_library_assimp2024-09-18T14:20+09:002024-09-18T14:20+09:002024-09-18T14:20+09:00Multiple Alps System Integration products and the OEM products vulnerable to cross-site request forgery
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000095.html
Multiple Alps System Integration products and the OEM products contain a cross-site request forgery vulnerability (CWE-352).
Yoshiaki komeyama of KOBELCO SYSTEMS CORPORATION reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000095https://jvn.jp/en/jp/JVN05579230/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-45504https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hammock:assetview_fcpe:/a:misc:alps_system_integration_intersafe_catscpe:/a:misc:alps_system_integration_intersafe_gatewayconnectioncpe:/a:misc:alps_system_integration_intersafe_logdirectorcpe:/a:misc:alps_system_integration_intersafe_lognavigatorcpe:/a:misc:alps_system_integration_intersafe_mobilesecuritycpe:/a:misc:alps_system_integration_intersafe_webfiltercpe:/a:misc:axseed_sppm_bizbrowercpe:/a:misc:axseed_sppm_secure_filteringcpe:/a:misc:jmas_kaito_secure_browsercpe:/a:misc:mjs_mjs_web_filteringcpe:/a:motex:lanscope_endpoint_manager_web_filteringcpe:/a:qualitysoft:url_filteringcpe:/a:trendmicro:interscan_webmanager2024-09-09T16:40+09:002024-09-09T16:40+09:002024-09-09T16:40+09:00Pgpool-II vulnerable to information disclosure
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000096.html
Pgpool-II is a cluster management tool. Pgpool-II contains an information disclosure vulnerability (CWE-213) in its query cache function.
PgPool Global Development Group reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and PgPool Global Development Group coordinated under the Information Security Early Warning Partnership.JVNDB-2024-000096https://jvn.jp/en/jp/JVN67456481/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-45624https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:pgpool:pgpool-ii2024-09-09T14:58+09:002024-09-09T14:58+09:002024-09-09T14:58+09:00"@cosme" App fails to restrict custom URL schemes properly
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000094.html
"@cosme" App provided by istyle Inc. provides the function to access a requested URL using Custom URL Scheme. The App does not restrict access to the function properly (CWE-939) which may be exploited to direct the App to access any sites.
Pantuhong Sorasiri of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000094https://jvn.jp/en/jp/JVN81570776/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-45203https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:istyle_Inc_%40cosme_cosmetic_review_%26_ranking_for_androidcpe:/a:misc:istyle_Inc_%40cosme_cosmetic_review_%26_ranking_for_ios2024-09-09T14:20+09:002024-09-09T14:20+09:002024-09-09T14:20+09:00WordPress Plugin "Forminator" vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000097.html
WordPress Plugin "Forminator" provided by WPMU DEV assists building web forms. When accessing the page including the web form created with Forminator, some information from the URL may be embedded to the web form.
This feature processes the embedded information improperly, leading to cross-site scripting vulnerability (CWE-79).
Yoshimitsu Kato of Asterisk Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
JVNDB-2024-000097https://jvn.jp/en/jp/JVN65724976/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-45625https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html2024-09-09T13:51+09:002024-09-09T13:51+09:002024-09-09T13:51+09:00Multiple products from KINGSOFT JAPAN vulnerable to path traversal
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000098.html
KINGSOFT JAPAN, INC. provides Kingsoft Office Software's WPS Office and its related products localized for Japan.<br />
WPS Office and its related products provided by KINGSOFT JAPAN, INC. contain a path traversal vulnerability (CWE-22, CVE-2024-7262, CVE-2024-7263)) due to inadequate file path validation by promecefpluginhost.exe.<br />
Note that, a report has been published describing that "WPS Office provided by Kingsoft Office Software is affected to this vulnerability and exploitation is observed".<br />
KINGSOFT JAPAN, INC. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and KINGSOFT JAPAN, INC. coordinated under the Information Security Early Warning Partnership.JVNDB-2024-000098https://jvn.jp/en/jp/JVN32529796/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-7262https://www.cve.org/CVERecord?id=CVE-2024-7263https://www.welivesecurity.com/en/eset-research/analysis-of-two-arbitrary-code-execution-vulnerabilities-affecting-wps-office/https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:kingsoft:pdf_procpe:/a:kingsoft:wps_cloudcpe:/a:kingsoft:wps_cloud_procpe:/a:kingsoft:wps_office2_for_Windows2024-09-06T15:07+09:002024-09-06T15:07+09:002024-09-06T15:07+09:00Secure Boot bypass Vulnerability in PRIMERGY
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000090.html
PRIMERGY is an IA server provided by Fsas Technologies Inc. PRIMERGY contains a vulnerability where Secure Boot function is bypassed. This is due to a vulnerability called "PKFail" (CVE-2024-8105), which was publicly disclosed by Binarly.
Fsas Technologies Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
JPCERT/CC and Fsas Technologies Inc. coordinated under the Information Security Early Warning Partnership.JVNDB-2024-000090https://jvn.jp/en/jp/JVN49873988/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-8105https://kb.cert.org/vuls/id/455367https://www.binarly.io/blog/pkfail-untrusted-platform-keys-undermine-secure-boot-on-uefi-ecosystemhttps://22222483.fs1.hubspotusercontent-na1.net/hubfs/22222483/Reports/PKfail%20-%20Binarly%20Research%20Report%20July%2025%202024.pdfhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:fsas_technologies_primergy_gx2460_m1cpe:/a:misc:fsas_technologies_primergy_gx2570_m62024-09-06T14:39+09:002024-09-06T14:39+09:002024-09-06T14:39+09:00WordPress Plugin "Advanced Custom Fields" vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000093.html
The field labels in WordPress Plugin "Advanced Custom Fields" provided by WP Engine contains a cross-site scripting vulnerability (CWE-79).
Ryo Sotoyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000093https://jvn.jp/en/jp/JVN67963942/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-45429https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:advancedcustomfields:advanced_custom_fields2024-09-04T13:01+09:002024-09-04T13:01+09:002024-09-04T13:01+09:00Panasonic Control FPWIN Pro7 vulnerable to stack-based buffer overflow
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-007002.html
Control FPWIN Pro7 provided by Panasonic contains a stack-based buffer overflow vulnerability (CWE-121, CVE-2024-7013).
Michael Heinzl reported this vulnerability to the developer and coordinated. After the coordination was completed, Panasonic reported the case to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2024-007002https://jvn.jp/en/vu/JVNVU99905584/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-7013https://cwe.mitre.org/data/definitions/121.htmlcpe:/a:panasonic:fpwin_pro2024-09-02T14:57+09:002024-09-02T14:57+09:002024-09-02T14:57+09:00IPCOM vulnerable to information disclosure
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000091.html
SSL Accelerator/SSL-VPN Function of IPCOM provided by Fsas Technologies Inc. contains an information disclosure vulnerability due to observable timing discrepancy (CWE-208).
Fsas Technologies Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Fsas Technologies Inc. coordinated under the Information Security Early Warning Partnership.JVNDB-2024-000091https://jvn.jp/en/jp/JVN29238389/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-39921https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:fsas_technologies_ipcomcpe:/a:misc:fsas_technologies_ipcom2024-08-30T14:56+09:002024-08-30T14:56+09:002024-08-30T14:56+09:00Multiple vulnerabilities in WordPress plugin "Carousel Slider"
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000092.html
WordPress plugin "Carousel Slider" provided by Sayful Islam contains 2 CSRF vulnerabilities listed below.
* Cross-site request forgery on Carousel image selection feature (CWE-352) - CVE-2024-45269
* Cross-site request forgery on Hero image selection feature (CWE-352) - CVE-2024-45270
RyotaK of Flatt Security Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000092https://jvn.jp/en/jp/JVN25264194/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-45269https://www.cve.org/CVERecord?id=CVE-2024-45270https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html2024-08-30T13:58+09:002024-08-30T13:58+09:002024-08-30T13:58+09:00WindLDR and WindO/I-NV4 store sensitive information in cleartext
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000089.html
PLC programming software "WindLDR" and Operator Interfaces' Touchscreen Programming Software "WindO/I-NV4" provided by IDEC Corporation store sensitive information in cleartext form (CWE-312).
Yuki Meguro of Toinx Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000089https://jvn.jp/en/jp/JVN08342147/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-41716https://www.cisa.gov/news-events/ics-advisories/icsa-24-263-03https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:idec:windldrcpe:/a:idec:windoi2024-09-24T17:14+09:002024-08-29T15:08+09:002024-09-24T17:14+09:00xfpt vulnerable to stack-based buffer overflow
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-006787.html
xfpt fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability (CWE-121).
Yuhei Kawakoya of NTT Security Holdings Corporation reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-006787https://jvn.jp/en/vu/JVNVU96498690/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-43700https://cwe.mitre.org/data/definitions/121.htmlcpe:/a:misc:philip_hazel_xfpt2024-08-29T14:07+09:002024-08-29T14:07+09:002024-08-29T14:07+09:00Multiple vulnerabilities in ELECOM wireless LAN routers and access points
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000088.html
Multiple wireless LAN routers and access points provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below.
* Cross-site scripting vulnerability due to an improper processing of input values in easysetup.cgi and menu.cgi (CWE-79) - CVE-2024-34577, CVE-2024-42412
* Missing authentication in Telnet function (CWE-306) - CVE-2024-39300
* Stack-based buffer overflow due to an improper processing of input values in common.cgi (CWE-121) - CVE-2024-43689
CVE-2024-34577
Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-39300
SASABE Tetsuro reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-42412, CVE-2024-43689
RyotaK of Flatt Security Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000088https://jvn.jp/en/jp/JVN24885537/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-34577https://www.cve.org/CVERecord?id=CVE-2024-39300https://www.cve.org/CVERecord?id=CVE-2024-42412https://www.cve.org/CVERecord?id=CVE-2024-43689https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:elecom:wab-i1750-pscpe:/a:elecom:wab-s1167-pscpe:/o:elecom:wrc-x3000gs2-b_firmwarecpe:/o:elecom:wrc-x3000gs2-w_firmwarecpe:/o:elecom:wrc-x3000gs2a-b_firmware2024-08-27T14:40+09:002024-08-27T14:40+09:002024-08-27T14:40+09:00Authentication Bypass Vulnerability in Hitachi Ops Center Common Services
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-006646.html
Authentication bypass vulnerability exists in Hitachi Ops Center Common Services.
JVNDB-2024-006646https://www.cve.org/CVERecord?id=CVE-2024-7125https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:ops_center_common_services2024-08-27T12:01+09:002024-08-27T12:01+09:002024-08-27T12:01+09:00Unquoted Service Path in Hitachi Device Manager
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-006367.html
Hitachi Device Manager contain the following vulnerabilities:
<a href=" https://www.cve.org/CVERecord?id=CVE-2024-5963"target="blank"> CVE-2024-5963: An unquoted executable path exists in Hitachi Device Manager (Display new window)</a>JVNDB-2024-006367https://www.cve.org/CVERecord?id=CVE-2024-5963https://cwe.mitre.org/data/definitions/428.htmlcpe:/a:hitachi:device_manager2024-08-26T16:27+09:002024-08-26T16:27+09:002024-08-26T16:27+09:00BUFFALO wireless LAN routers and wireless LAN repeaters vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000087.html
Wireless LAN routers and wireless LAN repeaters provided by BUFFALO INC. contain an OS command injection vulnerability (CWE-78).
Yoshiki Mori and Masaki Kubo of National Institute of Information and Communications Technology, Cybersecurity Research Laboratory reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000087https://jvn.jp/en/jp/JVN12824024/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-44072https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/h:buffalo_inc:whr-1166dhpcpe:/h:buffalo_inc:whr-300hp2cpe:/h:buffalo_inc:whr-600dcpe:/h:buffalo_inc:wmr-300cpe:/h:buffalo_inc:wsr-600dhpcpe:/o:buffalo_inc:wex-1166dhpcpe:/o:buffalo_inc:wex-1166dhp2cpe:/o:buffalo_inc:wex-1166dhpscpe:/o:buffalo_inc:wex-300hps%2Fncpe:/o:buffalo_inc:wex-300hptx%2Fncpe:/o:buffalo_inc:wex-733dhpcpe:/o:buffalo_inc:wex-733dhp2cpe:/o:buffalo_inc:wex-733dhpscpe:/o:buffalo_inc:wex-733dhptxcpe:/o:buffalo_inc:whr-1166dhp2cpe:/o:buffalo_inc:whr-1166dhp3cpe:/o:buffalo_inc:whr-1166dhp4cpe:/o:buffalo_inc:wsr-1166dhp32024-08-23T14:17+09:002024-08-23T14:17+09:002024-08-23T14:17+09:00Multiple Safie products vulnerable to improper server certificate verification
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000086.html
Multiple Safie products are vulnerable to improper server certificate verification (CWE-295).
The product can be operated via port 11029/TCP and Bluetooth, and its communications are AES encrypted. The product user can obtain the encryption key from the cloud server based on the device-specific information. The user who has obtained the device-specific information can directly operate the device (even if it is not owned by the user).
Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000086https://jvn.jp/en/jp/JVN83440451/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-39771https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:safie_qbic_cloud_cc-2lcpe:/a:misc:safie_safie_one2024-08-29T12:23+09:002024-08-22T13:51+09:002024-08-29T12:23+09:00Installer of Trend Micro Security 2020 (Consumer) may insecurely load Dynamic Link Libraries
https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-007305.html
Installers of Trend Micro Security 2020 (Consumer) family may insecurely load Dynamic Link Libraries.
Multiple products provided by Trend Micro Incorporated contain the DLL search path issue, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
JVNDB-2020-007305https://jvn.jp/en/vu/JVNVU98423028/index.htmlhttps://jvn.jp/en/ta/JVNTA91240916/index.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15602https://nvd.nist.gov/vuln/detail/CVE-2020-15602https://cwe.mitre.org/data/definitions/426.htmlhttps://cwe.mitre.org/data/definitions/427.htmlcpe:/a:trendmicro:antivirus%2Bcpe:/a:trendmicro:internet_security_2020cpe:/a:trendmicro:maximum_security_2020cpe:/a:trendmicro:premium_security_20202024-08-22T11:33+09:002024-08-22T11:33+09:002024-08-22T11:33+09:00Packetbeat vulnerable to denial-of-service (DoS)
https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-009536.html
Packetbeat provided by Elastic contains a denial-of-service (DoS) vulnerability.
Packetbeat provided by Elastic is a network packet analyzer. Packetbeat contains a flaw in processing the PostgreSQL handler (CWE-129) .JVNDB-2017-009536https://jvn.jp/en/vu/JVNVU94371484/index.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11480https://nvd.nist.gov/vuln/detail/CVE-2017-11480https://cwe.mitre.org/data/definitions/129.htmlcpe:/a:elasticsearch:packetbeat2024-08-21T17:54+09:002024-08-21T17:54+09:002024-08-21T17:54+09:00Multiple vulnerabilities in LogonTracer
https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-009127.html
LogonTracer provided by JPCERT Coordination Center is a tool to investigate malicious Windows logon by visualizing and analyzing Windows event log. LogonTracer contains multiple vulnerabilities listed below.
* Cross-site Scripting (CWE-79) - CVE-2018-16165
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Base Score: 6.1
CVSS v2 AV:N/AC:M/Au:N/C:N/I:P/A:N Base Score: 4.3
* XXE (XML External Entity) Injection (CWE-611) - CVE-2018-16166
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:L Base Score: 6.1
CVSS v2 AV:N/AC:L/Au:N/C:P/I:N/A:N Base Score: 5.0
* OS Command Injection (CWE-78) - CVE-2018-16167
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Base Score: 10.0
CVSS v2 AV:N/AC:L/Au:N/C:P/I:P/A:P Base Score: 7.5
* Code Injection (CWE-94) - CVE-2018-16168
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Base Score: 10.0
CVSS v2 AV:N/AC:L/Au:N/C:P/I:P/A:P Base Score: 7.5
Shoji Baba of Kobe Digital Labo, Inc. reported these vulnerabilities to JPCERT/CC, and JPCERT/CC fixed those vulnerabilities and released the updated version of software.JVNDB-2018-009127https://jvn.jp/en/vu/JVNVU98026636/index.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16165https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16166https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16168https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16167https://nvd.nist.gov/vuln/detail/CVE-2018-16165https://nvd.nist.gov/vuln/detail/CVE-2018-16166https://nvd.nist.gov/vuln/detail/CVE-2018-16167https://nvd.nist.gov/vuln/detail/CVE-2018-16168https://cwe.mitre.org/data/definitions/611.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:jpcert:logontracer2024-08-21T17:37+09:002024-08-21T17:37+09:002024-08-21T17:37+09:00A vulnerability in TOYOTA MOTOR's DCU (Display Control Unit)
https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-002957.html
TOYOTA MOTOR's DCU contains a vulnerability which is triggered by BlueBorne vulnerability.
TOYOTA MOTER CORPORATION reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.JVNDB-2020-002957https://jvn.jp/en/vu/JVNVU99396686/index.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5551https://nvd.nist.gov/vuln/detail/CVE-2020-5551https://www.kb.cert.org/vuls/id/240311/https://keenlab.tencent.com/en/2020/03/30/Tencent-Keen-Security-Lab-Experimental-Security-Assessment-on-Lexus-Cars/https://cwe.mitre.org/data/definitions/276.htmlcpe:/h:toyota:display_control_unit2024-08-20T18:12+09:002024-08-20T18:12+09:002024-08-20T18:12+09:00Trend Micro Security (Consumer) Driver vulnerable to Out-of-bounds Read
https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-007306.html
Trend Micro Security (Consumer) Driver is vulnerable to Out-of-bounds Read.
Multiple products provided by Trend Micro Incorporated contain Out-of-bounds Read vulnerability (CWE-125).
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.JVNDB-2020-007306https://jvn.jp/en/vu/JVNVU94105662/https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15603https://nvd.nist.gov/vuln/detail/CVE-2020-15603https://cwe.mitre.org/data/definitions/125.htmlcpe:/a:trendmicro:antivirus%2Bcpe:/a:trendmicro:internet_security_2020cpe:/a:trendmicro:maximum_security_2020cpe:/a:trendmicro:premium_security_20202024-08-20T17:52+09:002024-08-20T17:52+09:002024-08-20T17:52+09:00"Rakuten Ichiba App" fails to restrict custom URL schemes properly
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000085.html
"Rakuten Ichiba App" provided by Rakuten Group, Inc. provides the function to access a requested URL using Custom URL Scheme. The App does not restrict access to the function properly (CWE-939) which may be exploited to direct the App to access any sites.
Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000085https://jvn.jp/en/jp/JVN56648919/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-41918https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:rakuten_group_rakuten_ichiba_shopping_app_for_androidcpe:/a:misc:rakuten_group_rakuten_ichiba_shopping_app_for_ios2024-08-20T16:56+09:002024-08-20T16:56+09:002024-08-20T16:56+09:00EL Injection Vulnerability in Hitachi Tuning Manager
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-005167.html
An EL Injection Vulnerability exists in Hitachi Tuning Manager.
<a href="https://www.cve.org/CVERecord?id=CVE-2024-5828"target="blank">CVE-2024-5828:EL Injection Vulnerability in Hitachi Tuning Manager (Display new window)</a>
JVNDB-2024-005167https://www.cve.org/CVERecord?id=CVE-2024-5828https://cwe.mitre.org/data/definitions/917.htmlcpe:/a:hitachi:tuning_manager2024-08-15T09:38+09:002024-08-15T09:38+09:002024-08-15T09:38+09:00WAON service app for Android fails to verify SSL server certificates
https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000124.html
WAON service app for Android provided by AEON CO., LTD. fails to verify SSL server certificates.
Gaku Taniguchi of RiskFinder,inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2016-000124https://jvn.jp/en/jp/JVN68364327/index.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4832https://nvd.nist.gov/vuln/detail/CVE-2016-4832https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:aeon:waon2024-08-15T09:36+09:002024-08-15T09:36+09:002024-08-15T09:36+09:00Firmware update for RICOH JavaTM Platform resets the TLS configuration
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000083.html
JavaTM Platform provided by Ricoh Company, Ltd. is the execution environment for firmware extensions of Ricoh MFPs and printers, providing TLS (Transport Layer Security) communication mechanism.
When the firmware for JavaTM Platform is updated from Ver.12.89 or earlier versions to a newer version, the TLS configuration is reset to "TLS 1.0: enabled" and "TLS 1.1: enabled" (CWE-1188).
Ricoh Company, Ltd. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Ricoh Company, Ltd. coordinated under the Information Security Early Warning Partnership.JVNDB-2024-000083https://jvn.jp/en/jp/JVN78728294/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-41995https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ricoh:javatm_platform2024-08-06T15:13+09:002024-08-06T15:13+09:002024-08-06T15:13+09:00Cybozu Office vulnerable to bypass browsing restrictions in Custom App
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000079.html
Cybozu Office provided by Cybozu, Inc. contains a vulnerability which allows to bypass browsing restrictions in Custom App (CWE-201).
Cybozu, Inc. reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.JVNDB-2024-000079https://jvn.jp/en/jp/JVN29845579/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-39817https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:cybozu:office2024-08-06T14:59+09:002024-08-06T14:59+09:002024-08-06T14:59+09:00Pimax Play and PiTool accept WebSocket connections from unintended endpoints
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000082.html
Pimax Play and PiTool provided by Pimax accept WebSocket connections from unintended endpoints (CWE-923).
Rei Yano reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000082https://jvn.jp/en/jp/JVN50850706/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-41889https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:pimax_pimax_playcpe:/a:misc:pimax_pitool2024-08-05T13:58+09:002024-08-05T13:58+09:002024-08-05T13:58+09:00Multiple vulnerabilities in ZEXELON ZWX-2000CSW2-HN
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000084.html
ZWX-2000CSW2-HN provided by ZEXELON CO., LTD. is a high-speed coaxial modem with wireless LAN functions. ZWX-2000CSW2-HN contains multiple vulnerabilities listed below.
<ul>
<li>Use of hard-coded credentials (CWE-798) - CVE-2024-39838</li>
<li>Incorrect permission assignment for critical resource (CWE-732) - CVE-2024-41720</li>
</ul>
Hiroki Sato of Tokyo Institute of Technology reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000084https://jvn.jp/en/jp/JVN70666401/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-39838https://www.cve.org/CVERecord?id=CVE-2024-41720https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:zexelon_zwx-2000csw2-hn2024-08-05T13:46+09:002024-08-05T13:46+09:002024-08-05T13:46+09:00FFRI AMC vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000077.html
FFRI AMC provided by FFRI Security, Inc. is a management console for the endpoint security product FFRI yarai and ActSecure X.
FFRI AMC contains an OS command injection vulnerability (CWE-78).
It is exploitable when the notification program setting is enabled, the executable file path is configured with a batch file (.bat) or command file (.cmd), and the file is written in a certain style.
FFRI Security, Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and FFRI Security, Inc. coordinated under the Information Security Early Warning Partnership.JVNDB-2024-000077https://jvn.jp/en/jp/JVN26734798/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-40895https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ffri:ffri_amccpe:/a:nec:ffri_amccpe:/a:skygroup:edr_plus_pack2024-07-30T16:40+09:002024-07-30T16:40+09:002024-07-30T16:40+09:00Multiple vulnerabilities in ELECOM wireless LAN routers
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000078.html
Multiple wireless LAN routers provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below.
Unrestricted Upload of File with Dangerous Type (CWE-434)
CVE-2024-34021
OS Command Injection (CWE-78)
CVE-2024-39607
Cross-Site Request Forgery (CWE-352)
CVE-2024-40883
CVE-2024-34021
Toyama Taku, and Daichi Arai of NEC Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-39607, CVE-2024-40883
Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000078https://jvn.jp/en/jp/JVN06672778/https://www.cve.org/CVERecord?id=CVE-2024-34021https://www.cve.org/CVERecord?id=CVE-2024-39607https://www.cve.org/CVERecord?id=CVE-2024-40883https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:elecom:wrc-2533gs2-b_firmwarecpe:/o:elecom:wrc-2533gs2-w_firmwarecpe:/o:elecom:wrc-2533gs2v-b_firmwarecpe:/o:elecom:wrc-x1500GS-Bcpe:/o:elecom:wrc-x1500GSA-Bcpe:/o:elecom:wrc-x3000gs2-b_firmwarecpe:/o:elecom:wrc-x3000gs2-w_firmwarecpe:/o:elecom:wrc-x3000gs2a-b_firmwarecpe:/o:elecom:wrc-x6000xs-g_firmwarecpe:/o:elecom:wrc-x6000xst-g_firmware2024-09-24T17:04+09:002024-07-30T15:34+09:002024-09-24T17:04+09:00EC-CUBE plugin (for EC-CUBE 4 series) "EC-CUBE Web API Plugin" vulnerable to stored cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000081.html
EC-CUBE plugin (for EC-CUBE 4 series) "EC-CUBE Web API Plugin" provided by EC-CUBE CO.,LTD. contains a stored cross-site scripting vulnerability (CWE-79) in OAuth Management feature.
EC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.JVNDB-2024-000081https://jvn.jp/en/jp/JVN26225832/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-41141https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ec-cube:ec-cube_web_api2024-07-30T14:06+09:002024-07-30T14:06+09:002024-07-30T14:06+09:00EC-CUBE 4 Series improper input validation when installing plugins
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000080.html
EC-CUBE 4 series provided by EC-CUBE CO.,LTD improperly validates inputs when installing plugins (CWE-349).
EC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.JVNDB-2024-000080https://jvn.jp/en/jp/JVN48324254/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-41924https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ec-cube:ec-cube2024-07-30T13:56+09:002024-07-30T13:56+09:002024-07-30T13:56+09:00Multiple vulnerabilities in FutureNet NXR series, VXR series and WXR series
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-004595.html
FutureNet NXR series, VXR series and WXR series provided by Century Systems Co., Ltd. contain multiple vulnerabilities listed below.
* Initialization of a Resource with an Insecure Default (CWE-1188)
CVE-2024-31070
* Active Debug Code (CWE-489)
CVE-2024-36475
* OS Command Injection (CWE-78)
CVE-2024-36491
* Buffer Overflow (CWE-120)
CVE-2020-10188
The product uses previous versions of netkit-telnet which contains a known vulnerability.
CVE-2024-31070, CVE-2024-36475
Katsuhiko Sato(a.k.a. goroh_kun) of 00One, Inc. reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
CVE-2024-36491, CVE-2020-10188
Century Systems Co., Ltd. reported these vulnerabilities to JPCERT/CC to notify users of its solution through JVN.JVNDB-2024-004595https://jvn.jp/en/vu/JVNVU96424864/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-31070https://www.cve.org/CVERecord?id=CVE-2024-36475https://www.cve.org/CVERecord?id=CVE-2024-36491https://www.cve.org/CVERecord?id=CVE-2020-10188https://cwe.mitre.org/data/definitions/1188.htmlhttps://cwe.mitre.org/data/definitions/120.htmlhttps://cwe.mitre.org/data/definitions/489.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:centurysys:futurenet_nxr-120/ccpe:/o:centurysys:futurenet_nxr-1200cpe:/o:centurysys:futurenet_nxr-125/cxcpe:/o:centurysys:futurenet_nxr-130/ccpe:/o:centurysys:futurenet_nxr-1300cpe:/o:centurysys:futurenet_nxr-155/ccpe:/o:centurysys:futurenet_nxr-160/lwcpe:/o:centurysys:futurenet_nxr-230/ccpe:/o:centurysys:futurenet_nxr-350/ccpe:/o:centurysys:futurenet_nxr-530cpe:/o:centurysys:futurenet_nxr-610xcpe:/o:centurysys:futurenet_nxr-650cpe:/o:centurysys:futurenet_nxr-g050cpe:/o:centurysys:futurenet_nxr-g060cpe:/o:centurysys:futurenet_nxr-g100cpe:/o:centurysys:futurenet_nxr-g110cpe:/o:centurysys:futurenet_nxr-g120cpe:/o:centurysys:futurenet_nxr-g180/l-cacpe:/o:centurysys:futurenet_nxr-g200cpe:/o:centurysys:futurenet_vxr/x64cpe:/o:centurysys:futurenet_vxr/x86cpe:/o:centurysys:futurenet_wxr-2502024-07-29T17:51+09:002024-07-29T17:51+09:002024-07-29T17:51+09:00SDoP contains a stack-based buffer overflow vulnerability.
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000076.html
SDoP fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability (CWE-121).
Yuhei Kawakoya of NTT Security Holdings reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000076https://jvn.jp/en/jp/JVN16420523/https://www.cve.org/CVERecord?id=CVE-2024-41881https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:philip_hazel_sdop2024-07-29T17:24+09:002024-07-29T17:24+09:002024-07-29T17:24+09:00Multiple vulnerabilities in SKYSEA Client View
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000074.html
SKYSEA Client View provided by Sky Co.,LTD. is an Enterprise IT Asset Management Tool.
SKYSEA Client View contains multiple vulnerabilities listed below.
<ul>
<li>Improper access control in the specific process (CWE-266) - CVE-2024-41139</li>
<li>Origin validation error in shared memory data exchanges (CWE-346) - CVE-2024-41143</li>
<li>Path traversal (CWE-22) - CVE-2024-41726</li>
</ul>
Ruslan Sayfiev, and Denis Faiustov of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to Sky Co.,LTD. and coordinated. Sky Co.,LTD. and JPCERT/CC published respective advisories in order to notify users of the solutions through JVN.JVNDB-2024-000074https://jvn.jp/en/jp/JVN84326763/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-41139https://www.cve.org/CVERecord?id=CVE-2024-41143https://www.cve.org/CVERecord?id=CVE-2024-41726https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:skygroup:skysea_client_viewcpe:/a:skygroup:skysea_client_viewcpe:/a:skygroup:skysea_client_view2024-07-31T14:12+09:002024-07-29T15:28+09:002024-07-31T14:12+09:00Multiple products from Check Point Software Technologies vulnerable to information disclosure
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-004623.html
Multiple products from Check Point Software Technologies contain an information disclosure vulnerability (CWE-200,<a href="https://www.cve.org/CVERecord?id=CVE-2024-24919"target="blank">CVE-2024-24919</a>).
JPCERT/CC coordinated with Check Point Software Technologies to publish this advisory in order to notify users of this vulnerability.JVNDB-2024-004623https://jvn.jp/en/vu/JVNVU98330908/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-24919https://nvd.nist.gov/vuln/detail/CVE-2024-24919https://www.jpcert.or.jp/newsflash/2024053001.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:checkpoint:cloudguard_network_securitycpe:/a:checkpoint:quantum_scalable_chassiscpe:/a:checkpoint:quantum_security_gatewayscpe:/o:checkpoint:quantum_maestrocpe:/o:checkpoint:quantum_spark_firmware2024-10-24T16:37+09:002024-07-29T10:23+09:002024-10-24T16:37+09:00ORC vulnerable to stack-based buffer overflow
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000075.html
ORC provided by GStreamer is typically used when developing GStreamer plugins. Stack-based buffer overflow vulnerability (CWE-121) exists in orcparse.c of ORC.
Yuhei Kawakoya of NTT Security Holdings reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000075https://jvn.jp/en/jp/JVN02030803/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-40897https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:gstreamer_project:orc2024-07-26T13:55+09:002024-07-26T13:55+09:002024-07-26T13:55+09:00Assimp vulnerable to heap-based buffer overflow
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000073.html
Assimp provided by Open Asset Import Library contains a heap-based buffer overflow vulnerability (CWE-122).
Yuhei Kawakoya of NTT Security Holdings reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000073https://jvn.jp/en/jp/JVN87710540/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-40724https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:open_asset_import_library_assimp2024-07-18T13:44+09:002024-07-18T13:44+09:002024-07-18T13:44+09:00Cybozu Garoon vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000072.html
Cybozu Garoon provided by Cybozu, Inc. contains a cross-site scripting vulnerability in PDF preview (CWE-79).
Masato Kinugawa reported this vulnerability to Cybozu, Inc. and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN.JVNDB-2024-000072https://jvn.jp/en/jp/JVN74825766/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-39457https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:cybozu:garoon2024-07-16T16:14+09:002024-07-16T16:14+09:002024-07-16T16:14+09:00FUJITSU Network Edgiot GW1500 vulnerable to path traversal
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000071.html
FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS) provided by Fujitsu Limited contains a path traversal vulnerability (CWE-22).
Eddy HUYNH & Jonathan PAUC from LCIE - BUREAU VERITAS CPS reported this vulnerability to Fujitsu Limited and coordinated. After the coordination was completed, Fujitsu Limited reported the case to JPCERT/CC to notify users of the solution through JVN.JVNDB-2024-000071https://jvn.jp/en/jp/JVN25583987/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-40617https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:fujitsu:fujitsu_network_edgiot_gw1500_%28m2m-gw_for_fenics%292024-07-16T14:41+09:002024-07-16T14:41+09:002024-07-16T14:41+09:00Out-of-bounds write vulnerability in Ricoh MFPs and printers
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000070.html
MFPs (multifunction printers) and printers provided by Ricoh Company, Ltd. contain an out-of-bounds write vulnerability (CWE-787).
Ricoh Company, Ltd. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Ricoh Company, Ltd. coordinated under the Information Security Early Warning Partnership.JVNDB-2024-000070https://jvn.jp/en/jp/JVN14294633/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-39927https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ricoh:multiple_product2024-07-10T14:16+09:002024-07-10T14:16+09:002024-07-10T14:16+09:00Multiple vulnerabilities in multiple Webmin products
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000059.html
Multiple Webmin products contain multiple vulnerabilities listed below.
* sysinfo.cgi is vulnerable to cross-site scripting (CWE-79)
CVE-2024-36450
* session_login.cgi is vulnerable to cross-site scripting (CWE-79)
CVE-2024-36453
* ajaxterm module is vulnerable to improper handling of insufficient permissions or privileges (CWE-280)
CVE-2024-36451
* ajaxterm module is vulnerable to cross-site request forgery (CWE-352)
CVE-2024-36452
CVE-2024-36450, CVE-2024-36451, CVE-2024-36452
Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-36453
hibiki moriyama of STNet, Incorporated reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000059https://jvn.jp/en/jp/JVN81442045/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-36450https://www.cve.org/CVERecord?id=CVE-2024-36451https://www.cve.org/CVERecord?id=CVE-2024-36452https://www.cve.org/CVERecord?id=CVE-2024-36453https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:webmin:usermincpe:/a:webmin:webmincpe:/a:webmin:webmin2024-07-09T14:27+09:002024-07-09T14:27+09:002024-07-09T14:27+09:00Cleartext transmission issue in TONE store App to TONE store
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000069.html
TONE store App provided by DREAM TRAIN INTERNET INC. contains a cleartext transmission issue to TONE store website (CWE-419).
Kodai Karakawa reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000069https://jvn.jp/en/jp/JVN28515217/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-39886https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:dream_train_internet_tone_store_application2024-07-08T13:43+09:002024-07-08T13:43+09:002024-07-08T13:43+09:00JP1/Extensible SNMP Agent fails to restrict access permissions
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000068.html
JP1/Extensible SNMP Agent provided by Hitachi fails to restrict access permissions (CWE-276).
Yutaka Kokubu, Shun Suzaki, and Kazuki Hirota of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000068https://jvn.jp/en/jp/JVN94347255/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-4679https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:job_management_partner1_extensible_snmp_agentcpe:/a:hitachi:jp1_extensible_snmp_agent2024-07-03T14:57+09:002024-07-03T14:57+09:002024-07-03T14:57+09:00Multiple TP-Link products vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003831.html
Multiple products provided by TP-LINK contains an OS command injection vulnerability (CWE-78) related to the backup/restore function.
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-003831https://jvn.jp/en/vu/JVNVU99784493/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-38471https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:tp-link:archer_air_r5_firmwarecpe:/o:tp-link:archer_ax3000_firmwarecpe:/o:tp-link:archer_ax5400_firmwarecpe:/o:tp-link:archer_axe5400_firmwarecpe:/o:tp-link:archer_axe752024-06-28T17:38+09:002024-06-28T17:38+09:002024-06-28T17:38+09:00"Piccoma" App uses a hard-coded API key for an external service
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000067.html
"Piccoma" App for Android and "Piccoma" App for iOS provided by Kakao piccoma Corp. use a hard-coded API key for an external service (CWE-798).
Yoshihito Sakai of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000067https://jvn.jp/en/jp/JVN01073312/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-38480https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:kakao_piccoma_corp_comic_app_to_enjoy_popular_manga_for_Androidcpe:/a:misc:kakao_piccoma_corp_comic_app_to_enjoy_popular_manga_for_ios2024-06-28T13:18+09:002024-06-28T13:18+09:002024-06-28T13:18+09:00WordPress plugins "WP Tweet Walls" and "Sola Testimonials" vulnerable to cross-site request forgery
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000066.html
WordPress plugins "WP Tweet Walls" and "Sola Testimonials" provided by Sola Plugins contain a cross-site request forgery vulnerability (CWE-352).
These vulnerabilities are reported by the following reporters, and
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-38344: Yuya Asato of GMO Cybersecurity by Ierae, Inc.
CVE-2024-38345: Yuta TakanashiJVNDB-2024-000066https://jvn.jp/en/jp/JVN34977158/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-38344https://www.cve.org/CVERecord?id=CVE-2024-38345https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:solaplugins:super_testimonialscpe:/a:solaplugins:wp_tweet_walls2024-06-26T14:25+09:002024-06-26T14:25+09:002024-06-26T14:25+09:00LINE client for iOS vulnerable to universal cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003699.html
The in-app browser of LINE client for iOS provided by LY Corporation contains a universal cross-site scripting vulnerability (CWE-79, CVE-2024-5739).
LY Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
JVNDB-2024-003699https://jvn.jp/en/vu/JVNVU91384468/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-5739https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:linecorp:line2024-06-24T11:05+09:002024-06-24T11:05+09:002024-06-24T11:05+09:00Multiple vulnerabilities in multiple Trend Micro products
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003645.html
Trend Micro Incorporated has released security updates for multiple Trend Micro products.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2024-003645https://jvn.jp/en/vu/JVNVU99027428/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-36302https://www.cve.org/CVERecord?id=CVE-2024-36303https://www.cve.org/CVERecord?id=CVE-2024-36304https://www.cve.org/CVERecord?id=CVE-2024-36305https://www.cve.org/CVERecord?id=CVE-2024-36306https://www.cve.org/CVERecord?id=CVE-2024-36307https://www.cve.org/CVERecord?id=CVE-2024-37289https://www.cve.org/CVERecord?id=CVE-2024-36358https://www.cve.org/CVERecord?id=CVE-2024-36359cpe:/a:trendmicro:apex_onecpe:/a:trendmicro:apex_one_as_a_servicecpe:/a:trendmicro:deep_security_agentcpe:/a:trendmicro:interscan_web_security_virtual_appliance2024-06-20T14:59+09:002024-06-20T14:59+09:002024-06-20T14:59+09:00"ZOZOTOWN" App for Android fails to restrict custom URL schemes properly
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000065.html
"ZOZOTOWN" App for Android provided by ZOZO, Inc. provides the function to access a URL requested via Custom URL Scheme. The App does not restrict access to the function properly (CWE-939) which may be exploited to direct the App to access any sites.JVNDB-2024-000065https://jvn.jp/en/jp/JVN37818611/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-35298https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:zozo_android_app_zozotown2024-06-19T16:04+09:002024-06-19T16:04+09:002024-06-19T16:04+09:00WordPress plugin "SiteGuard WP Plugin" may leak the customized path to the login page
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000064.html
WordPress plugin "SiteGuard WP Plugin" provided by EG Secure Solutions Inc. provides a functionality to customize the path to the login page wp-login.php.
The plugin implements a measure to avoid redirection from other URLs, but missed to implement a measure to avoid redirection from wp-register.php (CWE-201).
Yuuta Watanabe of STNet, Incorporated reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000064https://jvn.jp/en/jp/JVN60331535/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-37881https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:eg-secure_siteguard_wp_plugin2024-06-19T14:25+09:002024-06-19T14:25+09:002024-06-19T14:25+09:00Multiple vulnerabilities in Ricoh Streamline NX PC Client
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000061.html
Ricoh Streamline NX PC Client provided by RICOH COMPANY, LTD. contains multiple vulnerabilities listed below.
* [ricoh-2024-000004] Improper restriction of communication channel to intended endpoints (CWE-923) - CVE-2024-36252
* [ricoh-2024-000005] Use of hard-coded credentials (CWE-798) - CVE-2024-36480
* [ricoh-2024-000006] Use of potentially dangerous function (CWE-676) - CVE-2024-37124
* [ricoh-2024-000007] Use of potentially dangerous function (CWE-676) - CVE-2024-37387
CVE-2024-36252
Cai, Qi Qi of Siemens China Cybersecurity Testing Center - Shadowless Lab reported this vulnerability to RICOH COMPANY, LTD. and coordinated. After the coordination was completed, RICOH COMPANY, LTD. reported the case to IPA to notify users of the solution through JVN.
CVE-2024-36480, CVE-2024-37124, CVE-2024-37387
Abian Blome of Siemens Energy reported these vulnerabilities to RICOH COMPANY, LTD. and coordinated. After the coordination was completed, RICOH COMPANY, LTD. reported the case to IPA to notify users of the solution through JVN.
JVNDB-2024-000061https://jvn.jp/en/jp/JVN00442488/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-36252https://www.cve.org/CVERecord?id=CVE-2024-36480https://www.cve.org/CVERecord?id=CVE-2024-37124https://www.cve.org/CVERecord?id=CVE-2024-37387https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ricoh:streamline_nx_pc_client2024-06-18T14:56+09:002024-06-18T14:56+09:002024-06-18T14:56+09:00Multiple vulnerabilities in ID Link Manager and FUJITSU Software TIME CREATOR
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000063.html
ID Link Manager and FUJITSU Software TIME CREATOR provided by Fsas Technologies Inc. contain multiple vulnerabilities listed below.
* Path Traversal (CWE-36) (CVE-2024-33620)
* Missing Authentication (CWE-306) (CVE-2024-33622)
* Information disclosure (CWE-204) (CVE-2024-34024)
Christian Demko of WithSecure KK reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer Fsas Technologies Inc.JVNDB-2024-000063https://jvn.jp/en/jp/JVN65171386/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-33620https://www.cve.org/CVERecord?id=CVE-2024-33622https://www.cve.org/CVERecord?id=CVE-2024-34024https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:fsas_technologies_fujitsu_business_application_id_link_manager2cpe:/a:misc:fsas_technologies_fujitsu_software_id_link_managercpe:/a:misc:fsas_technologies_fujitsu_software_time_creator_id_link_manager2024-06-18T13:43+09:002024-06-18T13:43+09:002024-06-18T13:43+09:00Multiple vulnerabilities in Toshiba Tec and Oki Electric Industry MFPs
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003539.html
MFPs (multifunction printers) provided by Toshiba Tec Corporation and Oki Electric Industry Co., Ltd. contain multiple vulnerabilities listed below.
<ul>
<li><b>Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') (<a href="https://cwe.mitre.org/data/definitions/776">CWE-776</a>) </b>- CVE-2024-27141, CVE-2024-27142</li>
<li><b>Execution with Unnecessary Privileges (<a href="https://cwe.mitre.org/data/definitions/250">CWE-250</a>) </b>- CVE-2024-27143, CVE-2024-27146, CVE-2024-27147, CVE-2024-3498</li>
<li><b>Incorrect Default Permissions (<a href="https://cwe.mitre.org/data/definitions/276">CWE-276</a>) </b>- CVE-2024-27148, CVE-2024-27149, CVE-2024-27150, CVE-2024-27151, CVE-2024-27152, CVE-2024-27153, CVE-2024-27155, CVE-2024-27167, CVE-2024-27171</li>
<li><b>Path Traversal (<a href="https://cwe.mitre.org/data/definitions/22">CWE-22</a>) </b>- CVE-2024-27144, CVE-2024-27145, CVE-2024-27173, CVE-2024-27174, CVE-2024-27176, CVE-2024-27177, CVE-2024-27178</li>
<li><b>Insertion of Sensitive Information into Log File (<a href="https://cwe.mitre.org/data/definitions/532">CWE-532</a>) </b>- CVE-2024-27154, CVE-2024-27156, CVE-2024-27157</li>
<li><b>Plaintext Storage of a Password (<a href="https://cwe.mitre.org/data/definitions/256">CWE-256</a>) </b>- CVE-2024-27166</li>
<li><b>Debug Messages Revealing Unnecessary Information (<a href="https://cwe.mitre.org/data/definitions/1295">CWE-1295</a>) </b>- CVE-2024-27179</li>
<li><b>Use of Default Credentials (<a href="https://cwe.mitre.org/data/definitions/1392">CWE-1392</a>) </b>- CVE-2024-27158</li>
<li><b>Use of Hard-coded Credentials (<a href="https://cwe.mitre.org/data/definitions/798">CWE-798</a>) </b>- CVE-2024-27159, CVE-2024-27160, CVE-2024-27161, CVE-2024-27168, CVE-2024-27170</li>
<li><b>Use of Hard-coded Password (<a href="https://cwe.mitre.org/data/definitions/259">CWE-259</a>) </b>- CVE-2024-27164</li>
<li><b>Cross-site Scripting (<a href="http://cwe.mitre.org/data/definitions/79">CWE-79</a>) </b>- CVE-2024-27162</li>
<li><b>Cleartext Transmission of Sensitive Information (<a href="https://cwe.mitre.org/data/definitions/319">CWE-319</a>) </b>- CVE-2024-27163</li>
<li><b>Least Privilege Violation (<a href="https://cwe.mitre.org/data/definitions/272">CWE-272</a>) </b>- CVE-2024-27165</li>
<li><b>Missing Authentication for Critical Function (<a href="https://cwe.mitre.org/data/definitions/306">CWE-306</a>) </b>- CVE-2024-27169</li>
<li><b>OS Command Injection (<a href="https://cwe.mitre.org/data/definitions/78">CWE-78</a>) </b>- CVE-2024-27172</li>
<li><b>External Control of File Name or Path (<a href="https://cwe.mitre.org/data/definitions/73">CWE-73</a>) </b>- CVE-2024-27175</li>
<li><b>Time-of-check Time-of-use (TOCTOU) Race Condition (<a href="https://cwe.mitre.org/data/definitions/367">CWE-367</a>) </b>- CVE-2024-27180</li>
<li><b>Authentication Bypass Using an Alternate Path or Channel (<a href="https://cwe.mitre.org/data/definitions/288">CWE-288</a></b>) - CVE-2024-3496</li>
<li><b>Relative Path Traversal (<a href="https://cwe.mitre.org/data/definitions/23">CWE-23</a>) </b>- CVE-2024-3497</li>
</ul>
Toshiba Tec Corporation reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2024-003539https://jvn.jp/en/vu/JVNVU97136265/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-27141https://www.cve.org/CVERecord?id=CVE-2024-27142https://www.cve.org/CVERecord?id=CVE-2024-27143https://www.cve.org/CVERecord?id=CVE-2024-27146https://www.cve.org/CVERecord?id=CVE-2024-27147https://www.cve.org/CVERecord?id=CVE-2024-3498https://www.cve.org/CVERecord?id=CVE-2024-27148https://www.cve.org/CVERecord?id=CVE-2024-27149https://www.cve.org/CVERecord?id=CVE-2024-27150https://www.cve.org/CVERecord?id=CVE-2024-27151https://www.cve.org/CVERecord?id=CVE-2024-27152https://www.cve.org/CVERecord?id=CVE-2024-27153https://www.cve.org/CVERecord?id=CVE-2024-27155https://www.cve.org/CVERecord?id=CVE-2024-27167https://www.cve.org/CVERecord?id=CVE-2024-27171https://www.cve.org/CVERecord?id=CVE-2024-27144https://www.cve.org/CVERecord?id=CVE-2024-27145https://www.cve.org/CVERecord?id=CVE-2024-27173https://www.cve.org/CVERecord?id=CVE-2024-27174https://www.cve.org/CVERecord?id=CVE-2024-27176https://www.cve.org/CVERecord?id=CVE-2024-27177https://www.cve.org/CVERecord?id=CVE-2024-27178https://www.cve.org/CVERecord?id=CVE-2024-27154https://www.cve.org/CVERecord?id=CVE-2024-27156https://www.cve.org/CVERecord?id=CVE-2024-27157https://www.cve.org/CVERecord?id=CVE-2024-27166https://www.cve.org/CVERecord?id=CVE-2024-27179https://www.cve.org/CVERecord?id=CVE-2024-27158https://www.cve.org/CVERecord?id=CVE-2024-27159https://www.cve.org/CVERecord?id=CVE-2024-27160https://www.cve.org/CVERecord?id=CVE-2024-27161https://www.cve.org/CVERecord?id=CVE-2024-27168https://www.cve.org/CVERecord?id=CVE-2024-27170https://www.cve.org/CVERecord?id=CVE-2024-27164https://www.cve.org/CVERecord?id=CVE-2024-27162https://www.cve.org/CVERecord?id=CVE-2024-27163https://www.cve.org/CVERecord?id=CVE-2024-27165https://www.cve.org/CVERecord?id=CVE-2024-27169https://www.cve.org/CVERecord?id=CVE-2024-27172https://www.cve.org/CVERecord?id=CVE-2024-27175https://www.cve.org/CVERecord?id=CVE-2024-27180https://www.cve.org/CVERecord?id=CVE-2024-3496https://www.cve.org/CVERecord?id=CVE-2024-3497https://cwe.mitre.org/data/definitions/1295https://cwe.mitre.org/data/definitions/1392.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/23.htmlhttps://cwe.mitre.org/data/definitions/250.htmlhttps://cwe.mitre.org/data/definitions/256.htmlhttps://cwe.mitre.org/data/definitions/259.htmlhttps://cwe.mitre.org/data/definitions/272.htmlhttps://cwe.mitre.org/data/definitions/276.htmlhttps://cwe.mitre.org/data/definitions/288.htmlhttps://cwe.mitre.org/data/definitions/306.htmlhttps://cwe.mitre.org/data/definitions/319.htmlhttps://cwe.mitre.org/data/definitions/367.htmlhttps://cwe.mitre.org/data/definitions/532.htmlhttps://cwe.mitre.org/data/definitions/73.htmlhttp://cwe.mitre.org/data/definitions/776.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/798.htmlcpe:/a:misc:oki_electric_industry_multiple_productcpe:/a:toshibatec:multiple_product2024-06-17T15:21+09:002024-06-17T15:21+09:002024-06-17T15:21+09:00Denial-of-service (DoS) vulnerability in IPCOM WAF function
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000062.html
WAF function of IPCOM provided by Fsas Technologies Inc. contains a denial-of-service (DoS) vulnerability (CWE-908).
Fsas Technologies Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Fsas Technologies Inc. coordinated under the Information Security Early Warning Partnership.JVNDB-2024-000062https://jvn.jp/en/jp/JVN25594256/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-36454https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:fsas_technologies_ipcomcpe:/a:misc:fsas_technologies_ipcom2024-06-12T15:03+09:002024-06-12T15:03+09:002024-06-12T15:03+09:00WordPress Plugin "Music Store - WordPress eCommerce" vulnerable to SQL injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000058.html
WordPress Plugin "Music Store - WordPress eCommerce" provided by CodePeople contains an SQL injection vulnerability (CWE-89).
Daiki Sato of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000058https://jvn.jp/en/jp/JVN79213252/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-36082https://nvd.nist.gov/vuln/detail/CVE-2024-36082https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:codepeople:music_store2024-06-10T17:08+09:002024-06-07T15:24+09:002024-06-10T17:08+09:00Multiple vulnerabilities in "FreeFrom - the nostr client" App
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000060.html
"FreeFrom - the nostr client" App provided by FreeFrom K.K. contains multiple vulnerabilities listed below.
<ul><li>Improper verification of cryptographic signature (CWE-347) - CVE-2024-36277</li>
<li>Reliance on obfuscation or encryption of security-relevant inputs without integrity checking (CWE-649) - CVE-2024-36279</li>
<li>Reusing a nonce, key pair in encryption (CWE-323) - CVE-2024-36289</li></ul>
The people listed below reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Hayato Kimura of University of Hyogo
Ryoma Ito of National Institute of Information and Communications Technology (NICT)
Kazuhiko Minematsu of NEC Corporation/Yokohama National University
Takanori Isobe of University of HyogoJVNDB-2024-000060https://jvn.jp/en/jp/JVN55045256/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-36277https://www.cve.org/CVERecord?id=CVE-2024-36279https://www.cve.org/CVERecord?id=CVE-2024-36289https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:freefrom_android_app_freefrom-the_nostr_clientcpe:/a:misc:freefrom_iOS_app_freefrom-the_nostr_client2024-06-07T14:51+09:002024-06-07T14:51+09:002024-06-07T14:51+09:00Multiple vulnerabilities in UNIVERSAL PASSPORT RX
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000057.html
UNIVERSAL PASSPORT RX provided by Japan System Techniques Co., Ltd. contains multiple vulnerabilities listed below.
<ul><li>Cross-site scripting (CWE-79) - CVE-2023-42427</li>
<li>Dependency on vulnerable third-party component (CWE-1395)<br />
Known vulnerability in Primefaces library used in the product</li>
<li>Cross-site scripting (CWE-79) - CVE-2023-51436</li></ul>
CVE-2023-42427
Japan System Techniques Co., Ltd. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Japan System Techniques Co., Ltd. coordinated under the Information Security Early Warning Partnership.
Known vulnerability in Primefaces library
Morita Keiichi and Watanabe Kosuke of Tokyo Denki University reported to Japan System Techniques Co., Ltd. that this vulnerability still exists in the product and coordinated. Japan System Techniques Co., Ltd. and JPCERT/CC published respective advisories in order to notify users of this vulnerability.
CVE-2023-51436
MATSUMOTO Yuuki of Tokyo University of Information Sciences reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000057https://jvn.jp/en/jp/JVN43215077/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-42427https://www.cve.org/CVERecord?id=CVE-2023-51436https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:japan_system_techniques_universal_passport_rxcpe:/a:misc:japan_system_techniques_universal_passport_rx2024-06-03T15:32+09:002024-06-03T15:32+09:002024-06-03T15:32+09:00Seiko Solutions SkyBridge MB-A100/MB-A110 and SkyBridge BASIC MB-A130 vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003254.html
SkyBridge MB-A100/MB-A110 and SkyBridge BASIC MB-A130 provided by Seiko Solutions Inc. contain a command injection vulnerability (CWE-77).
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-003254https://jvn.jp/en/vu/JVNVU94872523/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-32850https://cwe.mitre.org/data/definitions/77.htmlcpe:/o:seiko-sol:skybridge_basic_mb-a130_firmwarecpe:/o:seiko-sol:skybridge_mb-a100_firmwarecpe:/o:seiko-sol:skybridge_mb-a110_firmware2024-06-03T14:53+09:002024-06-03T14:53+09:002024-06-03T14:53+09:00Multiple vulnerabilities in Sharp and Toshiba Tec MFPs
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003253.html
Sharp and Toshiba Tec MFPs (multifunction printers) contain multiple vulnerabilities listed below.
* Stack-based Buffer Overflow (CWE-121) - CVE-2024-28038
* Incorrect Permission Assignment for Critical Resource (CWE-732) - CVE-2024-28955
* Cleartext Storage of Sensitive Information (CWE-312) - CVE-2024-29146
* Plaintext Storage of a Password (CWE-256) - CVE-2024-29978
* Storing Passwords in a Recoverable Format (CWE-257) - CVE-2024-32151
* Path Traversal (CWE-22) - CVE-2024-33605
* Improper Access Control (CWE-284) - CVE-2024-33610, CVE-2024-33616
* Access to Critical Private Variable via Public Method (CWE-767) - CVE-2024-34162
* Use of Hard-coded Credentials (CWE-798) - CVE-2024-35244, CVE-2024-36248
* Cross-site Scripting (CWE-79) - CVE-2024-36249
* Out-of-bounds Read (CWE-125) - CVE-2024-36251, CVE-2024-36254
As for the vulnerabilities listed below, Pierre Barre reported them to JPCERT/CC, and JPCERT/CC coordinated with Sharp Corporation.
CVE-2024-28038, CVE-2024-28955, CVE-2024-29146, CVE-2024-29978, CVE-2024-32151, CVE-2024-33605, CVE-2024-33610, CVE-2024-33616, CVE-2024-34162, CVE-2024-35244, CVE-2024-36248, CVE-2024-36251, CVE-2024-36254
As for the vulnerabilities listed below, Sharp Corporation received reports and coordinated with the reporters directly, and after the coordination was completed, Sharp reported them to JPCERT/CC to notify the users of the solutions through JVN.
CVE-2024-33610, CVE-2024-36249, CVE-2024-36251, CVE-2024-36254JVNDB-2024-003253https://jvn.jp/en/vu/JVNVU93051062/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-28038https://www.cve.org/CVERecord?id=CVE-2024-28955https://www.cve.org/CVERecord?id=CVE-2024-29146https://www.cve.org/CVERecord?id=CVE-2024-29978https://www.cve.org/CVERecord?id=CVE-2024-32151https://www.cve.org/CVERecord?id=CVE-2024-33605https://www.cve.org/CVERecord?id=CVE-2024-33610https://www.cve.org/CVERecord?id=CVE-2024-33616https://www.cve.org/CVERecord?id=CVE-2024-34162https://www.cve.org/CVERecord?id=CVE-2024-35244https://www.cve.org/CVERecord?id=CVE-2024-36248https://www.cve.org/CVERecord?id=CVE-2024-36249https://www.cve.org/CVERecord?id=CVE-2024-36251https://www.cve.org/CVERecord?id=CVE-2024-36254https://cwe.mitre.org/data/definitions/121.htmlhttps://cwe.mitre.org/data/definitions/125.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/256.htmlhttps://cwe.mitre.org/data/definitions/257.htmlhttps://cwe.mitre.org/data/definitions/284.htmlhttps://cwe.mitre.org/data/definitions/312.htmlhttps://cwe.mitre.org/data/definitions/732.htmlhttps://cwe.mitre.org/data/definitions/767.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/798.htmlcpe:/a:sharp:multiple_productcpe:/a:toshibatec:multiple_product2024-06-03T14:36+09:002024-06-03T14:36+09:002024-06-03T14:36+09:00awkblog vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000056.html
awkblog provided by Keisuke Nakayama contains an OS command injection vulnerability (CWE-78).
Keigo YAMAZAKI of LAC Co., Ltd. / Nuligen Security Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000056https://jvn.jp/en/jp/JVN80506242/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-36360https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:keisuke_nakayama_awkblog2024-05-30T14:39+09:002024-05-30T14:39+09:002024-05-30T14:39+09:00Redmine DMSF Plugin vulnerable to path traversal
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000055.html
Redmine DMSF Plugin provided by Kontron contains a path traversal vulnerability (CWE-22).
Tsukuba Secure Network Research Co. Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000055https://jvn.jp/en/jp/JVN22182715/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-36267https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:kontron_redmine_dmsf_plugin2024-05-29T14:13+09:002024-05-29T14:13+09:002024-05-29T14:13+09:00EC-Orange vulnerable to authorization bypass
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000054.html
EC-Orange provided by S-cubism Inc. is an e-commerce website building system package based on an open source software EC-CUBE.
EC-Orange contains an authorization bypass vulnerability (CWE-639).
This is the same issue as JVN#51770585 (EC-CUBE vulnerable to authorization bypass).
This vulnerability was reported on July 2015.
The coordination with the developer was resumed on December 2023, and this JVN publication was agreed upon.JVNDB-2024-000054https://jvn.jp/en/jp/JVN15637138/index.htmlhttps://jvn.jp/en/jp/JVN51770585/index.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0808https://nvd.nist.gov/vuln/detail/CVE-2014-0808https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:scubism_ec-orange2024-05-29T14:06+09:002024-05-29T14:06+09:002024-05-29T14:06+09:00ELECOM wireless LAN routers vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003249.html
Wireless LAN routers provided by ELECOM CO.,LTD. contain an OS command injection vulnerability (CWE-78).
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-003249https://jvn.jp/en/vu/JVNVU97214223/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-36103https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:elecom:wrc-x5400gs-bcpe:/o:elecom:wrc-x5400gsa-b2024-05-29T12:33+09:002024-05-29T12:33+09:002024-05-29T12:33+09:00Multiple vulnerabilities in Unifier and Unifier Cast
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000053.html
Unifier and Unifier Cast provided by Yokogawa Rental & Lease Corporation contains multiple vulnerabilities listed below.
<ul>
<li><b>Incorrect Default Permissions configured by Cast Launcher (<a href="https://cwe.mitre.org/data/definitions/276.html">CWE-276</a>)</b> - CVE-2024-23847
</li>
<li><b>Missing Authorization for coejobhook Command Execution (<a href="https://cwe.mitre.org/data/definitions/862.html">CWE-862</a>)</b> - CVE-2024-36246
</li>
</ul>
CVE-2024-23847
Yokogawa Rental & Lease Corporation reported this vulnerability to IPA to notify users of its solution through JVN.
JPCERT/CC and Yokogawa Rental & Lease Corporation coordinated under the Information Security Early Warning Partnership.
CVE-2024-36246
Taisei Ogura of MOTEX Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000053https://jvn.jp/en/jp/JVN17680667/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-23847https://www.cve.org/CVERecord?id=CVE-2024-36246https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:yrl:yokogawa_renta_unifiercpe:/a:yrl:yokogawa_renta_unifier_cast2024-05-28T14:47+09:002024-05-28T14:47+09:002024-05-28T14:47+09:00Multiple vulnerabilities in UTAU
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000052.html
UTAU provided by ameya/ayame contains multiple vulnerabilities listed below.
<ul>
<li><b>OS command injection (<a href="https://cwe.mitre.org/data/definitions/78.html">CWE-78</a>)</b> - CVE-2024-28886
</li>
<li><b>Path Traversal (<a href="https://cwe.mitre.org/data/definitions/22.html">CWE-22</a>)</b> - CVE-2024-32944
</li>
</ul>
Yu Ishibashi reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000052https://jvn.jp/en/jp/JVN71404925/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-28886https://www.cve.org/CVERecord?id=CVE-2024-32944https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:ameya_ayame_utau2024-05-28T14:23+09:002024-05-28T14:23+09:002024-05-28T14:23+09:00OMRON NJ/NX series vulnerable to insufficient verification of data authenticity
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003242.html
Machine Automation Controller NJ/NX series provided by OMRON Corporation contain an issue with insufficient verification of data authenticity (CWE-345).
OMRON Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.JVNDB-2024-003242https://jvn.jp/en/vu/JVNVU92504444/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-33687https://nvd.nist.gov/vuln/detail/CVE-2024-33687https://cwe.mitre.org/data/definitions/345.htmlcpe:/a:omron:machine_automation_controller_nj_seriescpe:/a:omron:machine_automation_controller_nx_series2024-07-26T16:27+09:002024-05-28T12:28+09:002024-07-26T16:27+09:00Splunk Config Explorer vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000051.html
Splunk Config Explorer provided by Chris Younger contains a reflected cross-site scripting vulnerability (CWE-79).
Taihei Shimamine of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000051https://jvn.jp/en/jp/JVN56781258/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-35291https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:chris_younger_splunk_config_explorer2024-05-24T13:50+09:002024-05-24T13:50+09:002024-05-24T13:50+09:00WordPress Plugin "WP Booking" vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000050.html
WordPress Plugin "WP Booking" provided by aviplugins.com contains a stored cross-site scripting vulnerability (CWE-79).
Daiki Sato of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000050https://jvn.jp/en/jp/JVN35838128/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-35297https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:aviplugins.com_wp_booking2024-05-24T13:41+09:002024-05-24T13:41+09:002024-05-24T13:41+09:00Android App "TP-Link Tether" and "TP-Link Tapo" vulnerable to improper server certificate verification
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000046.html
Android App "TP-Link Tether" and "TP-Link Tapo" provided by TP-LINK GLOBAL INC. are vulnerable to improper server certificate verification (CWE-295).
Kenichiro Ito of TDU Cryptography Lab. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000046https://jvn.jp/en/jp/JVN29471697/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-31340https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:tp-link_global_inc_tethercpe:/o:misc:tp-link_global_inc_tapo2024-05-21T13:33+09:002024-05-21T13:33+09:002024-05-21T13:33+09:00Panasonic KW Watcher vulnerable to memory buffer error
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003188.html
KW Watcher provided by Panasonic contains a vulnerability due to improper restriction of operations within the bounds of a memory buffer (CWE-119, CVE-2024-4162).
Michael Heinzl reported this vulnerability to Panasonic and coordinated.
After the coordination was completed, Panasonic reported the case to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2024-003188https://jvn.jp/en/vu/JVNVU95120091/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-4162https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:panasonic:kw_watcher2024-05-17T15:46+09:002024-05-17T15:46+09:002024-05-17T15:46+09:00Ruijie BCR810W/BCR860 vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-021762.html
Network router BCR810W/BCR860 provided by Ruijie Networks Co., Ltd. contains an OS command injection vulnerability (CVE-2023-3608, CWE-78).
Note that this vulnerability can only be exploited when the BCOS port of the product is connected to the Internet.
JPCERT/CC has confirmed attacks attempt to exploit this vulnerability.JVNDB-2023-021762https://jvn.jp/en/vu/JVNVU92249385/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-3608https://nvd.nist.gov/vuln/detail/CVE-2023-3608https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:ruijie:rg-bcr810w_firmwarecpe:/o:ruijie:rg-bcr860_firmware2024-05-17T13:54+09:002024-05-17T13:54+09:002024-05-17T13:54+09:00WordPress Plugin "Download Plugins and Themes from Dashboard" vulnerable to path traversal
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000049.html
WordPress Plugin "Download Plugins and Themes from Dashboard" provided by WPFactory LLC contains a path traversal vulnerability (CWE-22).
Gen Sato of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to WPFactory LLC and coordinated. After the coordination was completed, this case was reported to IPA under Information Security Early Warning Partnership, and JPCERT/CC coordinated with the developer for publishing of this advisory.JVNDB-2024-000049https://jvn.jp/en/jp/JVN85380030/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-35162https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:wpfactory_download_plugins_and_themes_from_dashboard2024-05-17T13:33+09:002024-05-17T13:33+09:002024-05-17T13:33+09:00Multiple vulnerabilities in Field Logic DataCube
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003187.html
DataCube provided by Field Logic Inc. contains multiple vulnerabilities listed below.
* Direct Request ('Forced Browsing') (CWE-425) - CVE-2024-25830
* Reflected cross-site scripting (CWE-79) - CVE-2024-25831
* Unrestricted upload of file with dangerous type (CWE-434) - CVE-2024-25832
* SQL injection (CWE-89) - CVE-2024-25833
CVE-2024-25830, CVE-2024-25831, CVE-2024-25832, CVE-2024-25833
Thomas J. Knudsen and Samy Younsi of NeroTeam Security Labs reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
CVE-2024-25832
CV3TR4CK reported this vulnerability to JPCERT/CC during the coordination based on the above report.JVNDB-2024-003187https://jvn.jp/en/vu/JVNVU95350607/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-25830https://www.cve.org/CVERecord?id=CVE-2024-25831https://www.cve.org/CVERecord?id=CVE-2024-25832https://www.cve.org/CVERecord?id=CVE-2024-25833https://neroteam.com/blog/f-logic-datacube3-vulnerability-reporthttps://cwe.mitre.org/data/definitions/425.htmlhttps://cwe.mitre.org/data/definitions/434.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:f-logic:datacube3_firmwarecpe:/o:f-logic:datacube4_firmware2024-05-17T12:05+09:002024-05-17T12:05+09:002024-05-17T12:05+09:00Central Dogma vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-002342.html
Central Dogma provided by LY Corporation contains a cross-site scripting vulnerability (CWE-79, CVE-2024-1143) because RelayState data is not properly treated when Central Dogma processes SAML messages.
LY Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.JVNDB-2024-002342https://jvn.jp/en/vu/JVNVU99669446/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-1143https://nvd.nist.gov/vuln/detail/CVE-2024-1143https://docs.oasis-open.org/security/saml/v2.0/errata05/os/saml-v2.0-errata05-os.html#__RefHeading__8196_1983180497https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:linecorp:central_dogma2024-05-13T17:27+09:002024-05-13T17:27+09:002024-05-13T17:27+09:00Multiple vulnerabilities in Cybozu Garoon
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000047.html
Cybozu Garoon provided by Cybozu, Inc. contains multiple vulnerabilities listed below.
* [CyVDB-3167] Improper handling of data in Mail (CWE-231) - CVE-2024-31397
* [CyVDB-3221] Improper restriction on the output of some API (CWE-201) - CVE-2024-31398
* [CyVDB-3238] Excessive resource consumption in Mail (CWE-1050) - CVE-2024-31399
* [CyVDB-3439] Cross-site scripting vulnerability in Scheduler (CWE-79) - CVE-2024-31401
* [CyVDB-3441] Improper restriction on some operation in Shared To-Dos (CWE-863) - CVE-2024-31402
* [CyVDB-3402] Information disclosure in Mail (CWE-201) - CVE-2024-31400
* [CyVDB-3151] Improper restriction on browsing and operation in Memo (CWE-863) - CVE-2024-31403
* [CyVDB-3471] Browse restriction bypass in Scheduler (CWE-201) - CVE-2024-31404
CVE-2024-31401
@bttthuan reported this vulnerability to Cybozu, Inc. and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN.
CVE-2024-31403
Yuji Tounai reported this vulnerability to Cybozu, Inc. and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN.
CVE-2024-31397, CVE-2024-31398, CVE-2024-31399, CVE-2024-31400, CVE-2024-31402, CVE-2024-31404
Cybozu, Inc. reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2024-000047https://jvn.jp/en/jp/JVN28869536/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-31397https://www.cve.org/CVERecord?id=CVE-2024-31398https://www.cve.org/CVERecord?id=CVE-2024-31399https://www.cve.org/CVERecord?id=CVE-2024-31400https://www.cve.org/CVERecord?id=CVE-2024-31401https://www.cve.org/CVERecord?id=CVE-2024-31402https://www.cve.org/CVERecord?id=CVE-2024-31403https://www.cve.org/CVERecord?id=CVE-2024-31404https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:cybozu:garoon2024-05-13T15:19+09:002024-05-13T15:19+09:002024-05-13T15:19+09:00"OfferBox" App uses a hard-coded secret key
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000045.html
"OfferBox" App provided by i-plug inc. uses a hard-coded secret key for JWT (CWE-321).
Yuta Yamate of Rakuten Group, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000045https://jvn.jp/en/jp/JVN83405304/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-32988https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:i-plug_inc_offerbox2024-05-10T15:11+09:002024-05-10T15:11+09:002024-05-10T15:11+09:00Hidden Functionality vulnerability in DT900
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003181.html
DT900 contains a Hidden Functionality vulnerability(CWE-912). Specified versions allow an attacker to access the system setting.
reported by Mr. Gianluca Altomani and Mr. Manuel Romei. for NEC-PSIRT
JVNDB-2024-003181https://www.cve.org/CVERecord?id=CVE-2024-3016https://cwe.mitre.org/data/definitions/912.htmlcpe:/o:nec:dt9002024-05-10T13:59+09:002024-05-10T13:59+09:002024-05-10T13:59+09:00Phormer vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000048.html
Phormer contains a cross-site scripting vulnerability (CWE-79).
Daiki Fukumori of Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000048https://jvn.jp/en/jp/JVN61054671/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-34749https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:aidin_phormer2024-05-10T13:48+09:002024-05-10T13:48+09:002024-05-10T13:48+09:00Multiple vulnerabilities in MosP kintai kanri
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000043.html
MosP kintai kanri provided by esMind, LLC contains multiple vulnerabilities listed below.
<ul><li>Path Traversal (CWE-22) - CVE-2024-28880</li><li>Incorrect Permission Assignment for Critical Resource (CWE-732) - CVE-2024-29078</li></ul>
Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000043https://jvn.jp/en/jp/JVN97751842/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-28880https://www.cve.org/CVERecord?id=CVE-2024-29078https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:e-s-mind_mosp_kintai_kanri2024-05-09T14:10+09:002024-05-09T14:10+09:002024-05-09T14:10+09:00WordPress Plugin "Heateor Social Login WordPress" vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000044.html
WordPress Plugin "Heateor Social Login WordPress" provided by Heateor contains a stored cross-site scripting vulnerability (CWE-79).
Daiki Sato of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000044https://jvn.jp/en/jp/JVN87694318/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-32674https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:heateor:social_login2024-05-08T13:43+09:002024-05-08T13:43+09:002024-05-08T13:43+09:00Trend Micro Maximum Security vulnerable to improper link resolution (CVE-2024-32849)
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003178.html
Trend Micro Incorporated has released a security update for Trend Micro Maximum Security, fixing an improper link resolution vulnerability(CWE-59, CVE-2024-32849).
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.JVNDB-2024-003178https://jvn.jp/en/vu/JVNVU97614828/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-32849https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:trendmicro:maximum_security2024-05-08T10:19+09:002024-05-08T10:19+09:002024-05-08T10:19+09:00NETGEAR routers vulnerable to buffer overflow
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003119.html
Multiple routers provided by NETGEAR Inc. contain a buffer overflow vulnerability (CWE-121, CVE-2023-27368).
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-003119https://jvn.jp/en/vu/JVNVU91883072/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27368https://claroty.com/team82/disclosure-dashboard/cve-2023-27368https://cwe.mitre.org/data/definitions/121.htmlcpe:/o:netgear:rax35_firmwarecpe:/o:netgear:rax38_firmwarecpe:/o:netgear:rax40_firmware2024-04-25T11:21+09:002024-04-25T11:21+09:002024-04-25T11:21+09:00Multiple vulnerabilities in RoamWiFi R10
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000042.html
RoamWiFi R10 provided by RoamWiFi Technology Co., Ltd. contains multiple vulnerabilities listed below.
* Active debug code (CWE-489) - CVE-2024-31406
* Insertion of sensitive information into log file (CWE-532) - CVE-2024-32051
Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000042https://jvn.jp/en/jp/JVN62737544/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-31406https://www.cve.org/CVERecord?id=CVE-2024-32051https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:misc:roamwifi_technology_roamwifi_r102024-04-24T13:44+09:002024-04-24T13:44+09:002024-04-24T13:44+09:00Multiple vulnerabilities in OMRON Sysmac Studio/CX-One and CX-Programmer
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003116.html
OMRON Sysmac Studio/CX-One and CX-Programmer contain multiple vulnerabilities listed below.
* Out-of-bounds read (CWE-125) - CVE-2024-31412
* Free of pointer not at start of buffer (CWE-761) - CVE-2024-31413
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-003116https://jvn.jp/en/vu/JVNVU98274902/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-31412https://www.cve.org/CVERecord?id=CVE-2024-31413https://cwe.mitre.org/data/definitions/125.htmlhttps://cwe.mitre.org/data/definitions/761.htmlcpe:/a:omron:cx-onecpe:/a:omron:cx-programmercpe:/a:omron:sysmac_studio2024-04-24T10:13+09:002024-04-24T10:13+09:002024-04-24T10:13+09:00TvRock vulnerable to cross-site request forgery
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000901.html
TvRock <http://1st.geocities.jp/tvrock_web/> provided by TvRock (according to the original report submitted by the reporter) is a tool to set a timer recording for a TV program.
TvRock contains a cross-site request forgery vulnerability (CWE-352).
During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied.
1. The developer of the product is unreachable
2. Existence of vulnerability has been verified
3. Not disclosing this case may result in the risk that product users will have no means to know of the existence of the vulnerability in the product
4. There are no particular reasons that would make disclosure inappropriateJVNDB-2024-000901https://jvn.jp/en/jp/JVN24683352/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-23597https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:tvrock_tvrock2024-04-23T18:22+09:002024-04-23T18:22+09:002024-04-23T18:22+09:00TvRock vulnerable to denial-of-service (DoS)
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000903.html
TvRock <http://1st.geocities.jp/tvrock_web/> provided by TvRock (according to the original report submitted by the reporter) is a tool to set a timer recording for a TV program.
TvRock contains a denial-of-service (DoS) vulnerability (CWE-400).
During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied.
1. The developer of the product is unreachable
2. Existence of vulnerability has been verified
3. Not disclosing this case may result in the risk that product users will have no means to know of the existence of the vulnerability in the product
4. There are no particular reasons that would make disclosure inappropriateJVNDB-2024-000903https://jvn.jp/en/jp/JVN40079147/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-24978https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:tvrock_tvrock2024-04-23T18:21+09:002024-04-23T18:21+09:002024-04-23T18:21+09:00Armeria-saml improperly handles SAML messages
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003108.html
Armeria-saml provided by LY Corporation contains an issue in handling SAML messages (CWE-304, CVE-2024-1735).
LY Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.JVNDB-2024-003108https://jvn.jp/en/vu/JVNVU91216202/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-1735https://cwe.mitre.org/data/definitions/304.htmlcpe:/a:linecorp:armeria-saml2024-04-22T17:28+09:002024-04-22T17:28+09:002024-04-22T17:28+09:00LINE client for iOS vulnerable to improper server certificate verification
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-014491.html
The financial module within LINE client for iOS lacks server certificate verification in log transmission (CWE-295, CVE-2023-5554).
LINE Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.JVNDB-2023-014491https://jvn.jp/en/vu/JVNVU91696361/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-5554https://nvd.nist.gov/vuln/detail/CVE-2023-5554https://cwe.mitre.org/data/definitions/295.htmlcpe:/a:linecorp:line2024-04-22T15:27+09:002024-04-22T15:27+09:002024-04-22T15:27+09:00Multiple vulnerabilities in WordPress Plugin "Forminator"
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000041.html
WordPress Plugin "Forminator" provided by WPMU DEV contains multiple vulnerabilities listed below.
* Unrestricted upload of file with dangerous type (CWE-434)
* SQL injection (CWE-89)
* Cross-site scripting (CWE-79)
hibiki moriyama of STNet, Incorporated reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000041https://jvn.jp/en/jp/JVN50132400/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-28890https://www.cve.org/CVERecord?id=CVE-2024-31077https://www.cve.org/CVERecord?id=CVE-2024-31857https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:wpmudev:forminator2024-04-18T13:53+09:002024-04-18T13:53+09:002024-04-18T13:53+09:00Proscend Communications M330-W and M330-W5 vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2022-017175.html
M330-W and M330-W5 provided by Proscend Communications Inc. are LTE Industrial Cellular Routers. M330-W and M330-W5 contain an OS command injection vulnerability (CWE-78).
CYNEX Analysis Team of National Institute of Information and Communications Technology reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-017175https://jvn.jp/en/jp/JVN23835228/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-36779https://nvd.nist.gov/vuln/detail/CVE-2022-36779https://www.gov.il/en/departments/faq/cve_advisorieshttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:proscend:m330-w5_firmwarecpe:/o:proscend:m330-w_firmware2024-04-16T14:30+09:002024-04-16T14:30+09:002024-04-16T14:30+09:00Multiple vulnerabilities in BUFFALO wireless LAN routers
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000040.html
Multiple wireless LAN routers provided by BUFFALO INC. contain multiple vulnerabilities listed below.
* Plaintext storage of a password (CWE-256)
* OS Command Injection (CWE-78)
Satoru Nagaoka of Cyber Defense Institute, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000040https://jvn.jp/en/jp/JVN58236836/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-23486https://www.cve.org/CVERecord?id=CVE-2024-26023https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:buffalo_inc:wcr-1166ds_firmwarecpe:/o:buffalo_inc:wsr-1166dhp2_firmwarecpe:/o:buffalo_inc:wsr-1166dhp_firmwarecpe:/o:buffalo_inc:wsr-2533dhp2_firmwarecpe:/o:buffalo_inc:wsr-2533dhpl_firmwarecpe:/o:buffalo_inc:wsr-2533dhp_firmwarecpe:/o:buffalo_inc:wsr-a2533dhp2_firmware2024-04-15T16:29+09:002024-04-15T16:29+09:002024-04-15T16:29+09:00Multiple vulnerabilities in a-blog cms
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000039.html
a-blog cms provided by appleple inc. contains multiple vulnerabilities listed below.
* Stored cross-site scripting vulnerability in Entry editing pages (CWE-79) - CVE-2024-30419
* Server-side request forgery (CWE-918) - CVE-2024-30420
* Directory traversal (CWE-22) - CVE-2024-31394
* Stored cross-site scripting vulnerability in Schedule labeling pages (CWE-79) - CVE-2024-31395
* Code injection (CWE-94) - CVE-2024-31396
Rikuto Tauchi of sangi reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000039https://jvn.jp/en/jp/JVN70977403/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-30419https://www.cve.org/CVERecord?id=CVE-2024-30420https://www.cve.org/CVERecord?id=CVE-2024-31394https://www.cve.org/CVERecord?id=CVE-2024-31395https://www.cve.org/CVERecord?id=CVE-2024-31396https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:appleple:a-blog_cms2024-04-10T13:55+09:002024-04-10T13:55+09:002024-04-10T13:55+09:00Multiple vulnerabilities in WordPress Plugin "Ninja Forms"
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000038.html
WordPress Plugin "Ninja Forms" provided by Saturday Drive contains multiple vulnerabilities listed below.
* Cross-site request forgery (CWE-352) - CVE-2024-25572
* Stored cross-site scripting in submit processing (CWE-79) - CVE-2024-26019
* Stored cross-site scripting in custom fields for labels (CWE-79) - CVE-2024-29220
CVE-2024-25572
Kohei Agena reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-26019, CVE-2024-29220
Ryotaro Imamura of SB Technology Corp. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000038https://jvn.jp/en/jp/JVN50361500/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-25572https://www.cve.org/CVERecord?id=CVE-2024-26019https://www.cve.org/CVERecord?id=CVE-2024-29220https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ninjaforms:ninja_forms2024-04-08T13:44+09:002024-04-08T13:44+09:002024-04-08T13:44+09:00Multiple vulnerabilities in Cente middleware
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003068.html
Some products in Cente middleware TCP/IP Network Series developed by DMG MORI Digital Co., LTD. and provided by NEXT Co., Ltd. contain multiple vulnerabilities listed below.
* Out-of-bounds Read caused by improper checking of the option length values in IPv6 NDP packets (CWE-125)
* Out-of-bounds Read caused by improper checking of the option length values in IPv6 headers (CWE-125)
* Generation of Predictable Identifiers (CWE-340)
DMG MORI Digital Co., LTD. reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2024-003068https://jvn.jp/en/vu/JVNVU94016877/index.htmlhttps://jvn.jp/en/vu/JVNVU96959731/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-28957https://www.cve.org/CVERecord?id=CVE-2024-23911https://www.cve.org/CVERecord?id=CVE-2024-28894https://www.cisa.gov/news-events/ics-advisories/icsa-24-263-02https://cwe.mitre.org/data/definitions/125.htmlhttps://cwe.mitre.org/data/definitions/340.htmlcpe:/a:misc:next_cente_ipv6cpe:/a:misc:next_cente_tcp%2Fipv42024-09-24T15:00+09:002024-04-05T15:36+09:002024-09-24T15:00+09:00Multiple vulnerabilities in NEC Aterm series
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000037.html
Aterm series provided by NEC Corporation contains multiple vulnerabilities listed below.
<ul>
<li>Incorrect Permission Assignment for Critical Resource (CWE-732) - CVE-2024-28005</li>
<li>Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) - CVE-2024-28006</li>
<li>Incorrect Permission Assignment for Critical Resource (CWE-732) - CVE-2024-28007</li>
<li>Active Debug Code (CWE-489) - CVE-2024-28008</li>
<li>Use of Weak Credentials (CWE-1391) - CVE-2024-28009, CVE-2024-28012</li>
<li>Use of Hard-coded Credentials (CWE-798) - CVE-2024-28010</li>
<li>Inclusion of Undocumented Features (CWE-1242) - CVE-2024-28011</li>
<li>Insufficient Session Expiration (CWE-613) - CVE-2024-28013</li>
<li>Buffer Overflow (CWE-120) - CVE-2024-28014</li>
<li>OS Command Injection in the web management console (CWE-78) - CVE-2024-28015</li>
<li>Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) - CVE-2024-28016</li>
</ul>
The following people reported the vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-28005, CVE-2024-28008
Ryo Kashiro, and Katsuhiko Sato, and Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University
CVE-2024-28006, CVE-2024-28007, CVE-2024-28009, CVE-2024-28010, CVE-2024-28011, CVE-2024-28012
Ryo Kashiro, and Katsuhiko Sato
CVE-2024-28013
Yudai Morii, Takaya Noma, Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University
CVE-2024-28014, CVE-2024-28015, CVE-2024-28016
Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National UniversityJVNDB-2024-000037https://jvn.jp/en/jp/JVN82074338/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-28005https://www.cve.org/CVERecord?id=CVE-2024-28006https://www.cve.org/CVERecord?id=CVE-2024-28007https://www.cve.org/CVERecord?id=CVE-2024-28008https://www.cve.org/CVERecord?id=CVE-2024-28009https://www.cve.org/CVERecord?id=CVE-2024-28010https://www.cve.org/CVERecord?id=CVE-2024-28011https://www.cve.org/CVERecord?id=CVE-2024-28012https://www.cve.org/CVERecord?id=CVE-2024-28013https://www.cve.org/CVERecord?id=CVE-2024-28014https://www.cve.org/CVERecord?id=CVE-2024-28015https://www.cve.org/CVERecord?id=CVE-2024-280016https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/h:nec:atermwm3400rncpe:/h:nec:atermwm3450rncpe:/h:nec:atermwm3600rcpe:/h:nec:atermwr8160ncpe:/o:nec:aterm_cr2500pcpe:/o:nec:aterm_mr01lncpe:/o:nec:aterm_mr02lncpe:/o:nec:aterm_w1200ex(-ms)cpe:/o:nec:aterm_w300p_firmwarecpe:/o:nec:aterm_wf1200hpcpe:/o:nec:aterm_wf1200hp2cpe:/o:nec:aterm_wf300hp2_firmwarecpe:/o:nec:aterm_wf300hp_firmwarecpe:/o:nec:aterm_wf800hp_firmwarecpe:/o:nec:aterm_wg1200hp2_firmwarecpe:/o:nec:aterm_wg1200hp3_firmwarecpe:/o:nec:aterm_wg1200hp_firmwarecpe:/o:nec:aterm_wg1200hs2_firmwarecpe:/o:nec:aterm_wg1200hs3_firmwarecpe:/o:nec:aterm_wg1200hs_firmwarecpe:/o:nec:aterm_wg1400hp_firmwarecpe:/o:nec:aterm_wg1800hp2_firmwarecpe:/o:nec:aterm_wg1800hp3_firmwarecpe:/o:nec:aterm_wg1800hp4_firmwarecpe:/o:nec:aterm_wg1800hp_firmwarecpe:/o:nec:aterm_wg1810hp(je)cpe:/o:nec:aterm_wg1810hp(mf)cpe:/o:nec:aterm_wg1900hp2_firmwarecpe:/o:nec:aterm_wg1900hp_firmwarecpe:/o:nec:aterm_wg2200hp_firmwarecpe:/o:nec:aterm_wg300hp_firmwarecpe:/o:nec:aterm_wg600hp_firmwarecpe:/o:nec:aterm_wm3500rcpe:/o:nec:aterm_wm3800rcpe:/o:nec:aterm_wr1200hcpe:/o:nec:aterm_wr4100ncpe:/o:nec:aterm_wr4500ncpe:/o:nec:aterm_wr6600hcpe:/o:nec:aterm_wr6650scpe:/o:nec:aterm_wr6670scpe:/o:nec:aterm_wr7800hcpe:/o:nec:aterm_wr7850scpe:/o:nec:aterm_wr7870scpe:/o:nec:aterm_wr8100ncpe:/o:nec:aterm_wr8150ncpe:/o:nec:aterm_wr8165n_firmwarecpe:/o:nec:aterm_wr8166ncpe:/o:nec:aterm_wr8170n_firmwarecpe:/o:nec:aterm_wr8175n_firmwarecpe:/o:nec:aterm_wr8200ncpe:/o:nec:aterm_wr8300ncpe:/o:nec:aterm_wr8370n_firmwarecpe:/o:nec:aterm_wr8400ncpe:/o:nec:aterm_wr8500ncpe:/o:nec:aterm_wr8600n_firmwarecpe:/o:nec:aterm_wr8700n_firmwarecpe:/o:nec:aterm_wr8750n_firmwarecpe:/o:nec:aterm_wr9300n_firmwarecpe:/o:nec:aterm_wr9500n_firmware2024-04-05T14:53+09:002024-04-05T14:53+09:002024-04-05T14:53+09:00Multiple vulnerabilities in PLANEX COMMUNICATIONS wireless LAN router MZK-MF300N
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003067.html
Wireless LAN router MZK-MF300N provided by PLANEX COMMUNICATIONS INC. contains multiple vulnerabilities listed below.
* Active debug code (CWE-489)
* Command Injection on certain port (CWE-77)
Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-003067https://jvn.jp/en/vu/JVNVU91975826/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-30219https://www.cve.org/CVERecord?id=CVE-2024-30220https://cwe.mitre.org/data/definitions/489.htmlhttps://cwe.mitre.org/data/definitions/77.htmlcpe:/o:planex:mzk-mf300n2024-04-05T14:17+09:002024-04-05T14:17+09:002024-04-05T14:17+09:00FURUNO SYSTEMS Managed Switch ACERA 9010 running in non MS mode with the initial configuration has no password
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003051.html
In the initial configuration of Managed Switch ACERA 9010 provided by FURUNO Systems Co., Ltd., the password is empty (CWE-258) and the remote access service is enabled.
The products are affected only when running in non MS mode with the initial configuration.
FURUNO SYSTEMS Co.,Ltd. reported this vulnerability to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2024-003051https://jvn.jp/en/vu/JVNVU99285099/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-28744https://cwe.mitre.org/data/definitions/258.htmlcpe:/o:furunosystems:furuno_systems_acera_9010-08cpe:/o:furunosystems:furuno_systems_acera_9010-242024-04-02T18:03+09:002024-04-02T18:03+09:002024-04-02T18:03+09:00KEYENCE VT STUDIO may insecurely load Dynamic Link Libraries
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003050.html
VT STUDIO provided by KEYENCE CORPORATION contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427, CVE-2024-28099).
KEYENCE CORPORATION reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.JVNDB-2024-003050https://jvn.jp/en/vu/JVNVU92825069/index.htmlhttps://jvn.jp/en/ta/JVNTA91240916/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-28099https://cwe.mitre.org/data/definitions/427.htmlcpe:/a:keyence:keyence_vt_studio2024-04-01T14:44+09:002024-04-01T14:44+09:002024-04-01T14:44+09:00Multiple vulnerabilities in KEYENCE KV STUDIO, KV REPLAY VIEWER, and VT5-WX15/WX12
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003049.html
KV STUDIO, KV REPLAY VIEWER, and VT5-WX15/WX12 provided by KEYENCE CORPORATION contain multiple vulnerabilities listed below.
* Out-of-bounds write (CWE-787) - CVE-2024-29218
* Out-of-bounds read (CWE-125) - CVE-2024-29219
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-003049https://jvn.jp/en/vu/JVNVU95439120/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-29218https://www.cve.org/CVERecord?id=CVE-2024-29219https://cwe.mitre.org/data/definitions/125.htmlhttps://cwe.mitre.org/data/definitions/787.htmlcpe:/a:keyence:keyence_vt5-wx12cpe:/a:keyence:keyence_vt5-wx15cpe:/a:keyence:kv_replay_viewercpe:/a:keyence:kv_studio2024-09-25T13:51+09:002024-04-01T12:31+09:002024-09-25T13:51+09:00"Yahoo! JAPAN" App vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000036.html
"Yahoo! JAPAN" App provided by LY Corporation contains a cross-site scripting vulnerability (CWE-79).
Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000036https://jvn.jp/en/jp/JVN23528780/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-28895https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:linecorp:yahoo%21_japancpe:/a:linecorp:yahoo%21_japan2024-03-29T13:28+09:002024-03-29T13:28+09:002024-03-29T13:28+09:00SEEnergy SVR-116 vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003047.html
Network video recorder SVR-116 provided by SEEnergy Corp. contains an OS command injection vulnerability (CWE-78).
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC to notify users its existence and the solutions through JVN.JVNDB-2024-003047https://jvn.jp/en/vu/JVNVU93932313/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-29167https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:misc:seenergy_svr-116_firmware2024-03-28T11:38+09:002024-03-28T11:38+09:002024-03-28T11:38+09:00Security information for Hitachi Disk Array Systems
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003026.html
Log files of Hitachi Disk Array Systems have the CVE-2022-36407 Plaintext Storage of Passwords vulnerability.
JVNDB-2024-003026https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36407https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/h:hitachi:unified_storagecpe:/h:hitachi:virtual_storage_platform2024-03-27T15:52+09:002024-03-27T15:52+09:002024-03-27T15:52+09:00Multiple vulnerabilities in WordPress Plugin "Survey Maker"
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000035.html
WordPress Plugin "Survey Maker" provided by AYS Pro Plugins contains multiple vulnerabilities listed below.
<ul><li>Stored cross-site scripting (CWE-79) - CVE-2023-34423</li>
<li>Insufficient verification of data authenticity (CWE-345) - CVE-2023-35764</li></ul>
Atsuya Yoda of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000035https://jvn.jp/en/jp/JVN51098626/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-34423https://www.cve.org/CVERecord?id=CVE-2023-35764https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ays-pro:survey_makercpe:/a:ays-pro:survey_maker2024-03-27T14:48+09:002024-03-27T14:48+09:002024-03-27T14:48+09:00SonicDICOM Media Viewer may insecurely load Dynamic Link Libraries
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000034.html
SonicDICOM Media Viewer provided by Fujidenolo Solutions Co., Ltd. contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).
Taihei Shimamine of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to the developer and coordinated. After the coordination was completed, Taihei Shimamine reported the case to JPCERT/CC to notify users of the solution through JVN.JVNDB-2024-000034https://jvn.jp/en/jp/JVN40367518/index.htmlhttps://jvn.jp/en/ta/JVNTA91240916/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-29734https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:fujidenolo_solutions_sonicdicom_media_viewer2024-03-27T14:31+09:002024-03-27T14:31+09:002024-03-27T14:31+09:00Multiple vulnerabilities in ELECOM wireless LAN routers
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003025.html
Multiple wireless LAN routers provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below.
* OS Command Injection (CWE-78) - CVE-2024-25568
* OS Command Injection (CWE-78) - CVE-2024-26258
* Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) - CVE-2024-29225
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.
JVNDB-2024-003025https://jvn.jp/en/vu/JVNVU95381465/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-25568https://www.cve.org/CVERecord?id=CVE-2024-26258https://www.cve.org/CVERecord?id=CVE-2024-29225https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:elecom:wmc-x1800gst-bcpe:/o:elecom:wrc-2533gst2_firmwarecpe:/o:elecom:wrc-g01-wcpe:/o:elecom:wrc-x3200gst3-b2024-08-28T17:16+09:002024-03-27T14:26+09:002024-08-28T17:16+09:00Mini Thread vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000905.html
Mini Thread <http://www.flashcgi.net/> provided by Flash CGI (according to the original report submitted by the reporter) is a CGI script for creating a bulletin board system (BBS).
Mini Thread contains a cross-site scripting vulnerability (CWE-79).
During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied.
1.The developer of the product is unreachable
2.Existence of vulnerability has been verified
3.Not disclosing this case may result in the risk that product users will have no means to know of the existence of the vulnerability in the product
4.There are no particular reasons that would make disclosure inappropriateJVNDB-2024-000905https://jvn.jp/en/jp/JVN40523785/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-28034https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:flash_cgi_mini_thread2024-03-26T17:43+09:002024-03-26T17:43+09:002024-03-26T17:43+09:00ffBull vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000906.html
ffBull <http://www.gem.hi-ho.ne.jp/fortunefield/cgi/ffbull.html> (according to the original report submitted by the reporter) provided by Fortunefield is a bulletin board system (BBS).
ffBull contains an OS command injection vulnerability (CWE-78).
During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied.
1.The developer of the product is unreachable
2.Existence of vulnerability has been verified
3.Not disclosing this case may result in the risk that product users will have no means to know of the existence of the vulnerability in the product
4.There are no particular reasons that would make disclosure inappropriateJVNDB-2024-000906https://jvn.jp/en/jp/JVN17176449/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-28048https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:fortunefield_ffbull2024-03-26T16:07+09:002024-03-26T16:07+09:002024-03-26T16:07+09:00"EasyRange" may insecurely load executable files
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000900.html
"EasyRange" <http://sira.jp/soft/> provided by sira.jp (according to the original report submitted by the reporter) is a tool to extract compressed files.
"EasyRange" contains an issue with the executable file search path when displaying an extracted file on Explorer, which may lead to loading an executable file resides in the same folder where the extracted file is placed (CWE-427).
During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied.
1. The developer of the product is unreachable
2. Existence of vulnerability has been verified
3. Not disclosing this case may result in the risk that product users will have no means to know
4. There are no particular reasons that would make disclosure inappropriate
JVNDB-2024-000900https://jvn.jp/en/jp/JVN13113728/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-28131https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:sira.jp_easyrange2024-03-26T15:50+09:002024-03-26T15:50+09:002024-03-26T15:50+09:000ch BBS Script (0ch) vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000907.html
0ch BBS Script (0ch) (according to the original report submitted by the reporter) <http://0ch.mine.nu/> provided by Zerochannel (according to the original report submitted by the reporter) is bulletin board software.
0ch BBS Script (0ch) contains a cross-site scripting vulnerability (CWE-79).
During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied.
1.The developer of the product is unreachable
2.Existence of vulnerability has been verified
3.Not disclosing this case may result in the risk that product users will have no means to know of the existence of the vulnerability in the product
4.There are no particular reasons that would make disclosure inappropriate
JVNDB-2024-000907https://jvn.jp/en/jp/JVN46874970/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-28126https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:zerochannel_zerochannelscript2024-03-26T15:35+09:002024-03-26T15:35+09:002024-03-26T15:35+09:00TvRock vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000902.html
TvRock <http://1st.geocities.jp/tvrock_web/> provided by TvRock (according to the original report submitted by the reporter) is a tool to set a timer recording for a TV program.
TvRock contains a cross-site scripting vulnerability (CWE-79).
During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied.
1. The developer of the product is unreachable
2. Existence of vulnerability has been verified
3. Not disclosing this case may result in the risk that product users will have no means to know
4. There are no particular reasons that would make disclosure inappropriate
JVNDB-2024-000902https://jvn.jp/en/jp/JVN69107517/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-26018https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:tvrock_tvrock2024-03-26T14:27+09:002024-03-26T14:27+09:002024-03-26T14:27+09:00WebProxy vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000904.html
WebProxy <http://www.ln-lab.net/> provided by LunarNight Laboratory (according to the original report submitted by the reporter) is software to build a proxy server. WebProxy contains an OS command injection vulnerability (CWE-78).
During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied.
1. The developer of the product is unreachable
2. Existence of vulnerability has been verified
3. Not disclosing this case may result in the risk that product users will have no means to know
4. There are no particular reasons that would make disclosure inappropriateJVNDB-2024-000904https://jvn.jp/en/jp/JVN22376992/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-28033https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ln-lab:webproxy2024-03-26T14:19+09:002024-03-26T14:19+09:002024-03-26T14:19+09:00BUFFALO LinkStation 200 series vulnerable to arbitrary code execution
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2023-025113.html
LinkStation 200 series provided by BUFFALO INC. is a network attached storage (NAS).
LinkStation 200 series contains an arbitrary code execution vulnerability (CWE-354, CVE-2023-51073) due to insufficient verification of data authenticity during firmware update.
BUFFALO INC. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.JVNDB-2023-025113https://jvn.jp/en/vu/JVNVU90953541/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-51073https://nvd.nist.gov/vuln/detail/CVE-2023-51073https://github.com/christopher-pace/CVE-2023-51073/https://www.buffalotech.comhttps://cwe.mitre.org/data/definitions/354.htmlcpe:/o:buffalo_inc:ls210d_firmwarecpe:/o:buffalo_inc:ls220db_firmwarecpe:/o:buffalo_inc:ls220dr_firmwarecpe:/o:buffalo_inc:ls220d_firmware2024-03-25T18:16+09:002024-03-25T18:16+09:002024-03-25T18:16+09:00Multiple vulnerabilities in home gateway HGW BL1500HM
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003016.html
Home gateway HGW BL1500HM provided by KDDI CORPORATION contains multiple vulnerabilities listed below.
* Use of weak credentials (CWE-1391) - CVE-2024-21865, CVE-2024-29071
* Command injection (CWE-77) - CVE-2024-28041
Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
JVNDB-2024-003016https://jvn.jp/en/vu/JVNVU93546510/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-21865https://www.cve.org/CVERecord?id=CVE-2024-28041https://www.cve.org/CVERecord?id=CVE-2024-29071https://cwe.mitre.org/data/definitions/1391.htmlhttps://cwe.mitre.org/data/definitions/77.htmlcpe:/o:kddi:hgw_bl1500hm_firmware2024-03-25T17:28+09:002024-03-25T17:28+09:002024-03-25T17:28+09:00WordPress Plugin "easy-popup-show" vulnerable to cross-site request forgery
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000033.html
WordPress Plugin "easy-popup-show" provided by Ari Susanto contains a cross-site request forgery vulnerability (CWE-352).
Daiki Kojima of Cryptography Laboratory, Department of Information and Communication Engineering, Tokyo Denki University reported this vulnerability to the developer and coordinated. After the coordination was completed, Daiki Kojima reported the case to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000033https://jvn.jp/en/jp/JVN86206017/index.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29009https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:ari_susanto_easy-popup-show2024-03-25T13:31+09:002024-03-25T13:31+09:002024-03-25T13:31+09:00Sangoma Technologies CG/MG family driver cg6kwin2k.sys vulnerable to insufficient access control on its IOCTL
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003008.html
CG/MG family driver cg6kwin2k.sys provided by Sangoma Technologies is vulnerable to insufficient access control on its IOCTL (CWE-782).
Takahiro Haruyama of Broadcom Carbon Black reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-003008https://jvn.jp/en/vu/JVNVU90671953/index.htmlhttps://jvn.jp/en/ta/JVNTA90371415/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-29216https://cwe.mitre.org/data/definitions/782.htmlcpe:/o:sangoma:cg6kwin2k.sys2024-04-24T11:45+09:002024-03-22T13:50+09:002024-04-24T11:45+09:00Multiple vulnerabilities in FitNesse
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000032.html
FitNesse contains multiple vulnerabilities listed below.<ul><li>Multiple cross-site scripting (CWE-79) - CVE-2024-23604, CVE-2024-28128</li><li>Improper restriction of XML external entity references (CWE-611) -CVE-2024-28039</li><li>OS command injection (CWE-78) - CVE-2024-28125</li></ul>CVE-2024-23604, CVE-2024-28039, CVE-2024-28125
Kanta Nishitani of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-28128
Yutaka WATANABE of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000032https://jvn.jp/en/jp/JVN94521208/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-23604https://www.cve.org/CVERecord?id=CVE-2024-28039https://www.cve.org/CVERecord?id=CVE-2024-28125https://www.cve.org/CVERecord?id=CVE-2024-28128https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:fitnesse:fitnessecpe:/a:fitnesse:fitnesse2024-03-19T11:02+09:002024-03-18T14:08+09:002024-03-19T11:02+09:00"ABEMA" App for Android fails to restrict access permissions
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000031.html
"ABEMA" App for Android provided by AbemaTV, Inc. fails to restrict access permissions (CWE-926) that allows another app installed on the user's device to access an arbitrary URL on "ABEMA" App via Intent.
Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000031https://jvn.jp/en/jp/JVN70640802/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-28745https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:abematv_abema2024-03-15T16:37+09:002024-03-15T16:37+09:002024-03-15T16:37+09:00Information Exposure Vulnerability in Cosminexus Component Container
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-002961.html
An information exposure vulnerability (CVE-2023-6814) exists in Cosminexus Component Container.
Affected products and versions are listed below. Please upgrade your version to the appropriate version.
These vulnerabilities exist in Cosminexus Component Container which is a component product of other Hitachi products.
For details about the fixed version about Cosminexus products, contact your Hitachi support service representative.JVNDB-2024-002961https://www.cve.org/CVERecord?id=CVE-2023-6814https://nvd.nist.gov/vuln/detail/CVE-2023-6814https://cwe.mitre.org/data/definitions/532.htmlcpe:/a:hitachi:cosminexus_component_containercpe:/a:hitachi:hitachi_application_server64cpe:/a:hitachi:hitachi_application_server_rcpe:/a:hitachi:ucosminexus_application_servercpe:/a:hitachi:ucosminexus_application_server_enterprisecpe:/a:hitachi:ucosminexus_application_server_standardcpe:/a:hitachi:ucosminexus_application_server_standard-rcpe:/a:hitachi:ucosminexus_developercpe:/a:hitachi:ucosminexus_developer_professionalcpe:/a:hitachi:ucosminexus_developer_professional_for_plug-incpe:/a:hitachi:ucosminexus_developer_standardcpe:/a:hitachi:ucosminexus_primary_server_basecpe:/a:hitachi:ucosminexus_primary_server_base64cpe:/a:hitachi:ucosminexus_service_architectcpe:/a:hitachi:ucosminexus_service_platformcpe:/a:hitachi:ucosminexus_service_platform_642024-03-13T12:10+09:002024-03-13T12:10+09:002024-03-13T12:10+09:00a-blog cms vulnerable to directory traversal
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000030.html
a-blog cms provided by appleple Inc. is a content management system (CMS). a-blog cms contains a directory traversal vulnerability (CWE-22).
Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000030https://jvn.jp/en/jp/JVN48443978/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-27279https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:appleple:a-blog_cms2024-03-08T15:27+09:002024-03-08T15:27+09:002024-03-08T15:27+09:00OMRON NJ/NX series vulnerable to path traversal
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-002942.html
Machine Automation Controller NJ/NX series provided by OMRON Corporation contain a path traversal vulnerability (CWE-22, CVE-2024-27121).
OMRON Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.JVNDB-2024-002942https://jvn.jp/en/vu/JVNVU95852116/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-27121https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:omron:machine_automation_controller_nj_seriescpe:/a:omron:machine_automation_controller_nx_series2024-03-08T14:16+09:002024-03-08T14:16+09:002024-03-08T14:16+09:00Multiple vulnerabilities in SKYSEA Client View
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000028.html
SKYSEA Client View provided by Sky Co.,LTD. is an Enterprise IT Asset Management Tool.
SKYSEA Client View contains multiple vulnerabilities listed below.
* Improper access control in the specific folder (CWE-276) - CVE-2024-21805
* Improper access control in the resident process (CWE-749) - CVE-2024-24964
CVE-2024-21805
Ken Kitahara of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-24964
Ruslan Sayfiev, and Denis Faiustov of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to Sky Co.,LTD. and coordinated. Sky Co.,LTD. and JPCERT/CC published respective advisories in order to notify users of the solutions through JVN.
JVNDB-2024-000028https://jvn.jp/en/jp/JVN54451757/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-21805https://www.cve.org/CVERecord?id=CVE-2024-24964https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:skygroup:skysea_client_view2024-07-29T18:13+09:002024-03-07T16:09+09:002024-07-29T18:13+09:00FUJIFILM Business Innovation Corp. printers vulnerable to cross-site request forgery
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000027.html
Multiple printers provided by FUJIFILM Business Innovation Corp. contain a cross-site request forgery vulnerability (CWE-352).
Junnosuke Kushibiki, Ryu Kuki, Masataka Mizokuchi, Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
JVNDB-2024-000027https://jvn.jp/en/jp/JVN34328023/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-27974https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:fuji_xerox:multiple_product2024-03-06T18:24+09:002024-03-06T18:24+09:002024-03-06T18:24+09:00Multiple vulnerabilities in printers and scanners which implement BROTHER Web Based Management
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000026.html
Multiple printers and scanners which implement Web Based Management provided by BROTHER INDUSTRIES, LTD. contain multiple vulnerabilities listed below.
* Improper Authentication (CWE-287) - CVE-2024-21824
* Cross-Site Request Forgery (CWE-352) - CVE-2024-22475
Hiroki Yasui, Yudai Morii, Takaya Noma, Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000026https://jvn.jp/en/jp/JVN82749078/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-21824https://www.cve.org/CVERecord?id=CVE-2024-22475https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:brother:web_based_management2024-03-06T18:12+09:002024-03-06T18:12+09:002024-03-06T18:12+09:00Toyoko Inn official App vulnerable to improper server certificate verification
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000029.html
Toyoko Inn official App provided by Toyoko Inn IT Solution Co., Ltd. is vulnerable to improper server certificate verification (CWE-295).
Ryo Nihonyanagi of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000029https://jvn.jp/en/jp/JVN52919306/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-27440https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:toyoko_inn_it_solution_official_android_app_for_hotel_chain_toyoko_inn.cpe:/a:misc:toyoko_inn_it_solution_official_iphone_app_for_hotel_chain_toyoko_inn.2024-03-06T13:53+09:002024-03-06T13:53+09:002024-03-06T13:53+09:00Protection mechanism failure in RevoWorks
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000025.html
RevoWorks SCVX and RevoWorks Browser provided by J's Communication Co., Ltd. enable users to execute web browsers in the sandboxed environment isolated from the client's local environment.
In the products, file exchange between the sandboxed environment and local environment is prohibited in principle, but by using the optional "VirusChecker" or "ThreatChecker" feature and changing the policy settings, files checked for viruses by these features in the sandboxed environment can be permitted to be downloaded to the local environment.
However, there is a vulnerability (CWE-693) in the products where malware detection is failed when data containing malware is saved in a specific file format (eml, dmg, vhd, iso, msi) in the sandboxed environment
J's Communication Co., Ltd. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and J's Communication Co., Ltd. coordinated under the Information Security Early Warning Partnership.JVNDB-2024-000025https://jvn.jp/en/jp/JVN35928117/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-25091https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:jscom:revoworks_browsercpe:/a:jscom:revoworks_scvx2024-02-29T15:40+09:002024-02-29T15:40+09:002024-02-29T15:40+09:00OET-213H-BTS1 missing authorization check in the initial configuration
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000024.html
OET-213H-BTS1 is a digital temperature measurement and face recognition terminal, developed by Zhejiang Uniview Technologies Co.,Ltd and provided by Atsumi Electric Co., Ltd.
The initial configuration of the product is ​insecure (CWE-1188), it does not perform an authorization check when processing the API requests.JVNDB-2024-000024https://jvn.jp/en/jp/JVN77203800/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-25972https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:atsumi_electric_oet-213h-bts12024-02-29T14:59+09:002024-02-29T14:59+09:002024-02-29T14:59+09:00OpenPNE plugin "opTimelinePlugin" vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000023.html
OpenPNE plugin "opTimelinePlugin" provided by OpenPNE Project contains a stored cross-site scripting vulnerability (CWE-79) in Edit Profile page.
Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000023https://jvn.jp/en/jp/JVN78084105/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-27278https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:tejimaya:optimelineplugin2024-02-29T13:12+09:002024-02-29T13:12+09:002024-02-29T13:12+09:00Multiple vulnerabilities in baserCMS
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000022.html
baserCMS provided by baserCMS Users Community contains multiple vulnerabilities listed below.
<ul>
<li>Reflected cross-site scripting vulnerability in Site search Feature (CWE-79) - CVE-2023-44379</li>
<li>Stored cross-site scripting vulnerability in Content Management (CWE-79) - CVE-2024-26128</li>
<li>OS command injection vulnerability (CWE-78) - CVE-2023-51450</li>
</ul>
CVE-2023-44379
Yusuke Uchida of PERSOL CROSS TECHNOLOGY CO., LTD. (Not affiliated at the time of report submission) reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-26128
Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-51450
Shunsuke Tanizaki reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000022https://jvn.jp/en/jp/JVN73283159/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-44379https://www.cve.org/CVERecord?id=CVE-2024-26128https://www.cve.org/CVERecord?id=CVE-2023-51450https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:basercms:basercms2024-02-27T14:25+09:002024-02-27T14:25+09:002024-02-27T14:25+09:00ELECOM wireless LAN routers vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-002831.html
Multiple wireless LAN routers provided by ELECOM CO.,LTD. contain an OS command injection vulnerability.
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-002831https://jvn.jp/en/vu/JVNVU99444194/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-25579https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:elecom:wmc-x1800gst-bcpe:/o:elecom:wrc-1167gs2-b_firmwarecpe:/o:elecom:wrc-1167gs2h-b_firmwarecpe:/o:elecom:wrc-2533gs2-b_firmwarecpe:/o:elecom:wrc-2533gs2-w_firmwarecpe:/o:elecom:wrc-2533gs2v-b_firmwarecpe:/o:elecom:wrc-2533gst2_firmwarecpe:/o:elecom:wrc-g01-wcpe:/o:elecom:wrc-x3200gst3-b2024-08-28T17:09+09:002024-02-22T08:15+09:002024-08-28T17:09+09:00EL Injection Vulnerability in Hitachi Global Link Manager
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-002832.html
An EL Injection Vulnerability (CVE-2024-0715) exists in Hitachi Global Link Manager.
Affected products and versions are listed below. Please upgrade your version to the appropriate version.JVNDB-2024-002832https://www.cve.org/CVERecord?id=CVE-2024-0715https://nvd.nist.gov/vuln/detail/CVE-2024-0715https://cwe.mitre.org/data/definitions/917.htmlcpe:/a:hitachi:global_link_manager2024-02-21T15:53+09:002024-02-21T15:53+09:002024-02-21T15:53+09:00Multiple vulnerabilities in ELECOM wireless LAN routers and wireless LAN repeater
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000020.html
Multiple wireless LAN routers and wireless LAN repeater provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below.
<ul><li>Cross-site Scripting (CWE-79) - CVE-2024-21798</li>
<li>Cross-Site Request Forgery (CWE-352) - CVE-2024-23910</li></ul>
CVE-2024-21798
Yamaguchi Kakeru of Fujitsu Limited reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-23910
Satoru Nagaoka of Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000020https://jvn.jp/en/jp/JVN44166658/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-21798https://www.cve.org/CVERecord?id=CVE-2024-23910https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:elecom:wmc-x1800gst-bcpe:/o:elecom:wrc-1167gs2-b_firmwarecpe:/o:elecom:wrc-1167gs2h-b_firmwarecpe:/o:elecom:wrc-2533gs2-b_firmwarecpe:/o:elecom:wrc-2533gs2-w_firmwarecpe:/o:elecom:wrc-2533gs2v-b_firmwarecpe:/o:elecom:wrc-g01-wcpe:/o:elecom:wrc-x3200gst3-bcpe:/o:elecom:wsc-x1800gs-b2024-03-26T14:10+09:002024-02-20T14:14+09:002024-03-26T14:10+09:00Android App "Mopria Print Service" vulnerable to improper intent handling
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-002560.html
Android app "Mopria Print Service" provided by Mopria Alliance is vulnerable to improper intent handling (CWE-668).
Johan Francsics reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-002560https://jvn.jp/en/vu/JVNVU93381734/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-25555https://cwe.mitre.org/data/definitions/668.htmlcpe:/a:misc:mopria_alliance_mopria_print_service2024-02-15T15:26+09:002024-02-15T15:26+09:002024-02-15T15:26+09:00a-blog cms vulnerable to URL spoofing
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000019.html
a-blog cms provided by appleple Inc. is a content management system (CMS). a-blog cms contains an URL spoofing vulnerability (CWE-451).
Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000019https://jvn.jp/en/jp/JVN48966481/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-25559https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:appleple:a-blog_cms2024-02-15T14:12+09:002024-02-15T14:12+09:002024-02-15T14:12+09:00Multiple out-of-bounds write vulnerabilities in Canon Office/Small Office Multifunction Printers and Laser Printers
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-002050.html
Office/Small Office Multifunction Printers and Laser Printers provided by Canon Inc. contain multiple out-of-bounds write vulnerabilities (CWE-787, CVE-2023-6229, CVE-2023-6230, CVE-2023-6231, CVE-2023-6232, CVE-2023-6233, CVE-2023-6234, CVE-2024-0244).
Canon Inc. reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2024-002050https://jvn.jp/en/vu/JVNVU90033405/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-6229https://www.cve.org/CVERecord?id=CVE-2023-6230https://www.cve.org/CVERecord?id=CVE-2023-6231https://www.cve.org/CVERecord?id=CVE-2023-6232https://www.cve.org/CVERecord?id=CVE-2023-6233https://www.cve.org/CVERecord?id=CVE-2023-6234https://www.cve.org/CVERecord?id=CVE-2024-0244https://nvd.nist.gov/vuln/detail/CVE-2023-6229https://nvd.nist.gov/vuln/detail/CVE-2023-6230https://nvd.nist.gov/vuln/detail/CVE-2023-6231https://nvd.nist.gov/vuln/detail/CVE-2023-6232https://nvd.nist.gov/vuln/detail/CVE-2023-6233https://nvd.nist.gov/vuln/detail/CVE-2023-6234https://nvd.nist.gov/vuln/detail/CVE-2024-0244https://cwe.mitre.org/data/definitions/787.htmlcpe:/a:canon:multiple_product2024-03-08T18:05+09:002024-02-07T15:39+09:002024-03-08T18:05+09:00Sharp NEC Display Solutions' public displays vulnerable to local file inclusion
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001882.html
Multiple public displays provided by Sharp NEC Display Solutions, Ltd. contain a local file inclusion vulnerability (CWE-22, CVE-2023-7077).
Tunahan TEKEOĞLU of Senior Cyber Security Consultant reported this vulnerability to Sharp NEC Display Solutions, Ltd. and coordinated. Sharp NEC Display Solutions, Ltd. reported this case to JPCERT/CC to notify users of the solution through JVN.JVNDB-2024-001882https://jvn.jp/en/vu/JVNVU97836276/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-7077https://nvd.nist.gov/vuln/detail/CVE-2023-7077https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:sharp-nec-displays:multiple_product2024-07-11T14:27+09:002024-02-07T14:25+09:002024-07-11T14:27+09:00Zeroshell vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2020-013805.html
The web interface of Zeroshell, Linux distribution provided by Zeroshell.org, contains an OS command injection vulnerability (CWE-78).
Hirukawa Norihiko of MYT Consulting Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2020-013805https://jvn.jp/en/jp/JVN44033918/index.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29390https://nvd.nist.gov/vuln/detail/CVE-2020-29390https://www.exploit-db.com/exploits/41040https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:zeroshell:zeroshell2024-02-07T13:38+09:002024-02-07T13:38+09:002024-02-07T13:38+09:00Multiple buffer overflow vulnerabilities in HOME SPOT CUBE2
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001804.html
HOME SPOT CUBE2 provided by KDDI CORPORATION contains multiple vulnerabilities listed below.
* Stack-based buffer overflow (CWE-121) - CVE-2024-21780
* Heap-based buffer overflow (CWE-122) - CVE-2024-23978
Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-001804https://jvn.jp/en/vu/JVNVU93740658/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-21780https://www.cve.org/CVERecord?id=CVE-2024-23978https://nvd.nist.gov/vuln/detail/CVE-2024-21780https://nvd.nist.gov/vuln/detail/CVE-2024-23978https://cwe.mitre.org/data/definitions/121.htmlhttps://cwe.mitre.org/data/definitions/122.htmlcpe:/o:kddi:home_spot_cube_2_firmware2024-03-11T17:32+09:002024-02-06T15:02+09:002024-03-11T17:32+09:00Incorrect permission assignment vulnerability in Trend Micro uiAirSupport
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001785.html
Trend Micro Incorporated has released a security update for Trend Micro uiAirSupport.
Proof-of-concept code (PoC) for this vulnerability is available on the Internet.
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.JVNDB-2024-001785https://jvn.jp/en/vu/JVNVU99844997/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-23940https://nvd.nist.gov/vuln/detail/CVE-2024-23940https://medium.com/@s1kr10s/av-when-a-friend-becomes-an-enemy-55f41aba42b1https://cwe.mitre.org/data/definitions/427.htmlcpe:/a:trendmicro:antivirus_%2B_securitycpe:/a:trendmicro:internet_securitycpe:/a:trendmicro:maximum_securitycpe:/a:trendmicro:premium_security2024-03-11T17:42+09:002024-02-06T14:46+09:002024-03-11T17:42+09:00Cybozu KUNAI for Android vulnerable to denial-of-service (DoS)
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000017.html
Cybozu KUNAI for Android is a client application for using Cybozu products from an Android device. Cybozu KUNAI for Android contains an issue allowing to send massive requests to the connected Cybozu product if a user performs certain operations on KUNAI, which may result in repeated session disconnections in a short period of time and preventing normal use of KUNAI (CWE-436).
Cybozu, Inc. reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.JVNDB-2024-000017https://jvn.jp/en/jp/JVN18743512/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-23304https://nvd.nist.gov/vuln/detail/CVE-2024-23304https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:cybozu:kunai2024-06-27T13:28+09:002024-02-06T13:25+09:002024-06-27T13:28+09:00File and Directory Permissions Vulnerability in Hitachi Tuning Manager
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001462.html
A File and Directory Permissions Vulnerability (CVE-2023-6457) exists in Hitachi Tuning Manager.JVNDB-2024-001462https://www.cve.org/CVERecord?id=CVE-2023-6457https://nvd.nist.gov/vuln/detail/CVE-2023-6457https://cwe.mitre.org/data/definitions/276.htmlcpe:/a:hitachi:tuning_manager2024-02-05T14:54+09:002024-02-05T14:54+09:002024-02-05T14:54+09:00Group Office vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000016.html
Group Office provided by Intermesh BV contains a stored cross-site scripting vulnerability (CWE-79).
Yoichi Tsuzuki of FFRI Security, Inc. and Tsutomu Aramaki of Mitsui Bussan Secure Directions, Inc reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000016https://jvn.jp/en/jp/JVN63567545/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-23941https://nvd.nist.gov/vuln/detail/CVE-2024-23941https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:intermesh:group_officecpe:/a:intermesh:group_officecpe:/a:intermesh:group_office2024-03-11T18:04+09:002024-02-01T13:48+09:002024-03-11T18:04+09:00Payment EX vulnerable to information disclosure
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000015.html
Payment EX provided by Simplesite contains an information disclosure vulnerability (CWE-200).
JVNDB-2024-000015https://jvn.jp/en/jp/JVN41129639/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-24548https://nvd.nist.gov/vuln/detail/CVE-2024-24548https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:estore-wss:payment_ex2024-03-11T17:42+09:002024-02-01T13:41+09:002024-03-11T17:42+09:00Multiple vulnerabilities in SHARP Energy Management Controller with Cloud Services
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001161.html
Energy Management Controller with Cloud Services provided by SHARP CORPORATION contains multiple vulnerabilities listed below.
* Improper authentication (CWE-287) - CVE-2024-23783
* Improper access control (CWE-284) - CVE-2024-23784
* Cross-site request forgery (CWE-352) - CVE-2024-23785
* Stored cross-site scripting (CWE-79) - CVE-2024-23786
* Path traversal (CWE-22) - CVE-2024-23787
* Server-side request forgery (CWE-918) - CVE-2024-23788
* OS command injection (CWE-78) - CVE-2024-23789
Shoji Baba of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-001161https://jvn.jp/en/vu/JVNVU94591337/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-23783https://www.cve.org/CVERecord?id=CVE-2024-23784https://www.cve.org/CVERecord?id=CVE-2024-23785https://www.cve.org/CVERecord?id=CVE-2024-23786https://www.cve.org/CVERecord?id=CVE-2024-23787https://www.cve.org/CVERecord?id=CVE-2024-23788https://www.cve.org/CVERecord?id=CVE-2024-23789https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/284.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/918.htmlcpe:/o:sharp:jh-rv11cpe:/o:sharp:jh-rvb12024-01-31T16:01+09:002024-01-31T16:01+09:002024-01-31T16:01+09:00File and Directory Permissions Vulnerability in Hitachi Storage Plug-in for VMware vCenter
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001160.html
A File and Directory Permissions Vulnerability exists in Hitachi Storage Plug-in for VMware vCenter.
Affected products and versions are listed below. Please upgrade your version to the appropriate version.
JVNDB-2024-001160https://www.cve.org/CVERecord?id=CVE-2024-21840https://nvd.nist.gov/vuln/detail/CVE-2024-21840https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:storage_plug-in2024-03-11T17:41+09:002024-01-31T15:25+09:002024-03-11T17:41+09:00ELECOM wireless LAN routers vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001061.html
Multiple ELECOM wireless LAN routers provided by ELECOM CO.,LTD. contain an OS command injection vulnerability.
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-001061https://jvn.jp/en/vu/JVNVU90908488/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-22372https://nvd.nist.gov/vuln/detail/CVE-2024-22372https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:elecom:wrc-x1500GS-Bcpe:/o:elecom:wrc-x1500GSA-Bcpe:/o:elecom:wrc-x1800gs-b_firmwarecpe:/o:elecom:wrc-x1800gsa-b_firmwarecpe:/o:elecom:wrc-x1800gsh-b_firmwarecpe:/o:elecom:wrc-x3000gs2-b_firmwarecpe:/o:elecom:wrc-x3000gs2-w_firmwarecpe:/o:elecom:wrc-x3000gs2a-b_firmwarecpe:/o:elecom:wrc-x6000xs-g_firmwarecpe:/o:elecom:wrc-x6000xst-g_firmware2024-08-28T17:12+09:002024-01-24T17:16+09:002024-08-28T17:12+09:00Yamaha wireless LAN access point devices vulnerable to active debug code
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001062.html
Active debug code (CWE-489) exists in wireless LAN access point devices provided by Yamaha Corporation.
The debug function can be enabled by performing specific operations.
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-001062https://jvn.jp/en/vu/JVNVU99896362/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-22366https://nvd.nist.gov/vuln/detail/CVE-2024-22366https://cwe.mitre.org/data/definitions/489.htmlcpe:/o:yamaha:wlx202_firmwarecpe:/o:yamaha:wlx212_firmwarecpe:/o:yamaha:wlx222_firmwarecpe:/o:yamaha:wlx313_firmwarecpe:/o:yamaha:wlx413_firmware2024-03-13T17:24+09:002024-01-24T17:16+09:002024-03-13T17:24+09:00Oracle WebLogic Server vulnerable to HTTP header injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000014.html
Oracle WebLogic Server provided by Oracle contains an HTTP header injection vulnerability (CWE-113).
Professional Service Department of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000014https://jvn.jp/en/jp/JVN93541851/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-20927https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:oracle:weblogic_servercpe:/a:oracle:weblogic_server2024-01-24T13:53+09:002024-01-24T13:53+09:002024-01-24T13:53+09:00"Mercari" App for Android fails to restrict custom URL schemes properly
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000005.html
"Mercari" App for Android by Mercari, Inc. provides the function to access a requested URL using Custom URL Scheme. The App does not restrict access to the function properly (CWE-939) which may be exploited to direct the App to access any sites.
Shiga Takuma of BroadBand Security Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000005https://jvn.jp/en/jp/JVN70818619/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-23388https://nvd.nist.gov/vuln/detail/CVE-2024-23388https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:mercari:mercari2024-03-04T18:01+09:002024-01-24T13:46+09:002024-03-04T18:01+09:00Improper restriction of XML external entity references (XXE) in MLIT "Electronic Delivery Check System" and "Electronic delivery item Inspection Support System"
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000008.html
"Electronic Delivery Check System" and "Electronic delivery item Inspection Support System" provided by Ministry of Land, Infrastructure, Transport and Tourism, Japan improperly restricts XML external entity references (XXE) (CWE-611).
Toyama Taku, Iwakawa Kento of NEC Corporation, and Manami Kawauchi of NEC Fielding,Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000008https://jvn.jp/en/jp/JVN77736613/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-21765https://nvd.nist.gov/vuln/detail/CVE-2024-21765https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:mlit:electronic_delivery_check_systemcpe:/a:mlit:electronic_delivery_item_inspection_support_system2024-03-13T17:40+09:002024-01-23T16:57+09:002024-03-13T17:40+09:00Android App "Spoon" uses a hard-coded API key for an external service
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000013.html
Android App "Spoon" provided by Spoon Radio Japan Inc. uses a hard-coded API key for an external service (CWE-798).
Yoshihito Sakai of BroadBand Security, Inc reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000013https://jvn.jp/en/jp/JVN96154238/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-23453https://nvd.nist.gov/vuln/detail/CVE-2024-23453https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:spooncast:spoon2024-03-14T17:44+09:002024-01-23T16:53+09:002024-03-14T17:44+09:00Improper restriction of XML external entity references (XXE) in "Electronic Delivery Check System (Ministry of Agriculture, Forestry and Fisheries The Agriculture and Rural Development Project Version)"
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000010.html
"Electronic Delivery Check System (Ministry of Agriculture, Forestry and Fisheries The Agriculture and Rural Development Project Version)" provided by Ministry of Agriculture, Forestry and Fisheries improperly restricts XML external entity references (XXE) (CWE-611).
Iwakawa Kento and Toyama Taku of NEC Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000010https://jvn.jp/en/jp/JVN01434915/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-22380https://nvd.nist.gov/vuln/detail/CVE-2024-22380https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:maff:electronic_delivery_check_system2024-03-14T17:33+09:002024-01-23T15:25+09:002024-03-14T17:33+09:00Improper restriction of XML external entity references (XXE) in Electronic Deliverables Creation Support Tool provided by Ministry of Defense
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000009.html
Electronic Deliverables Creation Support Tool provided by Ministry of Defense improperly restricts XML external entity references (XXE) (CWE-611).
Toyama Taku of NEC Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000009https://jvn.jp/en/jp/JVN40049211/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-21796https://nvd.nist.gov/vuln/detail/CVE-2024-21796https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:dfeg:electronic_deliverables_creation_support_tool2024-03-13T17:46+09:002024-01-23T15:13+09:002024-03-13T17:46+09:00Access analysis CGI An-Analyzer vulnerable to open redirect
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000012.html
Access analysis CGI An-Analyzer provided by ANGLERSNET Co,.Ltd. contains an open redirect vulnerability (CWE-601).
Tomoomi Iwata of Information-technology Promotion Agency, Japan reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000012https://jvn.jp/en/jp/JVN73587943/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-22113https://nvd.nist.gov/vuln/detail/CVE-2024-22113https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:anglers-net:cgi_an-anlyzer2024-03-13T17:34+09:002024-01-22T15:57+09:002024-03-13T17:34+09:00Multiple vulnerabilities in a-blog cms
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000011.html
a-blog cms provided by appleple inc. contains multiple vulnerabilities listed below.<ul><li>Improper input validation (CWE-20) - CVE-2024-23180</li><li>Cross-site scripting (CWE-79) - CVE-2024-23181</li><li>Relative path traversal (CWE-23) - CVE-2024-23182</li><li>Cross-site scripting (CWE-79) - CVE-2024-23183</li><li>Improper input validation (CWE-20) - CVE-2024-23348</li><li>Cross-site scripting (CWE-79) - CVE-2024-23782</li></ul>
CVE-2024-23180
Naoya Miyaguchi reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-23181
Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-23182, CVE-2024-23183
Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-23348, CVE-2024-23782
Yuta Morioka of Information Science College reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000011https://jvn.jp/en/jp/JVN34565930/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-23180https://www.cve.org/CVERecord?id=CVE-2024-23181https://www.cve.org/CVERecord?id=CVE-2024-23182https://www.cve.org/CVERecord?id=CVE-2024-23183https://www.cve.org/CVERecord?id=CVE-2024-23348https://www.cve.org/CVERecord?id=CVE-2024-23782https://nvd.nist.gov/vuln/detail/CVE-2024-23180https://nvd.nist.gov/vuln/detail/CVE-2024-23181https://nvd.nist.gov/vuln/detail/CVE-2024-23182https://nvd.nist.gov/vuln/detail/CVE-2024-23183https://nvd.nist.gov/vuln/detail/CVE-2024-23348https://nvd.nist.gov/vuln/detail/CVE-2024-23782https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/23.htmlcpe:/a:appleple:a-blog_cms2024-03-13T17:50+09:002024-01-22T15:08+09:002024-03-13T17:50+09:00FusionPBX vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000006.html
FusionPBX contains a stored cross-site scripting vulnerability (CWE-79).
Satoshi Horikoshi reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000006https://jvn.jp/en/jp/JVN67215338/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-23387https://nvd.nist.gov/vuln/detail/CVE-2024-23387https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:fusionpbx:fusionpbx2024-03-12T17:31+09:002024-01-19T12:30+09:002024-03-12T17:31+09:00Multiple Dahua Technology products vulnerable to authentication bypass
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000007.html
Multiple products provided by Dahua Technology contain an authentication bypass vulnerability (CWE-287).
Mitsui Bussan Secure Directions, Inc. reported the vulnerability existed in "DHI-ASI7213Y-V3-T1" to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000007https://jvn.jp/en/jp/JVN83655695/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2021-33044https://nvd.nist.gov/vuln/detail/CVE-2021-33044https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:dahuasecurity:dhi-asi7213y-v3-t1_firmwarecpe:/o:dahuasecurity:ipc-hum7xxx_firmwarecpe:/o:dahuasecurity:ipc-hx1xxx_firmwarecpe:/o:dahuasecurity:ipc-hx2xxx_firmwarecpe:/o:dahuasecurity:ipc-hx3xxx_firmwarecpe:/o:dahuasecurity:ipc-hx5%284%29%283%29xxx_firmwarecpe:/o:dahuasecurity:ipc-hx5xxx_firmwarecpe:/o:dahuasecurity:ipc-hx8xxx_firmwarecpe:/o:dahuasecurity:ptz-dome-camera-sd1a1_firmwarecpe:/o:dahuasecurity:ptz-dome-camera-sd22_firmwarecpe:/o:dahuasecurity:ptz-dome-camera-sd49_firmwarecpe:/o:dahuasecurity:ptz-dome-camera-sd50_firmwarecpe:/o:dahuasecurity:ptz-dome-camera-sd52c_firmwarecpe:/o:dahuasecurity:ptz-dome-camera-sd6al_firmwarecpe:/o:dahuasecurity:thermal-tpc-bf1241_firmwarecpe:/o:dahuasecurity:thermal-tpc-bf2221_firmwarecpe:/o:dahuasecurity:thermal-tpc-bf5xxx_firmwarecpe:/o:dahuasecurity:thermal-tpc-sd2221_firmwarecpe:/o:dahuasecurity:thermal-tpc-sd8x21b_firmwarecpe:/o:dahuasecurity:thermal-tpc-sd8x21_firmwarecpe:/o:dahuasecurity:vth-542xh_firmwarecpe:/o:dahuasecurity:vto-65xxx_firmwarecpe:/o:dahuasecurity:vto-75x95x_firmware2024-07-11T16:10+09:002024-01-18T13:43+09:002024-07-11T16:10+09:00Drupal vulnerable to improper handling of structural elements
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000004.html
Drupal provided by Drupal.org contains an improper handling of structural elements vulnerability (CWE-237).
Shiga Takuma of BroadBand Security Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000004https://jvn.jp/en/jp/JVN63383723/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-22362https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-22362https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:drupal:drupal2024-03-12T17:33+09:002024-01-16T13:41+09:002024-03-12T17:33+09:00Pleasanter vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000003.html
Pleasanter provided by Implem Inc. contains a cross-site scripting vulnerability (CWE-79).
Masamitsu Kushi of Operation Group, Communication Technology Department, Digital Innovation HQ at Mitsubishi Heavy Industries, Ltd. reported this vulnerability to Implem Inc. and coordinated. After the coordination was completed, Implem Inc. reported the case to IPA under the Information Security Early Warning Partnership to notify users of the solution through JVN.JVNDB-2024-000003https://jvn.jp/en/jp/JVN51135247/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-21584https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:pleasanter:pleasanter2024-01-15T15:59+09:002024-01-15T15:59+09:002024-01-15T15:59+09:00Thermal camera TMC series vulnerable to insufficient technical documentation
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000002.html
Thermal camera TMC series provided by THREE R SOLUTION CORP. JAPAN are vulnerable to insufficient technical documentation (CWE-1059).
The related documentation does not describe the existence of the network interface, nor the internal storage for pictures and measurement data.
Hiroyuki Harada of Sapporo Gakuin University reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000002https://jvn.jp/en/jp/JVN96240417/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-22028https://nvd.nist.gov/vuln/detail/CVE-2024-22028https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:3rrr-btob:3r-tmc01_firmwarecpe:/o:3rrr-btob:3r-tmc02_firmwarecpe:/o:3rrr-btob:3r-tmc03_firmwarecpe:/o:3rrr-btob:3r-tmc04_firmwarecpe:/o:3rrr-btob:3r-tmc05_firmwarecpe:/o:3rrr-btob:3r-tmc06_firmware2024-03-11T18:17+09:002024-01-15T15:19+09:002024-03-11T18:17+09:00Improper input validation vulnerability in WordPress Plugin "WordPress Quiz Maker Plugin"
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000001.html
WordPress Plugin "WordPress Quiz Maker Plugin" provided by AYS Pro Plugins contains an improper input validation vulnerability (CWE-20).
Shogo Kumamaru of LAC CyberLink Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2024-000001https://jvn.jp/en/jp/JVN37326856/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-22027https://nvd.nist.gov/vuln/detail/CVE-2024-22027https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ays-pro:quiz_maker2024-03-14T12:28+09:002024-01-12T13:51+09:002024-03-14T12:28+09:00Multiple TP-Link products vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001002.html
Multiple products provided by TP-LINK contain multiple vulnerabilities listed below.
* OS command injection (CWE-78) - CVE-2024-21773
* OS command injection (CWE-78) - CVE-2024-21821
* OS command injection (CWE-78) - CVE-2024-21833
Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2024-001002https://jvn.jp/en/vu/JVNVU91401812/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2024-21773https://www.cve.org/CVERecord?id=CVE-2024-21821https://www.cve.org/CVERecord?id=CVE-2024-21833https://nvd.nist.gov/vuln/detail/CVE-2024-21773https://nvd.nist.gov/vuln/detail/CVE-2024-21821https://nvd.nist.gov/vuln/detail/CVE-2024-21833https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:tp-link:archer_air_r5_firmwarecpe:/o:tp-link:archer_ax3000_firmwarecpe:/o:tp-link:archer_ax5400_firmwarecpe:/o:tp-link:archer_axe75cpe:/o:tp-link:deco_x50_firmwarecpe:/o:tp-link:deco_xe200_firmware2024-03-14T13:52+09:002024-01-10T13:57+09:002024-03-14T13:52+09:00Multiple vulnerabilities in Panasonic Control FPWIN Pro7
https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001001.html
Control FPWIN Pro7 provided by Panasonic contains multiple vulnerabilities listed below.
* Stack-based Buffer Overflow (CWE-121) - CVE-2023-6314
* Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) - CVE-2023-6315
Michael Heinzl reported these vulnerabilities to the developer and coordinated. After the coordination was completed, Panasonic reported the case to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2024-001001https://jvn.jp/en/vu/JVNVU92102247/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-6314https://www.cve.org/CVERecord?id=CVE-2023-6315https://nvd.nist.gov/vuln/detail/CVE-2023-6314https://nvd.nist.gov/vuln/detail/CVE-2023-6315https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/121.htmlcpe:/a:panasonic:fpwin_pro2024-01-10T13:46+09:002024-01-10T13:46+09:002024-01-10T13:46+09:00Multiple vulnerabilities in PowerCMS
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000126.html
PowerCMS provided by Alfasado Inc. contains multiple vulnerabilities listed below.
<ul><li>Stored cross-site scripting vulnerability in the management screen (CWE-79) - CVE-2023-49117</li><li>Open redirect vulnerability in the members' site (CWE-601) - CVE-2023-50297</li></ul>
Alfasado Inc. reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JPCERT/CC and Alfasado Inc. coordinated under the Information Security Early Warning Partnership.JVNDB-2023-000126https://jvn.jp/en/jp/JVN32646742/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-49117https://www.cve.org/CVERecord?id=CVE-2023-50297https://nvd.nist.gov/vuln/detail/CVE-2023-49117https://nvd.nist.gov/vuln/detail/CVE-2023-50297https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:alfasado:powercms2024-03-18T17:58+09:002023-12-26T16:46+09:002024-03-18T17:58+09:00Multiple vulnerabilities in BUFFALO VR-S1000
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000125.html
VR-S1000 provided by BUFFALO INC. contains multiple vulnerabilities listed below.
<ul><li>OS command injection (CWE-78) - CVE-2023-45741</li><li>Argument injection (CWE-88) - CVE-2023-46681</li><li>Use of hard-coded cryptographic key (CWE-321) - CVE-2023-46711</li><li>Information disclosure (CWE-200) - CVE-2023-51363</li></ul>
CVE-2023-45741, CVE-2023-46681, CVE-2023-46711
Thomas J. Knudsen and Samy Younsi of NeroTeam Security Labs reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
CVE-2023-51363
MASAHIRO IIDA of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000125https://jvn.jp/en/jp/JVN23771490/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-45741https://www.cve.org/CVERecord?id=CVE-2023-46681https://www.cve.org/CVERecord?id=CVE-2023-46711https://www.cve.org/CVERecord?id=CVE-2023-51363https://nvd.nist.gov/vuln/detail/CVE-2023-45741https://nvd.nist.gov/vuln/detail/CVE-2023-46681https://nvd.nist.gov/vuln/detail/CVE-2023-46711https://nvd.nist.gov/vuln/detail/CVE-2023-51363https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:buffalo_inc:vr-s1000_firmware2024-03-19T17:56+09:002023-12-26T15:51+09:002024-03-19T17:56+09:00Brother iPrint&Scan Desktop for Windows vulnerable to improper link resolution before file access
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-014781.html
iPrint&Scan Desktop for Windows provided by Brother Industries, Ltd. outputs logs to a certain log file.
The affected version of the product does not check whether the log file is a normal file or a symbolic link to a certain file (CWE-59).
Chris Au reported this vulnerability to Brother Industries, Ltd. and coordinated. Brother Industries, Ltd. and JPCERT/CC published respective advisories in order to notify users of this vulnerability.JVNDB-2023-014781https://jvn.jp/en/vu/JVNVU97943829/https://www.cve.org/CVERecord?id=CVE-2023-51654https://nvd.nist.gov/vuln/detail/CVE-2023-51654https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:brother:iprint%26scan2024-03-18T18:05+09:002023-12-26T09:27+09:002024-03-18T18:05+09:00WordPress plugin "MW WP Form" vulnerable to arbitrary file upload
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-012042.html
WordPress plugin "MW WP Form" provided by Web Consultation Office Co., Ltd can create a mail form using shortcode. MW WP Form contains a vulnerability that may allow an attacker to upload arbitrary files (CVE-2023-6316, CWE-434).JVNDB-2023-012042https://jvn.jp/en/vu/JVNVU97876221/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-6316https://nvd.nist.gov/vuln/detail/CVE-2023-6316https://www.wordfence.com/blog/2023/12/update-asap-critical-unauthenticated-arbitrary-file-upload-in-mw-wp-form-allows-malicious-code-execution/https://cwe.mitre.org/data/definitions/434.htmlcpe:/a:mw_wp_form_project:mw_wp_form2024-03-26T17:39+09:002023-12-15T15:17+09:002024-03-26T17:39+09:00Multiple vulnerabilities in GROWI
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000123.html
GROWI provided by WESEEK, Inc. contains multiple vulnerabilities listed below.
<ul><li>Stored cross-site scripting vulnerability in the presentation feature (CWE-79) - CVE-2023-42436</li><li>Stored cross-site scripting vulnerability in the App Settings (/admin/app) page and the Markdown Settings (/admin/markdown) page (CWE-79) - CVE-2023-45737</li><li>Stored cross-site scripting vulnerability when processing profile images (CWE-79) - CVE-2023-45740</li><li>Cross-site request forgery vulnerability in the User settings (/me) page (CWE-352) - CVE-2023-46699</li><li>Stored cross-site scripting vulnerability exploiting a behavior of the XSS Filter (CWE-79) - CVE-2023-47215</li><li>Stored cross-site scripting vulnerability via the img tags (CWE-79) - CVE-2023-49119</li><li>Stored cross-site scripting vulnerability in the event handlers of the pre tags (CWE-79) - CVE-2023-49598</li><li>Stored cross-site scripting vulnerability in the anchor tag (CWE-79) - CVE-2023-49779</li><li>Stored cross-site scripting vulnerability when processing the MathJax (CWE-79) - CVE-2023-49807</li><li>Stored cross-site scripting vulnerability in the App Settings (/admin/app) page, the Markdown Settings (/admin/markdown) page, and the Customize (/admin/customize) page (CWE-79) - CVE-2023-50175</li><li>Cleartext storage of sensitive information vulnerability in the App Settings (/admin/app) page's Secret access key (CWE-312) - CVE-2023-50294</li><li>Improper authorization in the User Management (/admin/users) page (CWE-285) - CVE-2023-50332</li><li>Stored cross-site scripting vulnerability in the User Management (/admin/users) page (CWE-79) - CVE-2023-50339</li></ul>
CVE-2023-42436
Kakeru Kajihara of NTT-ME System Operation Center reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-45737
Naoki Takayama of University of Tsukuba reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-45740
Kanta Nishitani of GMO Cybersecurity by Ierae Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-46699
Norihide Saito reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-47215, CVE-2023-49779
Naoya Miyaguchi of Kanmu, Inc reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-49119
Naoki Takayama of University of Tsukuba, Suguru Itagaki of NTT-ME System Operation Center, and Norihide Saito of Flatt Security inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-49598
Naoya Miyaguchi of Kanmu, Inc, SHO ODAGIRI of GMO Cybersecurity by Ierae Inc., Tsubasa Fujii (@reinforchu), Eiji Mori of Flatt Security Inc., Shiga Takuma of BroadBand Security Inc., and Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-49807
Naoya Miyaguchi of Kanmu, Inc and Naoki Takayama of University of Tsukuba reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-50175
Norihide Saito of Flatt Security inc., Naoya Miyaguchi of Kanmu, Inc, and Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-50294, CVE-2023-50332, CVE-2023-50339
Norihide Saito of Flatt Security inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000123https://jvn.jp/en/jp/JVN18715935/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-42436https://www.cve.org/CVERecord?id=CVE-2023-45737https://www.cve.org/CVERecord?id=CVE-2023-45740https://www.cve.org/CVERecord?id=CVE-2023-46699https://www.cve.org/CVERecord?id=CVE-2023-47215https://www.cve.org/CVERecord?id=CVE-2023-49119https://www.cve.org/CVERecord?id=CVE-2023-49598https://www.cve.org/CVERecord?id=CVE-2023-49779https://www.cve.org/CVERecord?id=CVE-2023-49807https://www.cve.org/CVERecord?id=CVE-2023-50175https://www.cve.org/CVERecord?id=CVE-2023-50294https://www.cve.org/CVERecord?id=CVE-2023-50332https://www.cve.org/CVERecord?id=CVE-2023-50339https://nvd.nist.gov/vuln/detail/CVE-2023-42436https://nvd.nist.gov/vuln/detail/CVE-2023-45737https://nvd.nist.gov/vuln/detail/CVE-2023-45740https://nvd.nist.gov/vuln/detail/CVE-2023-46699https://nvd.nist.gov/vuln/detail/CVE-2023-47215https://nvd.nist.gov/vuln/detail/CVE-2023-49119https://nvd.nist.gov/vuln/detail/CVE-2023-49598https://nvd.nist.gov/vuln/detail/CVE-2023-49779https://nvd.nist.gov/vuln/detail/CVE-2023-49807https://nvd.nist.gov/vuln/detail/CVE-2023-50175https://nvd.nist.gov/vuln/detail/CVE-2023-50294https://nvd.nist.gov/vuln/detail/CVE-2023-50332https://nvd.nist.gov/vuln/detail/CVE-2023-50339https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:weseek:growi2024-03-19T17:46+09:002023-12-13T15:30+09:002024-03-19T17:46+09:00ELECOM wireless LAN routers vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-011403.html
Multiple ELECOM wireless LAN routers provided by ELECOM CO.,LTD. contain an OS command injection vulnerability (CWE-78).
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-011403https://jvn.jp/en/vu/JVNVU97499577/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-49695https://nvd.nist.gov/vuln/detail/CVE-2023-49695https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:elecom:wrc-x3000gsa_firmwarecpe:/o:elecom:wrc-x3000gsn_firmwarecpe:/o:elecom:wrc-x3000gs_firmware2024-04-18T17:22+09:002023-12-13T15:06+09:002024-04-18T17:22+09:00Multiple denial-of-service (DoS) vulnerabilities in JTEKT ELECTRONICS HMI GC-A2 series
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000122.html
HMI GC-A2 series provided by JTEKT ELECTRONICS CORPORATION contains multiple denial-of-service (DoS) vulnerabilities listed below.
<ul><li>Denial-of-service (DoS) vulnerability in FTP service (CWE-400) - CVE-2023-41963</li><li>Denial-of-service (DoS) vulnerability in commplex-link service (CWE-400) - CVE-2023-49140</li><li>Denial-of-service (DoS) vulnerability in rfe service (CWE-400) - CVE-2023-49143</li><li>Denial-of-service (DoS) vulnerability in NetBIOS service (CWE-400) - CVE-2023-49713</li></ul>
JTEKT ELECTRONICS CORPORATION reported these vulnerabilities to IPA to notify users of the solution through JVN. JPCERT/CC and JTEKT ELECTRONICS CORPORATION coordinated under the Information Security Early Warning Partnership.JVNDB-2023-000122https://jvn.jp/en/jp/JVN34145838/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-41963https://www.cve.org/CVERecord?id=CVE-2023-49140https://www.cve.org/CVERecord?id=CVE-2023-49143https://www.cve.org/CVERecord?id=CVE-2023-49713https://nvd.nist.gov/vuln/detail/CVE-2023-41963https://nvd.nist.gov/vuln/detail/CVE-2023-49140https://nvd.nist.gov/vuln/detail/CVE-2023-49143https://nvd.nist.gov/vuln/detail/CVE-2023-49713https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:jtekt:gc-a22w-cw_firmwarecpe:/o:jtekt:gc-a24-m_firmwarecpe:/o:jtekt:gc-a24w-c%28w%29_firmwarecpe:/o:jtekt:gc-a24_firmwarecpe:/o:jtekt:gc-a25_firmwarecpe:/o:jtekt:gc-a26-j2_firmwarecpe:/o:jtekt:gc-a26w-c%28w%29_firmwarecpe:/o:jtekt:gc-a26_firmwarecpe:/o:jtekt:gc-a27-c_firmwarecpe:/o:jtekt:gc-a28-c_firmware2024-04-22T16:55+09:002023-12-11T14:12+09:002024-04-22T16:55+09:00FXC wireless LAN routers "AE1021PE" and "AE1021" vulnerable to OS command injection Critical
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-009966.html
"AE1021PE" and "AE1021" provided by FXC Inc. are information outlet-based wireless LAN routers.
"AE1021PE" and "AE1021" contain an OS command injection vulnerability (CWE-78).
JPCERT/CC has confirmed the communication which exploits this vulnerability.
Ryu Kuki, Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer.
And almost at the same time, The Akamai SIRT reported this vulnerability to CISA. JPCERT/CC coordinated with the developer.JVNDB-2023-009966https://jvn.jp/en/vu/JVNVU92152057/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-49897https://nvd.nist.gov/vuln/detail/CVE-2023-49897https://cisa.gov/known-exploited-vulnerabilities-cataloghttps://www.cisa.gov/news-events/ics-advisories/icsa-23-355-01https://www.akamai.com/blog/security-research/zero-day-vulnerability-spreading-mirai-patchedhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:fxc:ae1021pe_firmwarecpe:/o:fxc:ae1021_firmware2023-12-25T16:54+09:002023-12-07T15:09+09:002023-12-25T16:54+09:00OS command injection vulnerability in DT900
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-009619.html
DT900 contains an OS command injection vulnerability.
reported by Mr. Gianluca Altomani. for NEC-PSIRT
JVNDB-2023-009619https://www.cve.org/CVERecord?id=CVE-2023-3741https://nvd.nist.gov/vuln/detail/CVE-2023-3741https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:nec:itk-12d-1%28bk%29tel_firmwarecpe:/o:nec:itk-12d-1p%28bk%29tel_firmwarecpe:/o:nec:itk-12dg-1p%28bk%29tel_firmwarecpe:/o:nec:itk-32lcg-1p%28bk%29tel_firmwarecpe:/o:nec:itk-32lcgs-1%28bk%29tel_firmwarecpe:/o:nec:itk-32lcgs-1a%28bk%29tel_firmwarecpe:/o:nec:itk-32lcgs-1p%28bk%29tel_firmwarecpe:/o:nec:itk-32tcg-1p%28bk%29tel_firmwarecpe:/o:nec:itk-32tcgs-1%28bk%29tel_firmwarecpe:/o:nec:itk-32tcgs-1a%28bk%29tel_firmwarecpe:/o:nec:itk-32tcgs-1p%28bk%29tel_firmwarecpe:/o:nec:itk-6d-1%28bk%29tel_firmwarecpe:/o:nec:itk-6d-1p%28bk%29tel_firmwarecpe:/o:nec:itk-6dg-1p%28bk%29tel_firmwarecpe:/o:nec:itk-6dgs-1%28bk%29tel_firmwarecpe:/o:nec:itk-6dgs-1%28bk%29tel_firmwarecpe:/o:nec:itk-6dgs-1a%28bk%29tel_firmwarecpe:/o:nec:itk-6dgs-1p%28bk%29tel_firmwarecpe:/o:nec:itk-8lcg-1p%28bk%29tel_firmwarecpe:/o:nec:itk-8lcx-1%28bk%29tel_firmwarecpe:/o:nec:itk-8lcx-1p%28bk%29tel_firmwarecpe:/o:nec:itk-8tcgx-1%28bk%29tel_firmwarecpe:/o:nec:itk-8tcgx-1p%28bk%29tel_firmware2023-12-06T14:43+09:002023-12-06T14:43+09:002023-12-06T14:43+09:00RakRak Document Plus vulnerable to path traversal
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000121.html
RakRak Document Plus provided by Sumitomo Electric Information Systems Co., Ltd. contains a path traversal vulnerability (CWE-22).
Asato Masamu of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000121https://jvn.jp/en/jp/JVN46895889/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-49108https://nvd.nist.gov/vuln/detail/CVE-2023-49108#vulnConfigurationsAreahttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:sei-info:rakrak_document_plus2024-01-24T12:06+09:002023-12-04T13:45+09:002024-01-24T12:06+09:00Ruckus Access Point contains a cross-site scripting vulnerability.
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000119.html
Ruckus Access Point provided by CommScope, Inc. contains a cross-site scripting vulnerability (CWE-79).
MUNEHIRO SHIRATANI of AGEST,Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000119https://jvn.jp/en/jp/JVN45891816/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-49225https://nvd.nist.gov/vuln/detail/CVE-2023-49225https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:commscope:ap_solocpe:/o:commscope:smartzone_firmwarecpe:/o:commscope:zonedirector_firmware2024-04-23T17:51+09:002023-12-01T14:58+09:002024-04-23T17:51+09:00Multiple vulnerabilities in LuxCal Web Calendar
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000117.html
LuxCal Web Calendar provided by LuxSoft contains multiple vulnerabilities listed below.
<ul><li>SQL injection (CWE-89) - CVE-2023-46700</li><li>Cross-site scripting (CWE-79) - CVE-2023-47175</li></ul>
Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000117https://jvn.jp/en/jp/JVN15005948/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-46700https://www.cve.org/CVERecord?id=CVE-2023-47175https://nvd.nist.gov/vuln/detail/CVE-2023-46700https://nvd.nist.gov/vuln/detail/CVE-2023-47175https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:luxsoft:luxcal_web_calendar2023-11-20T17:15+09:002023-11-20T17:15+09:002023-11-20T17:15+09:00Multiple vulnerabilities in EXPRESSCLUSTER X
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-007152.html
WebManager/Cluster WebUI of EXPRESSCLUSTER X provided by NEC Corporation contains multiple vulnerabilities listed below.
* Missing authorization (CWE-862) - CVE-2023-39544
* Files or directories accessible to external parties (CWE-552) - CVE-2023-39545
* Use of password hash instead of password for authentication (CWE-836) - CVE-2023-39546
* Authentication bypass by Capture-replay (CWE-294) - CVE-2023-39547
* Unrestricted upload of file with dangerous type (CWE-434) - CVE-2023-39548JVNDB-2023-007152https://jvn.jp/en/vu/JVNVU98954968/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-39544https://www.cve.org/CVERecord?id=CVE-2023-39545https://www.cve.org/CVERecord?id=CVE-2023-39546https://www.cve.org/CVERecord?id=CVE-2023-39547https://www.cve.org/CVERecord?id=CVE-2023-39548https://nvd.nist.gov/vuln/detail/CVE-2023-39544https://nvd.nist.gov/vuln/detail/CVE-2023-39545https://nvd.nist.gov/vuln/detail/CVE-2023-39546https://nvd.nist.gov/vuln/detail/CVE-2023-39547https://nvd.nist.gov/vuln/detail/CVE-2023-39548https://cwe.mitre.org/data/definitions/294.htmlhttps://cwe.mitre.org/data/definitions/434.htmlhttps://cwe.mitre.org/data/definitions/552.htmlhttps://cwe.mitre.org/data/definitions/836.htmlhttps://cwe.mitre.org/data/definitions/862.htmlcpe:/a:nec:expresscluster_xcpe:/a:nec:expresscluster_x_singleserversafe2024-05-01T18:10+09:002023-11-20T14:09+09:002024-05-01T18:10+09:00Multiple vulnerabilities in First Corporation's DVRs
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-007150.html
DVRs provided by First Co., Ltd. contain multiple vulnerabilities listed below.
* Use of hard-coded password (CWE-259) - CVE-2023-47213
* Missing authentication for critical function (CWE-306) - CVE-2023-47674
Yoshiki Mori of National Institute of Information and Communications Technology Cybersecurity Research Institute reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-007150https://jvn.jp/en/vu/JVNVU99077347/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-47213https://www.cve.org/CVERecord?id=CVE-2023-47674https://nvd.nist.gov/vuln/detail/CVE-2023-47213https://nvd.nist.gov/vuln/detail/CVE-2023-47674https://blog.nicter.jp/2022/04/nicter_statistics_2022_1q/#%E6%97%A5%E6%9C%AC%E5%9B%BD%E5%86%85%E3%81%AE-mirai-%E6%84%9F%E6%9F%93%E3%83%9B%E3%82%B9%E3%83%88%E6%95%B0%E3%81%AE%E6%80%A5%E5%A2%97%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6https://cwe.mitre.org/data/definitions/259.htmlhttps://cwe.mitre.org/data/definitions/306.htmlcpe:/o:c-first:cfr-1004ea_firmwarecpe:/o:c-first:cfr-1008ea_firmwarecpe:/o:c-first:cfr-1016ea_firmwarecpe:/o:c-first:cfr-16eaa_firmwarecpe:/o:c-first:cfr-16eab_firmwarecpe:/o:c-first:cfr-16eha_firmwarecpe:/o:c-first:cfr-16ehd_firmwarecpe:/o:c-first:cfr-4eaam_firmwarecpe:/o:c-first:cfr-4eaa_firmwarecpe:/o:c-first:cfr-4eabc_firmwarecpe:/o:c-first:cfr-4eab_firmwarecpe:/o:c-first:cfr-4eha_firmwarecpe:/o:c-first:cfr-4ehd_firmwarecpe:/o:c-first:cfr-8eaa_firmwarecpe:/o:c-first:cfr-8eab_firmwarecpe:/o:c-first:cfr-8eha_firmwarecpe:/o:c-first:cfr-8ehd_firmwarecpe:/o:c-first:cfr-904e_firmwarecpe:/o:c-first:cfr-908e_firmwarecpe:/o:c-first:cfr-916e_firmwarecpe:/o:c-first:md-404aa_firmwarecpe:/o:c-first:md-404ab_firmwarecpe:/o:c-first:md-404ha_firmwarecpe:/o:c-first:md-404hd_firmwarecpe:/o:c-first:md-808aa_firmwarecpe:/o:c-first:md-808ab_firmwarecpe:/o:c-first:md-808ha_firmwarecpe:/o:c-first:md-808hd_firmware2024-07-11T17:05+09:002023-11-17T17:31+09:002024-07-11T17:05+09:00Redmine vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000116.html
Redmine contains a cross-site scripting vulnerability (CWE-79) due to improper character string processing.
Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000116https://jvn.jp/en/jp/JVN13618065/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-47259https://nvd.nist.gov/vuln/detail/CVE-2023-47259https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:redmine:redmine2024-05-09T17:55+09:002023-11-17T14:32+09:002024-05-09T17:55+09:00Multiple vulnerabilities in CubeCart
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000118.html
CubeCart provided by CubeCart Limited contains multiple vulnerabilities listed below.
<ul><li>Cross-site request forgery (CWE-352) - CVE-2023-38130</li><li>Directory traversal (CWE-22) - CVE-2023-42428</li><li>Directory traversal (CWE-22) - CVE-2023-47283</li><li>OS command injection (CWE-78) - CVE-2023-47675</li></ul>
Gen Sato of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to the developer first, and to IPA later.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000118https://jvn.jp/en/jp/JVN22220399/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-38130https://www.cve.org/CVERecord?id=CVE-2023-42428https://www.cve.org/CVERecord?id=CVE-2023-47283https://www.cve.org/CVERecord?id=CVE-2023-47675https://nvd.nist.gov/vuln/detail/CVE-2023-38130https://nvd.nist.gov/vuln/detail/CVE-2023-42428https://nvd.nist.gov/vuln/detail/CVE-2023-47283https://nvd.nist.gov/vuln/detail/CVE-2023-47675https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:cubecart:cubecart2024-04-30T18:15+09:002023-11-17T14:22+09:002024-04-30T18:15+09:00Multiple vulnerabilities in ELECOM and LOGITEC routers
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-006588.html
Multiple routers provided by ELECOM CO.,LTD. and LOGITEC CORPORATION contain multiple vulnerabilities listed below.
* OS Command Injection (CWE-78) - CVE-2023-43752
* Inadequate Encryption Strength (CWE-326) - CVE-2023-43757
CVE-2023-43752
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.
CVE-2023-43757
Katsuhiko Sato(a.k.a. goroh_kun), Yuya Adachi and Ryo Kamino of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-006588http://jvn.jp/en/vu/JVNVU94119876/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-43752https://www.cve.org/CVERecord?id=CVE-2023-43757https://nvd.nist.gov/vuln/detail/CVE-2023-43752https://nvd.nist.gov/vuln/detail/CVE-2023-43757https://cwe.mitre.org/data/definitions/326.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:elecom:wrc-1167ghbk2_firmwarecpe:/o:elecom:wrc-1167ghbk_firmwarecpe:/o:elecom:wrc-1750ghbk-e_firmwarecpe:/o:elecom:wrc-1750ghbk2-i_firmwarecpe:/o:elecom:wrc-1750ghbk_firmwarecpe:/o:elecom:wrc-2533ghbk-i_firmwarecpe:/o:elecom:wrc-2533ghbk2-t_firmwarecpe:/o:elecom:wrc-300febk_firmwarecpe:/o:elecom:wrc-300ghbk2-i_firmwarecpe:/o:elecom:wrc-300ghbk_firmwarecpe:/o:elecom:wrc-733febk_firmwarecpe:/o:elecom:wrc-733ghbk-c_firmwarecpe:/o:elecom:wrc-733ghbk-i_firmwarecpe:/o:elecom:wrc-733ghbk_firmwarecpe:/o:elecom:wrc-f1167acf_firmwarecpe:/o:elecom:wrc-f300nf_firmwarecpe:/o:elecom:wrc-x3000gs2-b_firmwarecpe:/o:elecom:wrc-x3000gs2-w_firmwarecpe:/o:elecom:wrc-x3000gs2a-b_firmwarecpe:/o:elecom:wrh-150bk_firmwarecpe:/o:elecom:wrh-150wh_firmwarecpe:/o:elecom:wrh-300bk-s_firmwarecpe:/o:elecom:wrh-300bk2-s_firmwarecpe:/o:elecom:wrh-300bk_firmwarecpe:/o:elecom:wrh-300rd_firmwarecpe:/o:elecom:wrh-300sv_firmwarecpe:/o:elecom:wrh-300wh-h_firmwarecpe:/o:elecom:wrh-300wh-s_firmwarecpe:/o:elecom:wrh-300wh2-s_firmwarecpe:/o:elecom:wrh-300wh_firmwarecpe:/o:elecom:wrh-h300bk_firmwarecpe:/o:elecom:wrh-h300wh_firmwarecpe:/o:logitec:lan-w300n%2fp_firmwarecpe:/o:logitec:lan-w300n%2frs_firmwarecpe:/o:logitec:lan-w301nr_firmwarecpe:/o:logitec:lan-wh300n%2fdgp_firmwarecpe:/o:logitec:lan-wh300ndgpe_firmware2024-04-26T15:22+09:002023-11-15T18:27+09:002024-04-26T15:22+09:00ASUSTeK COMPUTER RT-AC87U vulnerable to improper access control
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-006578.html
RT-AC87U provided by ASUSTeK COMPUTER INC. contains an improper access control vulnerability (CWE-284).
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-006578http://jvn.jp/en/vu/JVNVU96079387/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-47678https://nvd.nist.gov/vuln/detail/CVE-2023-47678https://cwe.mitre.org/data/definitions/284.htmlcpe:/o:asus:rt-ac87u_firmware2024-04-30T18:08+09:002023-11-15T17:44+09:002024-04-30T18:08+09:00OSS Calendar vulnerable to SQL injection
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000115.html
OSS Calendar provided by Thinkingreed Inc. contains an SQL injection vulnerability (CWE-89).
Shogo Iyota of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000115https://jvn.jp/en/jp/JVN67822421/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-47609https://nvd.nist.gov/vuln/detail/CVE-2023-47609https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:f-revocrm:oss_calendar2024-05-01T17:38+09:002023-11-14T14:05+09:002024-05-01T17:38+09:00Multiple security updates for Trend Micro Apex One and Apex One as a Service (November 2023)
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-006199.html
Trend Micro Incorporated has released multiple security updates for Trend Micro Apex One and Apex One as a Service.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2023-006199http://jvn.jp/en/vu/JVNVU98040889/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-47192https://www.cve.org/CVERecord?id=CVE-2023-47193https://www.cve.org/CVERecord?id=CVE-2023-47194https://www.cve.org/CVERecord?id=CVE-2023-47195https://www.cve.org/CVERecord?id=CVE-2023-47196https://www.cve.org/CVERecord?id=CVE-2023-47197https://www.cve.org/CVERecord?id=CVE-2023-47198https://www.cve.org/CVERecord?id=CVE-2023-47199https://www.cve.org/CVERecord?id=CVE-2023-47200https://www.cve.org/CVERecord?id=CVE-2023-47201https://www.cve.org/CVERecord?id=CVE-2023-47202https://nvd.nist.gov/vuln/detail/CVE-2023-47192https://nvd.nist.gov/vuln/detail/CVE-2023-47193https://nvd.nist.gov/vuln/detail/CVE-2023-47194https://nvd.nist.gov/vuln/detail/CVE-2023-47195https://nvd.nist.gov/vuln/detail/CVE-2023-47196https://nvd.nist.gov/vuln/detail/CVE-2023-47197https://nvd.nist.gov/vuln/detail/CVE-2023-47198https://nvd.nist.gov/vuln/detail/CVE-2023-47199https://nvd.nist.gov/vuln/detail/CVE-2023-47200https://nvd.nist.gov/vuln/detail/CVE-2023-47201https://nvd.nist.gov/vuln/detail/CVE-2023-47202https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:trendmicro:apex_one2024-03-13T17:28+09:002023-11-13T17:28+09:002024-03-13T17:28+09:00Multiple vulnerabilities in Pleasanter
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000112.html
Pleasanter provided by Implem Inc. contains multiple vulnerabilities listed below.
<ul><li>Stored cross-site scripting vulnerability (CWE-79) - CVE-2023-34439</li><li>Improper access control vulnerability (CWE-284) - CVE-2023-45210</li><li>Open redirect vulnerability (CWE-601) - CVE-2023-46688</li><li>Authentication bypass vulnerability by SAML (CWE-289) - CVE-2023-41890</li></ul>
CVE-2023-41890
This issue is caused by a vulnerability in Sustainsys.Saml2 library used in the product.
CVE-2023-34439,CVE-2023-45210
Sato Nobuhiro of Suzuki Motor Corporation and You Okuma of LAC Co., Ltd. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-46688
Yoichi Tsuzuki of FFRI Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Implem Inc. reported to IPA that CVE-2023-41890 vulnerability still exists in the product. JPCERT/CC coordinated with the developer.JVNDB-2023-000112https://jvn.jp/en/jp/JVN96209256/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-34439https://www.cve.org/CVERecord?id=CVE-2023-45210https://www.cve.org/CVERecord?id=CVE-2023-46688https://www.cve.org/CVERecord?id=CVE-2023-41890https://nvd.nist.gov/vuln/detail/CVE-2023-34439https://nvd.nist.gov/vuln/detail/CVE-2023-41890https://nvd.nist.gov/vuln/detail/CVE-2023-45210https://nvd.nist.gov/vuln/detail/CVE-2023-46688https://github.com/Sustainsys/Saml2/security/advisories/GHSA-fv2h-753j-9g39https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:pleasanter:pleasanter2024-04-22T17:56+09:002023-11-13T15:57+09:002024-04-22T17:56+09:00Multiple vulnerabilities in Cisco Firepower Management Center Software
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000114.html
Cisco Firepower Management Center Software provided by Cisco Systems contains multiple vulnerabilities listed below.
<ul><li>OS command injection (CWE-78) - CVE-2023-20219</li><li>Path traversal (CWE-22) - CVE-2023-20220</li></ul>
Kentaro Kawane of LAC Co., Ltd. reported these vulnerabilitis to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000114https://jvn.jp/en/jp/JVN17806703/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-20219https://www.cve.org/CVERecord?id=CVE-2023-20220https://nvd.nist.gov/vuln/detail/CVE-2023-20219https://nvd.nist.gov/vuln/detail/CVE-2023-20220https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:cisco:firepower_management_center2024-05-07T15:07+09:002023-11-13T14:01+09:002024-05-07T15:07+09:00Remarshal unlimitedly expanding YAML alias nodes
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000111.html
Remarshal provided by Remarshal Project expands YAML alias nodes unlimitedly (CWE-674), hence Remarshal is vulnerable to Billion Laughs Attack.
Taichi Kotake of Sterra Security Co.,Ltd. / Akatsuki Games Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000111http://jvn.jp/en/jp/JVN86156389/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-47163https://nvd.nist.gov/vuln/detail/CVE-2023-47163https://github.com/yaml/yaml-spec/issues/45https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:remarshal_project:remarshal2024-05-08T17:53+09:002023-11-10T14:41+09:002024-05-08T17:53+09:00HOTELDRUID vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000113.html
HOTELDRUID provided by DigitalDruid.Net contains a cross-site scripting vulnerability (CWE-79).
Tomoro Taniguchi of FiveDrive, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000113http://jvn.jp/en/jp/JVN99177549/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-47164https://nvd.nist.gov/vuln/detail/CVE-2023-47164https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:digitaldruid:hoteldruid2024-05-01T17:47+09:002023-11-10T14:41+09:002024-05-01T17:47+09:00EC-CUBE 3 series and 4 series vulnerable to arbitrary code execution
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000107.html
EC-CUBE 3 series and 4 series provided by EC-CUBE CO.,LTD. contain an arbitrary code execution vulnerability (CWE-94) due to improper settings of the product's template engine "Twig".
Takeshi Miura of N.F.Laboratories Inc. reported this vulnerability to EC-CUBE CO.,LTD.
EC-CUBE CO.,LTD. Inc. reported this case to JPCERT/CC to notify users of its solution through JVN.JVNDB-2023-000107https://jvn.jp/en/jp/JVN29195731/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-46845https://nvd.nist.gov/vuln/detail/CVE-2023-46845https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ec-cube:ec-cube2024-05-09T17:17+09:002023-11-07T13:47+09:002024-05-09T17:17+09:00FUJIFILM Business Innovation Corp. and Xerox Corporation MFPs export Address Books with insufficient encryption strength
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-004919.html
Multiple MFPs (multifunction printers) provided by FUJIFILM Business Innovation Corp. and Xerox Corporation provide a facility to export the contents of their Address Book with encrypted form, but the encryption strength is insufficient (CWE-1391).
Kunal Thakrar and Ceri Coburn of Pen Test Partners directly reported this vulnerability to FUJIFILM Business Innovation Corp.
FUJIFILM Business Innovation Corp. reported this case to JPCERT/CC to request the coordination with the reporter.JVNDB-2023-004919https://jvn.jp/en/vu/JVNVU96482726/https://www.cve.org/CVERecord?id=CVE-2023-46327https://nvd.nist.gov/vuln/detail/CVE-2023-46327https://cwe.mitre.org/data/definitions/1391.htmlcpe:/a:fuji_xerox:multiple_productcpe:/a:xerox:multiple_product2024-05-07T15:25+09:002023-11-02T17:21+09:002024-05-07T15:25+09:00Improper restriction of XML external entity references (XXE) in e-Tax software
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000110.html
e-Tax software provided by National Tax Agency improperly restricts XML external entity references (XXE) (CWE-611) due to the configuration of the embedded XML parser.
Toyama Taku of NEC Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000110https://jvn.jp/en/jp/JVN14762986/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-46802https://nvd.nist.gov/vuln/detail/CVE-2023-46802https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:nta:e-tax2024-05-01T18:41+09:002023-11-02T13:38+09:002024-05-01T18:41+09:00Multiple Vulnerabilities in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-004790.html
Multiple vulnerabilities have been found in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer.JVNDB-2023-004790https://www.cve.org/CVERecord?id=CVE-2022-3884https://www.cve.org/CVERecord?id=CVE-2022-4895https://nvd.nist.gov/vuln/detail/CVE-2022-3884https://nvd.nist.gov/vuln/detail/CVE-2022-4895https://cwe.mitre.org/data/definitions/276.htmlhttps://cwe.mitre.org/data/definitions/295.htmlcpe:/a:hitachi:infrastructure_analytics_advisorcpe:/a:hitachi:ops_center_analyzer2023-11-02T12:14+09:002023-11-02T12:14+09:002023-11-02T12:14+09:00MCL Technologies MCL-Net vulnerable to directory traversal
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-004754.html
Server software "MCL-Net" provided by MCL Technologies contains a directory traversal vulnerability (CWE-22, CVE-2023-4990).
Panasonic reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.JVNDB-2023-004754https://jvn.jp/en/vu/JVNVU99565391/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-4990https://nvd.nist.gov/vuln/detail/CVE-2023-4990https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:mcl-collection:mcl-net_firmware2023-11-01T16:49+09:002023-11-01T16:49+09:002023-11-01T16:49+09:00Cybozu Remote Service vulnerable to uncontrolled resource consumption
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000109.html
Cybozu Remote Service provided by Cybozu, Inc. is vulnerable to uncontrolled resource consumption (CWE-400).
Cybozu, Inc. reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.JVNDB-2023-000109https://jvn.jp/en/jp/JVN94132951/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-46278https://nvd.nist.gov/vuln/detail/CVE-2023-46278https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:cybozu:cybozu_remote_service2024-05-07T15:51+09:002023-10-31T13:43+09:002024-05-07T15:51+09:00Inkdrop vulnerable to code injection
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000108.html
Inkdrop provided by Takuya Matsuyama is a Markdown editor. Inkdrop contains a code injection vulnerability (CWE-94).
T.Nodoka reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000108https://jvn.jp/en/jp/JVN48057522/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-44141https://nvd.nist.gov/vuln/detail/CVE-2023-44141https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:inkdrop2024-05-07T16:09+09:002023-10-30T13:48+09:002024-05-07T16:09+09:00Advanced Micro Devices Windows kernel drivers vulnerable to insufficient access control on its IOCTL
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-004294.html
Multiple Windows kernel drivers provided by Advanced Micro Devices Inc. are vulnerable to insufficient access control on its IOCTL (CWE-782, CVE-2023-20598).
Takahiro Haruyama of VMware reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-004294https://jvn.jp/en/vu/JVNVU97149791/https://jvn.jp/en/ta/JVNTA90371415/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-20598https://nvd.nist.gov/vuln/detail/CVE-2023-20598https://cwe.mitre.org/data/definitions/782.htmlcpe:/a:amd:adrenalincpe:/a:amd:pro2024-05-20T17:49+09:002023-10-27T16:10+09:002024-05-20T17:49+09:00Multiple vulnerabilities in baserCMS
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000106.html
baserCMS provided by baserCMS Users Community contains multiple vulnerabilities listed below.<ul><li>Stored cross-site scripting vulnerability (CWE-79) - CVE-2023-29009</li><li>Reflected cross-site scripting vulnerability (CWE-79) - CVE-2023-43647</li><li>Directory traversal vulnerability (CWE-22) - CVE-2023-43648</li><li>Cross-site request forgery vulnerability (CWE-352) - CVE-2023-43649</li><li>Arbitrary file upload vulnerability (CWE-434) - CVE-2023-43792</li></ul>
CVE-2023-29009
Kyohei Ota reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-43647, CVE-2023-43648, CVE-2023-43649, CVE-2023-43792
Shiga Takuma of BroadBand Security, Inc reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000106https://jvn.jp/en/jp/JVN45547161/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-29009https://www.cve.org/CVERecord?id=CVE-2023-43647https://www.cve.org/CVERecord?id=CVE-2023-43648https://www.cve.org/CVERecord?id=CVE-2023-43649https://www.cve.org/CVERecord?id=CVE-2023-43792https://nvd.nist.gov/vuln/detail/CVE-2023-29009https://nvd.nist.gov/vuln/detail/CVE-2023-43647https://nvd.nist.gov/vuln/detail/CVE-2023-43648https://nvd.nist.gov/vuln/detail/CVE-2023-43649https://nvd.nist.gov/vuln/detail/CVE-2023-43792https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:basercms:basercms2024-05-07T15:59+09:002023-10-27T14:46+09:002024-05-07T15:59+09:00Movable Type vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000105.html
Movable Type provided by Six Apart Ltd. contains a cross-site scripting vulnerability (CWE-79).
Six Apart Ltd. reported this vulnerability to JPCERT/CC to notify users of the solutions through JVN. JPCERT/CC and Six Apart Ltd. coordinated under the Information Security Early Warning Partnership.JVNDB-2023-000105https://jvn.jp/en/jp/JVN39139884/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-45746https://nvd.nist.gov/vuln/detail/CVE-2023-45746https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:sixapart:movable_typecpe:/a:sixapart:movable_type_advancedcpe:/a:sixapart:movable_type_premiumcpe:/a:sixapart:movable_type_premium_advanced2024-05-10T17:47+09:002023-10-25T15:18+09:002024-05-10T17:47+09:00Improper restriction of XML external entity reference (XXE) vulnerability in OMRON CX-Designer
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003956.html
CX-Designer provided by OMRON Corporation contains an improper restriction of XML external entity reference (XXE) vulnerability (CWE-611).
Michael Heinzl reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-003956https://jvn.jp/en/vu/JVNVU98683567/https://www.cve.org/CVERecord?id=CVE-2023-43624https://nvd.nist.gov/vuln/detail/CVE-2023-43624https://cwe.mitre.org/data/definitions/611.htmlcpe:/a:omron:cx-designer2024-05-10T17:47+09:002023-10-24T16:11+09:002024-05-10T17:47+09:00HP ThinUpdate vulnerable to improper server certificate verification
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000103.html
HP ThinUpdate provided by HP Development Company, L.P. is vulnerable to improper server certificate verification (CWE-295).
Narumi Hirai of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000103https://jvn.jp/en/jp/JVN02058996/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-4499https://nvd.nist.gov/vuln/detail/CVE-2023-4499https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hp:thinupdate2023-10-23T14:26+09:002023-10-23T14:26+09:002023-10-23T14:26+09:00Multiple vulnerabilities in JustSystems products
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000102.html
Multiple products provided by JustSystems Corporation contain multiple vulnerabilities listed below.
* Use after free (CWE-416) - CVE-2023-34366
* Integer overflow (CWE-190) - CVE-2023-38127
* Access of resource using incompatible type (Type confusion) (CWE-843) - CVE-2023-38128
* Improper validation of array index (CWE-129) - CVE-2023-35126
Cisco Talos Security Intelligence & Research Group reported these vulnerabilities to JustSystems Corporation and coordinated. JustSystems Corporation and JPCERT/CC published respective advisories in order to notify users of the solution through JVN.
JVNDB-2023-000102https://jvn.jp/en/jp/JVN28846531/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-34366https://www.cve.org/CVERecord?id=CVE-2023-38127https://www.cve.org/CVERecord?id=CVE-2023-38128https://www.cve.org/CVERecord?id=CVE-2023-35126https://nvd.nist.gov/vuln/detail/CVE-2023-34366https://nvd.nist.gov/vuln/detail/CVE-2023-38127https://nvd.nist.gov/vuln/detail/CVE-2023-38128https://nvd.nist.gov/vuln/detail/CVE-2023-35126https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:justsystems:ichitarocpe:/a:justsystems:just_governmentcpe:/a:justsystems:just_officecpe:/a:justsystems:just_policecpe:/a:justsystems:rakuraku_hagaki2024-05-16T16:44+09:002023-10-19T15:16+09:002024-05-16T16:44+09:00Improper restriction of XML external entity references (XXE) in Proself
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000104.html
Proself provided by North Grid Corporation improperly restricts XML external entity references (XXE) (CWE-611).
The developer states that attacks exploiting this vulnerability have been observed.
North Grid Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and North Grid Corporation coordinated under the Information Security Early Warning Partnership.JVNDB-2023-000104https://jvn.jp/en/jp/JVN95981460/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-45727https://nvd.nist.gov/vuln/detail/CVE-2023-45727https://www.ipa.go.jp/security/security-alert/2023/20231018-jvn.htmlhttps://www.jpcert.or.jp/at/2023/at230022.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:northgrid:proself2024-05-15T17:08+09:002023-10-18T18:00+09:002024-05-15T17:08+09:00Multiple vulnerabilities in JTEKT ELECTRONICS OnSinView2
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003913.html
OnSinView2 provided by JTEKT ELECTRONICS CORPORATION contains multiple vulnerabilities listed below.
* Improper restriction of operations within the bounds of a memory buffer (CWE-119) - CVE-2023-42506
* Stack-based buffer overflow (CWE-121) - CVE-2023-42507
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-003913https://jvn.jp/en/vu/JVNVU98392064/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-42506https://www.cve.org/CVERecord?id=CVE-2023-42507https://nvd.nist.gov/vuln/detail/CVE-2023-42506https://nvd.nist.gov/vuln/detail/CVE-2023-42507https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/121.htmlcpe:/a:jtekt:onsinview22024-05-16T17:28+09:002023-10-18T14:13+09:002024-05-16T17:28+09:00Scanning evasion issue in Cisco Secure Email Gateway
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000100.html
Cisco Secure Email Gateway provides anti-virus scanning facility for e-mail attachments.
It was reported that a certain crafted file can evade anti-virus scanning facility.
This issue was found by Takahiro Ohtani and Michael Joshua Telloyan in the Bug Bounty program at the University of Electro-Communications.
They then reported it to IPA, and JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000100https://jvn.jp/en/jp/JVN58574030/index.htmlcpe:/o:cisco:secure_email_gateway_firmware2023-10-27T15:52+09:002023-10-16T16:11+09:002023-10-27T15:52+09:00web2py vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000101.html
web2py web application framework contains an OS command injection vulnerability (CWE-78).
Masashi Yamane of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000101https://jvn.jp/en/jp/JVN80476432/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-45158https://nvd.nist.gov/vuln/detail/CVE-2023-45158https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:web2py:web2py2024-05-22T17:58+09:002023-10-16T16:11+09:002024-05-22T17:58+09:00Out-of-bounds read vulnerability in Keyence KV STUDIO and KV REPLAY VIEWER
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003788.html
KV STUDIO and KV REPLAY VIEWER provided by KEYENCE CORPORATION contain an out-of-bounds read vulnerability (CWE-125, CVE-2023-42138).
Michael Heinzl reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-003788https://jvn.jp/en/vu/JVNVU94752076/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-42138https://nvd.nist.gov/vuln/detail/CVE-2023-42138https://cwe.mitre.org/data/definitions/125.htmlcpe:/a:keyence:kv_replay_viewercpe:/a:keyence:kv_studio2024-05-16T17:09+09:002023-10-11T15:23+09:002024-05-16T17:09+09:00e-Gov Client Application fails to restrict custom URL schemes properly
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000098.html
e-Gov Client Application is installed, a Custom URL Scheme is configured on the system to enable invoking the product through a web browser.
This custom URL contains the information about the website which the product should access, and a crafted URL may direct the application to access an unexpected website (CWE-939).
Toyama Taku of NEC Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
JVNDB-2023-000098https://jvn.jp/en/jp/JVN15808274/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-44689https://nvd.nist.gov/vuln/detail/CVE-2023-44689https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:e-gov:e-govcpe:/a:e-gov:e-gov2024-05-17T17:55+09:002023-10-06T14:57+09:002024-05-17T17:55+09:00Information Exposure Vulnerability in Hitachi Ops Center Administrator
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003769.html
A vulnerability (CVE-2023-3335) exists in Hitachi Ops Center Administrator.JVNDB-2023-003769https://www.cve.org/CVERecord?id=CVE-2023-3335https://nvd.nist.gov/vuln/detail/CVE-2023-3335https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:hitachi_ops_center_administrator2024-05-22T15:20+09:002023-10-04T15:23+09:002024-05-22T15:20+09:00DoS Vulnerability in Hitachi Ops Center Common Services
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003770.html
A DoS vulnerability (CVE-2023-3967) exists in Hitachi Ops Center Common Services.JVNDB-2023-003770https://www.cve.org/CVERecord?id=CVE-2023-3967https://nvd.nist.gov/vuln/detail/CVE-2023-3967https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:ops_center_common_services2024-05-22T15:31+09:002023-10-04T15:23+09:002024-05-22T15:31+09:00File and Directory Permissions Vulnerability in JP1/Performance Management
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003771.html
A File and Directory Permissions Vulnerability (CVE-2023-3440) exists in JP1/Performance Management.JVNDB-2023-003771https://www.cve.org/CVERecord?id=CVE-2023-3440https://nvd.nist.gov/vuln/detail/CVE-2023-3440https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:jp1%2fperformance_managementcpe:/a:hitachi:tuning_manager2023-10-04T15:23+09:002023-10-04T15:23+09:002023-10-04T15:23+09:00Citadel WebCit vulnerable to cross-site scripting on Instant Messaging facility
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000097.html
Citadel WebCit provided by Citadel contains a cross-site scripting vulnerability (CWE-79).
Tomoro Taniguchi of FiveDrive, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000097http://jvn.jp/en/jp/JVN08237727/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-44272https://nvd.nist.gov/vuln/detail/CVE-2023-44272https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:citadel:citadel2024-05-21T17:08+09:002023-10-04T14:07+09:002024-05-21T17:08+09:00Multiple vulnerabilities in multiple FURUNO SYSTEMS wireless LAN access point devices in ST(Standalone) mode
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003767.html
Wireless LAN access point devices provided by FURUNO SYSTEMS Co.,Ltd., running in ST(Standalone) mode, contain multiple vulnerabilities listed below.
* OS Command Injection (CWE-78) - CVE-2023-39222
* Cross-site Scripting (CWE-79) - CVE-2023-39429
* Cross-Site Request Forgery (CWE-352) - CVE-2023-41086
* Authentication Bypass (CWE-288) - CVE-2023-42771
* Path traversal (CWE-22) - CVE-2023-43627
Katsuhiko Sato(a.k.a. goroh_kun) of 00One, Inc. reported OS Command Injection vulnerability (CVE-2023-39222) to JPCERT/CC.
JPCERT/CC coordinated with the developer.
As a result of the developer's investigation into this report, other vulnerabilities were newly discovered and addressed.
The developer reported these vulnerabilities to notify users of the solution through JVN. JPCERT/CC coordinated with the developer for the publication.JVNDB-2023-003767https://jvn.jp/en/vu/JVNVU94497038/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-39222https://www.cve.org/CVERecord?id=CVE-2023-39429https://www.cve.org/CVERecord?id=CVE-2023-41086https://www.cve.org/CVERecord?id=CVE-2023-42771https://www.cve.org/CVERecord?id=CVE-2023-43627https://nvd.nist.gov/vuln/detail/CVE-2023-39222https://nvd.nist.gov/vuln/detail/CVE-2023-39429https://nvd.nist.gov/vuln/detail/CVE-2023-41086https://nvd.nist.gov/vuln/detail/CVE-2023-42771https://nvd.nist.gov/vuln/detail/CVE-2023-43627https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/288.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:furunosystems:acera_1010_firmwarecpe:/o:furunosystems:acera_1020_firmwarecpe:/o:furunosystems:acera_1110_firmwarecpe:/o:furunosystems:acera_1150i_firmwarecpe:/o:furunosystems:acera_1150w_firmwarecpe:/o:furunosystems:acera_1210_firmwarecpe:/o:furunosystems:acera_1310_firmwarecpe:/o:furunosystems:acera_1320_firmwarecpe:/o:furunosystems:acera_800st_firmwarecpe:/o:furunosystems:acera_810_firmwarecpe:/o:furunosystems:acera_850f_firmwarecpe:/o:furunosystems:acera_850m_firmwarecpe:/o:furunosystems:acera_900_firmwarecpe:/o:furunosystems:acera_950_firmware2024-05-22T18:01+09:002023-10-03T14:26+09:002024-05-22T18:01+09:00Improper restriction of XML external entity references (XXE) in FD Application
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000096.html
FD Application provided by Ministry of Health, Labour and Welfare improperly restricts XML external entity references (XXE) (CWE-611).
Toyama Taku and Sakaki Ryutaro of NEC Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000096http://jvn.jp/en/jp/JVN39596244/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-42132https://nvd.nist.gov/vuln/detail/CVE-2023-42132https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:mhlw:fd_application2024-05-22T15:37+09:002023-10-02T12:36+09:002024-05-22T15:37+09:00Multiple vulnerabilities in Panasonic KW Watcher
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003764.html
KW Watcher provided by Panasonic contains multiple vulnerabilities listed below.
* Improper restriction of operations within the bounds of a memory buffer (CWE-119) - CVE-2023-3471
* Use after free (CWE-416) - CVE-2023-3472
Michael Heinzl reported these vulnerabilities to Panasonic and coordinated.
After the coordination was completed, Panasonic reported the case to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2023-003764https://jvn.jp/en/vu/JVNVU95549489/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-3471https://www.cve.org/CVERecord?id=CVE-2023-3472https://nvd.nist.gov/vuln/detail/CVE-2023-3471https://nvd.nist.gov/vuln/detail/CVE-2023-3472https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/416.htmlcpe:/a:panasonic:kw_watcher2023-09-27T14:44+09:002023-09-27T14:44+09:002023-09-27T14:44+09:00Shihonkanri Plus vulnerable to relative path traversal
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000095.html
Shihonkanri Plus provided by EKAKIN contains a relative path traversal vulnerability (CWE-23).
Shimizu Yutaro of Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000095http://jvn.jp/en/jp/JVN17434995/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-43825https://nvd.nist.gov/vuln/detail/CVE-2023-43825https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ekakin:shihonkanri_plus2024-05-21T17:16+09:002023-09-27T13:49+09:002024-05-21T17:16+09:00Trend Micro Mobile Security vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003757.html
Trend Micro Incorporated has released a security update for Trend Micro Mobile Security.
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.JVNDB-2023-003757https://jvn.jp/en/vu/JVNVU95732401/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-41176https://www.cve.org/CVERecord?id=CVE-2023-41177https://www.cve.org/CVERecord?id=CVE-2023-41178https://nvd.nist.gov/vuln/detail/CVE-2023-41176https://nvd.nist.gov/vuln/detail/CVE-2023-41177https://nvd.nist.gov/vuln/detail/CVE-2023-41178https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:trendmicro:mobile_security2024-03-13T18:07+09:002023-09-26T11:30+09:002024-03-13T18:07+09:00Multiple vulnerabilities in WordPress plugin "Welcart e-Commerce"
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000094.html
WordPress plugin "Welcart e-Commerce" provided by Collne Inc. contains multiple vulnerabilities listed below.
* Unrestricted Upload of File with Dangerous Type (CWE-434) - CVE-2023-40219
* Path Traversal (CWE-22) - CVE-2023-40532
* Cross-site Scripting in registration process of Item List page (CWE-79) - CVE-2023-41233
* Cross-site Scripting in Credit Card Payment Setup page (CWE-79) - CVE-2023-41962
* Cross-site Scripting in Item List page (CWE-79) - CVE-2023-43484
* SQL Injection in Item List page (CWE-89) - CVE-2023-43493
* SQL Injection in Order Data Edit page (CWE-89) - CVE-2023-43610
* Cross-site Scripting in Order Data Edit page (CWE-79) - CVE-2023-43614
CVE-2023-40219
Akihiro Hashimoto reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-40532, CVE-2023-41233, CVE-2023-41962, CVE-2023-43484, CVE-2023-43493, CVE-2023-43610, CVE-2023-43614
Shogo Kumamaru of LAC CyberLink Co., Ltd. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000094https://jvn.jp/en/jp/JVN97197972/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-40219https://www.cve.org/CVERecord?id=CVE-2023-40532https://www.cve.org/CVERecord?id=CVE-2023-41233https://www.cve.org/CVERecord?id=CVE-2023-41962https://www.cve.org/CVERecord?id=CVE-2023-43484https://www.cve.org/CVERecord?id=CVE-2023-43493https://www.cve.org/CVERecord?id=CVE-2023-43610https://www.cve.org/CVERecord?id=CVE-2023-43614https://nvd.nist.gov/vuln/detail/CVE-2023-40219https://nvd.nist.gov/vuln/detail/CVE-2023-40532https://nvd.nist.gov/vuln/detail/CVE-2023-41233https://nvd.nist.gov/vuln/detail/CVE-2023-41962https://nvd.nist.gov/vuln/detail/CVE-2023-43484https://nvd.nist.gov/vuln/detail/CVE-2023-43493https://nvd.nist.gov/vuln/detail/CVE-2023-43610https://nvd.nist.gov/vuln/detail/CVE-2023-43614https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:collne:welcart_e-commerce2024-07-11T16:49+09:002023-09-22T13:51+09:002024-07-11T16:49+09:00Trend Micro Endpoint security products for enterprises vulnerable to arbitrary code execution
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003721.html
Trend Micro Endpoint security products for enterprises provided by Trend Micro Incorporated contain an arbitrary code execution vulnerability (CWE-94, CVE-2023-41179) in 3rd Party AV Uninstaller Module.
Trend Micro Incorporated states that an attack exploiting this vulnerability has been observed.
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.JVNDB-2023-003721http://jvn.jp/en/vu/JVNVU90967486/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-41179https://nvd.nist.gov/vuln/detail/CVE-2023-41179https://www.jpcert.or.jp/english/at/2023/at230021.htmlhttps://www.cisa.gov/known-exploited-vulnerabilities-cataloghttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:trendmicro:apex_onecpe:/a:trendmicro:business_securitycpe:/a:trendmicro:business_security_services2024-05-09T18:22+09:002023-09-20T13:58+09:002024-05-09T18:22+09:00Multiple vulnerabilities in JTEKT ELECTRONICS Kostac PLC Programming Software
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003592.html
Kostac PLC Programming Software provided by JTEKT ELECTRONICS CORPORATION contains multiple vulnerabilities listed below.
* Double free (CWE-415) - CVE-2023-41374
* Use-after-free (CWE-416) - CVE-2023-41375
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-003592https://jvn.jp/en/vu/JVNVU95282683/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-41374https://www.cve.org/CVERecord?id=CVE-2023-41375https://nvd.nist.gov/vuln/detail/CVE-2023-41374https://nvd.nist.gov/vuln/detail/CVE-2023-41375https://cwe.mitre.org/data/definitions/415.htmlhttps://cwe.mitre.org/data/definitions/416.htmlcpe:/a:jtekt:kostac_plc2023-09-13T15:02+09:002023-09-13T15:02+09:002023-09-13T15:02+09:00Pyramid vulnerable to directory traversal
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000093.html
Pyramid provided by Pylons Project contains a directory traversal vulnerability.
Masashi Yamane of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000093http://jvn.jp/en/jp/JVN41113329/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-40587https://nvd.nist.gov/vuln/detail/CVE-2023-40587https://github.com/advisories/GHSA-65fx-pmw6-rcfmhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:pylonsproject:pyramid2024-05-16T16:52+09:002023-09-11T13:53+09:002024-05-16T16:52+09:00Vulnerability in JP1/VERITAS
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003335.html
A vulnerability (VTS23-011) exists in JP1/VERITAS.JVNDB-2023-003335https://www.cve.org/CVERecord?id=CVE-2023-40256https://nvd.nist.gov/vuln/detail/CVE-2023-40256cpe:/a:hitachi:jp1_veritas_netbackupcpe:/a:veritas:netbackup2023-09-06T15:35+09:002023-09-06T15:35+09:002023-09-06T15:35+09:00"direct" Desktop App for macOS fails to restrict access permissions
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000092.html
"direct" Desktop App for macOS provided by L is B Corp. fails to restrict access permissions (CWE-284).
The access control mechanism provided by macOS "TCC (Transparency Consent and Control)" may be bypassed.
Koh M. Nakagawa of FFRI Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000092https://jvn.jp/en/jp/JVN42691027/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-41775https://nvd.nist.gov/vuln/detail/CVE-2023-41775https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:l-is-b:direct2023-09-06T14:33+09:002023-09-06T14:33+09:002023-09-06T14:33+09:00Multiple vulnerabilities in F-RevoCRM
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000091.html
F-RevoCRM provided by ThinkingReed inc. contains multiple vulnerabilities listed below.
* OS Command Injection (CWE-78) - CVE-2023-41149
* Cross-site scripting vulnerability (CWE-79) - CVE-2023-41150
Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000091https://jvn.jp/en/jp/JVN78113802/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-41149https://www.cve.org/CVERecord?id=CVE-2023-41150https://nvd.nist.gov/vuln/detail/CVE-2023-41149https://nvd.nist.gov/vuln/detail/CVE-2023-41150https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:f-revocrm:f-revocrm2024-05-14T18:06+09:002023-09-05T15:51+09:002024-05-14T18:06+09:00Multiple vulnerabilities in CGIs of PMailServer and PMailServer2
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000090.html
CGIs included with PMailServer and PMailServer2 provided by A.K.I Software contain multiple vulnerabilities listed below.
* Stored cross-site scripting vulnerability (CWE-79) - CVE-2023-39223
* Insufficient verification vulnerability in Broadcast Mail CGI (pmc.exe) (CWE-434) - CVE-2023-39933
* Directory traversal vulnerability in Mailing List Search CGI (pmmls.exe) (CWE-22) - CVE-2023-40160
* Directory traversal vulnerability in Internal Simple Webserver (CWE-22) - CVE-2023-40747
CVE-2023-39223, CVE-2023-39933, CVE-2023-40160
Shuji Shimizu of VeriServe Corporation reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-40747
Shunta Nakanishi of VeriServe Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000090https://jvn.jp/en/jp/JVN92720882/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-39223https://www.cve.org/CVERecord?id=CVE-2023-39933https://www.cve.org/CVERecord?id=CVE-2023-40160https://www.cve.org/CVERecord?id=CVE-2023-40747https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:aki_software_pmailservercpe:/a:misc:aki_software_pmailserver22023-09-05T14:55+09:002023-09-05T14:55+09:002023-09-05T14:55+09:00Multiple vulnerabilities in SHIRASAGI
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000088.html
SHIRASAGI provided by SHIRASAGI Project contains multiple vulnerabilities listed below.
* Reflected cross-site scripting (CWE-79) - CVE-2023-36492
* Stored cross-site scripting (CWE-79) - CVE-2023-38569
* Path traversal (CWE-22) - CVE-2023-39448
CVE-2023-36492, CVE-2023-38569
Taiga Shirakura of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-39448
Masashi Yamane of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000088https://jvn.jp/en/jp/JVN82758000/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-36492https://www.cve.org/CVERecord?id=CVE-2023-38569https://www.cve.org/CVERecord?id=CVE-2023-39448https://nvd.nist.gov/vuln/detail/CVE-2023-36492https://nvd.nist.gov/vuln/detail/CVE-2023-38569https://nvd.nist.gov/vuln/detail/CVE-2023-39448https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ss-proj:shirasagi2024-05-14T17:58+09:002023-09-04T13:41+09:002024-05-14T17:58+09:00Multiple vulnerabilities in i-PRO VI Web Client
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000089.html
VI Web Client provided by i-PRO Co., Ltd. is Video Insight's video management software. VI Web Client contains multiple vulnerabilities listed below.<ul><li>Open Redirect (CWE-601) - CVE-2023-38574</li><li>Reflected Cross-site Scripting (CWE-79) - CVE-2023-39938</li><li>View Stored Cross-site Scripting in View setting page (CWE-79) - CVE-2023-40535</li><li>Stored Cross-site Scripting in Map setting page (CWE-79) - CVE-2023-40705</li></ul>Michael Heinzl reported these vulnerabilities to i-PRO Co., Ltd. and coordinated with them. After the coordination was completed, the developer reported this case to IPA to notify users of the solution through JVN. JPCERT/CC coordinated with the developer for the publication.JVNDB-2023-000089https://jvn.jp/en/jp/JVN60140221/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-38574https://www.cve.org/CVERecord?id=CVE-2023-39938https://www.cve.org/CVERecord?id=CVE-2023-40535https://www.cve.org/CVERecord?id=CVE-2023-40705https://nvd.nist.gov/vuln/detail/CVE-2023-38574https://nvd.nist.gov/vuln/detail/CVE-2023-39938https://nvd.nist.gov/vuln/detail/CVE-2023-40535https://nvd.nist.gov/vuln/detail/CVE-2023-40705https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:i-pro:i-pro_vi_web_client2024-05-14T18:05+09:002023-08-31T14:13+09:002024-05-14T18:05+09:00Phoenix Technologies Windows kernel driver vulnerable to insufficient access control on its IOCTL
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003028.html
Some of the Windows kernel drivers provided by Phoenix Technologies Inc. is vulnerable to insufficient access control on its IOCTL (CWE-782, CVE-2023-35841).
Takahiro Haruyama of VMware reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-003028https://jvn.jp/en/vu/JVNVU93886750/index.htmlhttps://jvn.jp/en/ta/JVNTA90371415/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-35841https://cwe.mitre.org/data/definitions/782.htmlcpe:/a:phoenix:tdklib64.sys2024-04-24T11:43+09:002023-08-30T10:05+09:002024-04-24T11:43+09:00Vulnerability in HiRDB
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003023.html
A Vulnerability (CVE-2023-1995) exists in HiRDB.JVNDB-2023-003023https://www.cve.org/CVERecord?id=CVE-2023-1995https://nvd.nist.gov/vuln/detail/CVE-2023-1995https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:hirdb_servercpe:/a:hitachi:hirdb_server_with_additional_functioncpe:/a:hitachi:hirdb_structured_data_access_facility2023-09-06T15:45+09:002023-08-29T15:55+09:002023-09-06T15:45+09:00SYNCK GRAPHICA Mailform Pro CGI vulnerable to Regular expression Denial-of-Service (ReDoS)
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000087.html
Mailform Pro CGI provided by SYNCK GRAPHICA contains a Regular expression Denial-of-Service (ReDoS) vulnerability (CWE-1333, CVE-2023-40599).
This vulnerability is a similar issue as CVE-2023-32610 published on JVN on June 20, 2023, and was newly discovered in several Add-ons listed above.
Tran Quang Vu of FPT Software reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000087http://jvn.jp/en/jp/JVN86484824/index.htmlhttps://jvn.jp/en/jp/JVN70502982/https://www.cve.org/CVERecord?id=CVE-2023-40599https://nvd.nist.gov/vuln/detail/CVE-2023-40599https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:synck_graphica:mailform_pro_cgi2024-05-15T17:12+09:002023-08-24T14:12+09:002024-05-15T17:12+09:00"Skylark" App fails to restrict custom URL schemes properly
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000085.html
"Skylark" App provided by SKYLARK HOLDINGS CO., LTD. provides the function to access a requested URL using Custom URL Scheme. The App does not restrict access to the function properly (CWE-939) which may be exploited to direct the App to access any sites.
Shunsuke Kaneko of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000085http://jvn.jp/en/jp/JVN03447226/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-40530https://nvd.nist.gov/vuln/detail/CVE-2023-40530https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:skylark:skylark2024-05-15T17:19+09:002023-08-24T13:34+09:002024-05-15T17:19+09:00Rakuten WiFi Pocket vulnerable to improper authentication
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000086.html
Rakuten WiFi Pocket provided by Rakuten Mobile, Inc. is a mobile router.
Management Screen of Rakuten WiFi Pocket contains an improper authentication vulnerability (CWE-287).
Sato Nobuhiro of Suzuki Motor Corporation and You Okuma of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000086http://jvn.jp/en/jp/JVN55217369/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-40282https://nvd.nist.gov/vuln/detail/CVE-2023-40282https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:rakuten:wifi_pocket_firmware2024-03-27T13:43+09:002023-08-23T12:42+09:002024-03-27T13:43+09:00Multiple vulnerabilities in Panasonic Control FPWIN Pro7
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002906.html
Control FPWIN Pro7 provided by Panasonic contains multiple vulnerabilities listed below.
* Stack-based Buffer Overflow (CWE-121) - CVE-2023-28728
* Access of Resource Using Incompatible Type (CWE-843) - CVE-2023-28729
* Improper Restriction of Operations within the Bounds of a Memory Buffer
Michael Heinzl first contacted JPCERT/CC, and JPCERT/CC advised him to contact Panasonic directly. Afterwards, he reported these vulnerabilities to Panasonic and coordinated with them. Panasonic and JPCERT/CC published respective advisories in order to notify users of these vulnerabilities.JVNDB-2023-002906http://jvn.jp/en/vu/JVNVU96622721/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-28728https://www.cve.org/CVERecord?id=CVE-2023-28729https://www.cve.org/CVERecord?id=CVE-2023-28730https://nvd.nist.gov/vuln/detail/CVE-2023-28730https://nvd.nist.gov/vuln/detail/CVE-2023-28728https://nvd.nist.gov/vuln/detail/CVE-2023-28729https://www.cisa.gov/news-events/ics-advisories/icsa-23-192-03https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/121.htmlhttps://cwe.mitre.org/data/definitions/843.htmlcpe:/a:panasonic:fpwin_pro2024-04-18T17:31+09:002023-08-22T18:02+09:002024-04-18T17:31+09:00Multiple vulnerabilities in CBC digital video recorders
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002905.html
Digital video recorders provided by CBC Co.,Ltd. contain multiple vulnerabilities listed below.
* Improper authentication (CWE-287) - CVE-2023-38585
* OS command injection (CWE-78) - CVE-2023-40144
* Hidden functionality (CWE-912) - CVE-2023-40158
Yoshiki Mori, Ushimaru Hayato, Hiromu Kubiura and Masaki Kubo of National Institute of Information and Communications Technology Cybersecurity Research Institute reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
JVNDB-2023-002905http://jvn.jp/en/vu/JVNVU92545432/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-38585https://www.cve.org/CVERecord?id=CVE-2023-40144https://www.cve.org/CVERecord?id=CVE-2023-40158https://nvd.nist.gov/vuln/detail/CVE-2023-38585https://nvd.nist.gov/vuln/detail/CVE-2023-40144https://nvd.nist.gov/vuln/detail/CVE-2023-40158https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/912.htmlcpe:/o:cbc:dr-16f42a_firmwarecpe:/o:cbc:dr-16f45at_firmwarecpe:/o:cbc:dr-16h_firmwarecpe:/o:cbc:dr-16m52-av_firmwarecpe:/o:cbc:dr-16m52_firmwarecpe:/o:cbc:dr-4fx1_firmwarecpe:/o:cbc:dr-4h_firmwarecpe:/o:cbc:dr-4m51-av_firmwarecpe:/o:cbc:dr-8f42a_firmwarecpe:/o:cbc:dr-8f45at_firmwarecpe:/o:cbc:dr-8h_firmwarecpe:/o:cbc:dr-8m52-av_firmwarecpe:/o:cbc:drh8-4m41-a_firmwarecpe:/o:cbc:nr-16f82-16p_firmwarecpe:/o:cbc:nr-16f85-8pra_firmwarecpe:/o:cbc:nr-16m_firmwarecpe:/o:cbc:nr-4f_firmwarecpe:/o:cbc:nr-8f_firmwarecpe:/o:cbc:nr16h_firmwarecpe:/o:cbc:nr4h_firmwarecpe:/o:cbc:nr8-4m71_firmwarecpe:/o:cbc:nr8-8m72_firmwarecpe:/o:cbc:nr8h_firmware2024-04-10T17:39+09:002023-08-22T17:35+09:002024-04-10T17:39+09:00WordPress Plugin "Advanced Custom Fields" vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000084.html
WordPress Plugin "Advanced Custom Fields" provided by WP Engine contains a cross-site scripting vulnerability (CWE-79).
Ryotaro Imamura of SB Technology Corp. and Satoo Nakano reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000084http://jvn.jp/en/jp/JVN98946408/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-40068https://nvd.nist.gov/vuln/detail/CVE-2023-40068https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:advancedcustomfields:advanced_custom_fields2024-03-25T17:55+09:002023-08-21T14:05+09:002024-03-25T17:55+09:00Multiple vulnerabilities in LuxCal Web Calendar
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000083.html
LuxCal Web Calendar provided by LuxSoft contains multiple vulnerabilities listed below.
* Cross-site scripting (CWE-79) - CVE-2023-39543
* SQL injection (CWE-89) - CVE-2023-39939
Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000083http://jvn.jp/en/jp/JVN04876736/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-39543https://www.cve.org/CVERecord?id=CVE-2023-39939https://nvd.nist.gov/vuln/detail/CVE-2023-39543https://nvd.nist.gov/vuln/detail/CVE-2023-39939https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:luxsoft:luxcal_web_calendar2024-03-26T17:09+09:002023-08-21T13:29+09:002024-03-26T17:09+09:00Multiple vulnerabilities in Proself
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000078.html
Proself provided by North Grid Corporation is an online storage server software. Proself contains multiple vulnerabilities listed below.
<ul><li>Improper authentication (CWE-287) - CVE-2023-39415
<li>OS command injection (CWE-78) - CVE-2023-39416</li></ul>
The developer states that attacks exploiting these vulnerabilities have been observed.
North Grid Corporation reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JPCERT/CC and North Grid Corporation coordinated under the Information Security Early Warning Partnership.JVNDB-2023-000078http://jvn.jp/en/jp/JVN19661362/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-39415https://www.cve.org/CVERecord?id=CVE-2023-39416https://nvd.nist.gov/vuln/detail/CVE-2023-39415https://nvd.nist.gov/vuln/detail/CVE-2023-39416https://www.ipa.go.jp/security/security-alert/2023/alert20230803.htmlhttps://www.jpcert.or.jp/at/2023/at230014.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:northgrid:proself2024-03-28T17:43+09:002023-08-18T13:47+09:002024-03-28T17:43+09:00EC-CUBE 2 series vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000082.html
EC-CUBE 2 series provided by EC-CUBE CO.,LTD. contains a cross-site scripting vulnerability (CWE-79) in "mail/template" and "products/product" of Management page.
Shimamine Taihei of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. reported it to JPCERT/CC to notify users of its solution through JVN.JVNDB-2023-000082http://jvn.jp/en/jp/JVN46993816/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-40281https://nvd.nist.gov/vuln/detail/CVE-2023-40281https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ec-cube:ec-cube2024-03-25T18:07+09:002023-08-17T15:12+09:002024-03-25T18:07+09:00Multiple vulnerabilities in ELECOM and LOGITEC network devices
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002797.html
Multiple network devices provided by ELECOM CO.,LTD. and LOGITEC CORPORATION contain multiple vulnerabilities listed below.
* Hidden Functionality (CWE-912) - CVE-2023-32626, CVE-2023-35991, CVE-2023-39445
* Telnet service access restriction failure (CWE-284) - CVE-2023-38132
* Hidden Functionality (CWE-912) - CVE-2023-38576
* Buffer overflow (CWE-120) - CVE-2023-39454
* OS Command Injection (CWE-78) - CVE-2023-39455, CVE-2023-40072
* OS Command Injection (CWE-78) - CVE-2023-39944, CVE-2023-40069
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.
JVNDB-2023-002797http://jvn.jp/en/vu/JVNVU91630351/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-32626https://www.cve.org/CVERecord?id=CVE-2023-35991https://www.cve.org/CVERecord?id=CVE-2023-38132https://www.cve.org/CVERecord?id=CVE-2023-38576https://www.cve.org/CVERecord?id=CVE-2023-39445https://www.cve.org/CVERecord?id=CVE-2023-39454https://www.cve.org/CVERecord?id=CVE-2023-39455https://www.cve.org/CVERecord?id=CVE-2023-39944https://www.cve.org/CVERecord?id=CVE-2023-40069https://www.cve.org/CVERecord?id=CVE-2023-40072https://nvd.nist.gov/vuln/detail/CVE-2023-32626https://nvd.nist.gov/vuln/detail/CVE-2023-35991https://nvd.nist.gov/vuln/detail/CVE-2023-38132https://nvd.nist.gov/vuln/detail/CVE-2023-38576https://nvd.nist.gov/vuln/detail/CVE-2023-39445https://nvd.nist.gov/vuln/detail/CVE-2023-39454https://nvd.nist.gov/vuln/detail/CVE-2023-39455https://nvd.nist.gov/vuln/detail/CVE-2023-39944https://nvd.nist.gov/vuln/detail/CVE-2023-40069https://nvd.nist.gov/vuln/detail/CVE-2023-40072https://cwe.mitre.org/data/definitions/120.htmlhttps://cwe.mitre.org/data/definitions/284.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/912.htmlcpe:/a:elecom:wab-i1750-pscpe:/a:elecom:wab-s1167-pscpe:/o:elecom:wab-m1775-ps_firmwarecpe:/o:elecom:wab-m2133_firmwarecpe:/o:elecom:wab-s1167_firmwarecpe:/o:elecom:wab-s1775_firmwarecpe:/o:elecom:wab-s300_firmwarecpe:/o:elecom:wab-s600-ps_firmwarecpe:/o:elecom:wrc-1167ghbk2_firmwarecpe:/o:elecom:wrc-1467ghbk-a_firmwarecpe:/o:elecom:wrc-1467ghbk-s_firmwarecpe:/o:elecom:wrc-1750ghbk-e_firmwarecpe:/o:elecom:wrc-1750ghbk2-i_firmwarecpe:/o:elecom:wrc-1750ghbk_firmwarecpe:/o:elecom:wrc-1900ghbk-a_firmwarecpe:/o:elecom:wrc-1900ghbk-s_firmwarecpe:/o:elecom:wrc-600ghbk-a_firmwarecpe:/o:elecom:wrc-733febk2-a_firmwarecpe:/o:elecom:wrc-f1167acf2_firmwarecpe:/o:elecom:wrc-f1167acf_firmwarecpe:/o:elecom:wrc-x1800gs-b_firmwarecpe:/o:elecom:wrc-x1800gsa-b_firmwarecpe:/o:elecom:wrc-x1800gsh-b_firmwarecpe:/o:logitec:lan-w300n%2fdr_firmwarecpe:/o:logitec:lan-w300n%2fpr5_firmwarecpe:/o:logitec:lan-w300n%2fp_firmwarecpe:/o:logitec:lan-w300n%2frs_firmwarecpe:/o:logitec:lan-w451ngr_firmwarecpe:/o:logitec:lan-wh300an%2fdgp_firmwarecpe:/o:logitec:lan-wh300andgpe_firmwarecpe:/o:logitec:lan-wh300n%2fdgp_firmwarecpe:/o:logitec:lan-wh300n%2fdr_firmwarecpe:/o:logitec:lan-wh300n%2fre_firmwarecpe:/o:logitec:lan-wh450n%2fgp_firmware2024-08-29T09:39+09:002023-08-15T11:54+09:002024-08-29T09:39+09:00Multiple server-side request forgery vulnerabilities in Trend Micro Apex Central (July 2023)
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002796.html
Trend Micro Apex Central is vulnerable to multiple server-side request forgeries.
Trend Micro Incorporated has released Patch 5 (build 6481) for Trend Micro Apex Central.
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.JVNDB-2023-002796http://jvn.jp/en/vu/JVNVU98367862/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-38624https://www.cve.org/CVERecord?id=CVE-2023-38625https://www.cve.org/CVERecord?id=CVE-2023-38626https://www.cve.org/CVERecord?id=CVE-2023-38627https://nvd.nist.gov/vuln/detail/CVE-2023-38624https://nvd.nist.gov/vuln/detail/CVE-2023-38625https://nvd.nist.gov/vuln/detail/CVE-2023-38626https://nvd.nist.gov/vuln/detail/CVE-2023-38627https://cwe.mitre.org/data/definitions/918.htmlcpe:/a:trendmicro:apex_central2024-03-13T17:58+09:002023-08-10T16:04+09:002024-03-13T17:58+09:00"Rikunabi NEXT" App for Android fails to restrict custom URL schemes properly
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000081.html
"Rikunabi NEXT" App for Android provided by Recruit Co., Ltd. provides the function to access a requested URL using Custom URL Scheme. The App does not restrict access to the function properly (CWE-939) which may be exploited to direct the App to access any sites.
Nao Komatsu of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000081http://jvn.jp/en/jp/JVN84820712/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-39507https://nvd.nist.gov/vuln/detail/CVE-2023-39507https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:recruit:rikunabi_next2024-03-28T18:01+09:002023-08-09T12:45+09:002024-03-28T18:01+09:00"FFRI yarai" and "FFRI yarai Home and Business Edition" handle exceptional conditions improperly
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000080.html
"FFRI yarai" and "FFRI yarai Home and Business Edition" provided by FFRI Security, Inc. handle exceptional conditions improperly (CWE-703).
When the product's Windows Defender management feature is enabled, and Microsoft Defender detects some files matching specific conditions as a threat, the affected product may fail to handle this situation properly and stop working.
FFRI Security, Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and FFRI Security, Inc. coordinated under the Information Security Early Warning Partnership.JVNDB-2023-000080http://jvn.jp/en/jp/JVN42527152/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-39341https://nvd.nist.gov/vuln/detail/CVE-2023-39341https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ffri:ffri_yaraicpe:/a:nec:actsecure_x_managed_security_servicecpe:/a:skygroup:edr_plus_packcpe:/a:skygroup:edr_plus_pack_cloudcpe:/a:soliton:infotrace_mark_ii_malware_protectioncpe:/a:soliton:zeronacpe:/a:soliton:zerona_pluscpe:/a:sourcenext:dual_safe2024-03-28T17:54+09:002023-08-07T17:39+09:002024-03-28T17:54+09:00Multiple vulnerabilities in Special Interest Group Network for Analysis and Liaison's API
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000079.html
Special Interest Group Network for Analysis and Liaison's "Inter-SOC Cooperation API" provided by Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) contains multiple vulnerabilities listed below.
* Improper Authorization in Information Provision function (CWE-285) - CVE-2023-38751
* Improper Authorization in Information Provision and Group Message functions (CWE-285) - CVE-2023-38752
yusuke negishi of JPCERT/CC Platform Service Group reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000079http://jvn.jp/en/jp/JVN83334799/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-38751https://www.cve.org/CVERecord?id=CVE-2023-38752https://nvd.nist.gov/vuln/detail/CVE-2023-38751https://nvd.nist.gov/vuln/detail/CVE-2023-38752https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:jpcert:special_interest_group_network_for_analysis_and_liaison2024-03-28T18:08+09:002023-08-07T15:15+09:002024-03-28T18:08+09:00Fujitsu Software Infrastructure Manager (ISM) stores sensitive information in cleartext
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000077.html
Fujitsu Software Infrastructure Manager (ISM) V2.8.0.060, provided by Fujitsu Limited, stores the password for the proxy server in cleartext form to the product's maintenance data (ismsnap) (CWE-312) under the following conditions.
<ul><li>Using a proxy server that requires authentication in the connection from ISM to internet</li><li>The user ID and/or the password for the proxy server contain "\" (backslash) character</li><li>The product's firmware download function is enabled (*)</li>
* This is a function for the Europe Region and is disabled by default</ul>
Fujitsu Limited reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Fujitsu Limited coordinated under the Information Security Early Warning Partnership.JVNDB-2023-000077http://jvn.jp/en/jp/JVN38847224/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-39379https://nvd.nist.gov/vuln/detail/CVE-2023-39379https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:fujitsu:software_infrastructure_manager2024-04-03T17:19+09:002023-08-04T17:31+09:002024-04-03T17:19+09:00OMRON CJ series and CS/CJ Series EtherNet/IT unit vulnerable to Denial-of-Service (DoS)
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002787.html
Denial-of-service (DoS) vulnerability due to improper validation of specified type of input (CWE-1287) issue exists in the built-in EtherNet/IP port of the CJ Series CJ2 CPU unit and the communication function of the CS/CJ Series EtherNet/IP unit provided by OMRON Corporation.
OMRON Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.JVNDB-2023-002787http://jvn.jp/en/vu/JVNVU92193064/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-38744https://nvd.nist.gov/vuln/detail/CVE-2023-38744https://cwe.mitre.org/data/definitions/1287.htmlcpe:/a:omron:cj2h_cpu6cpe:/a:omron:cj2m_cpu3cpe:/o:omron:cj1w-eip21_firmwarecpe:/o:omron:cs1w-eip21_firmware2023-08-03T13:45+09:002023-08-03T13:45+09:002023-08-03T13:45+09:00Multiple vulnerabilities in OMRON CX-Programmer
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002786.html
CX-Programmer provided by OMRON Corporation contains multiple vulnerabilities listed below.
* Out-of-bounds read (CWE-125) - CVE-2023-38746
* Heap-based buffer overflow (CWE-122) - CVE-2023-38747
* Use after free (CWE-416) - CVE-2023-38748
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-002786http://jvn.jp/en/vu/JVNVU93286117/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-38746https://www.cve.org/CVERecord?id=CVE-2023-38747https://www.cve.org/CVERecord?id=CVE-2023-38748https://nvd.nist.gov/vuln/detail/CVE-2023-38746https://nvd.nist.gov/vuln/detail/CVE-2023-38747https://nvd.nist.gov/vuln/detail/CVE-2023-38748https://cwe.mitre.org/data/definitions/122.htmlhttps://cwe.mitre.org/data/definitions/125.htmlhttps://cwe.mitre.org/data/definitions/416.htmlcpe:/a:omron:cx-programmer2024-04-05T17:39+09:002023-08-03T13:42+09:002024-04-05T17:39+09:00SEIKO EPSON printer Web Config vulnerable to denial-of-service (DoS)
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000076.html
SEIKO EPSON printer Web Config contains a denial-of-service (DoS) vulnerability due to improper input validation (CWE-20).
SEIKO EPSON CORPORATION reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and SEIKO EPSON CORPORATION coordinated under the Information Security Early Warning Partnership.JVNDB-2023-000076http://jvn.jp/en/jp/JVN61337171/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-38556https://nvd.nist.gov/vuln/detail/CVE-2023-38556https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:epson:web_config2024-04-19T17:27+09:002023-08-02T14:55+09:002024-04-19T17:27+09:00Multiple vulnerabilities in Command Center RX (CCRX) of Kyocera Document Solutions MFPs and printers
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002725.html
Command Center RX (CCRX), a web interface for MFPs and printers provided by KYOCERA Document Solutions Inc., contains multiple vulnerabilities listed below.
* Path traversal (CWE-22) - CVE-2023-34259
* Path traversal (CWE-22) - CVE-2023-34260
* Observable response discrepancy (CWE-204) - CVE-2023-34261
Stefan Michlits of SEC Consult reported these vulnerabilities to KYOCERA Document Solutions Inc. and coordinated.
KYOCERA Document Solutions Inc. and JPCERT/CC published respective advisories in order to notify users of this vulnerability.JVNDB-2023-002725http://jvn.jp/en/vu/JVNVU98785541/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-34259https://www.cve.org/CVERecord?id=CVE-2023-34260https://www.cve.org/CVERecord?id=CVE-2023-34261https://nvd.nist.gov/vuln/detail/CVE-2023-34259https://nvd.nist.gov/vuln/detail/CVE-2023-34260https://nvd.nist.gov/vuln/detail/CVE-2023-34261https://cwe.mitre.org/data/definitions/204.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:kyocera_document_solutions_multiple_product2024-05-07T18:15+09:002023-07-28T18:24+09:002024-05-07T18:15+09:00Fujitsu network devices Si-R series and SR-M series vulnerable to authentication bypass
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002722.html
The web management interface of Fujitsu network devices Si-R series and SR-M series contains an authentication bypass vulnerability (CWE-287,CVE-2023-38555).
Katsuhiko Sato (a.k.a. goroh_kun) of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-002722https://jvn.jp/en/vu/JVNVU96643580/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-38555https://nvd.nist.gov/vuln/detail/CVE-2023-38555https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:fujitsu:si-r220d_firmwarecpe:/o:fujitsu:si-r370b_firmwarecpe:/o:fujitsu:si-r570b_firmwarecpe:/o:fujitsu:si-r_130b_firmwarecpe:/o:fujitsu:si-r_30b_firmwarecpe:/o:fujitsu:si-r_90brin_firmwarecpe:/o:fujitsu:si-r_g100b_firmwarecpe:/o:fujitsu:si-r_g100_firmwarecpe:/o:fujitsu:si-r_g110b_firmwarecpe:/o:fujitsu:si-r_g120_firmwarecpe:/o:fujitsu:si-r_g121_firmwarecpe:/o:fujitsu:si-r_g200b_firmwarecpe:/o:fujitsu:si-r_g200_firmwarecpe:/o:fujitsu:si-r_g210_firmwarecpe:/o:fujitsu:si-r_g211_firmwarecpe:/o:fujitsu:sr-m_50ap1_firmware2024-04-19T18:07+09:002023-07-27T18:12+09:002024-04-19T18:07+09:00Fujitsu Real-time Video Transmission Gear "IP series" uses a hard-coded credentials
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000074.html
Real-time Video Transmission Gear "IP series" provided by Fujitsu Limited uses a hard-coded credentials (CWE-798) .
The product's credentials for factory testing may be obtained by reverse engineering and others.
Fujitsu Limited reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Fujitsu Limited coordinated under the Information Security Early Warning Partnership.JVNDB-2023-000074http://jvn.jp/en/jp/JVN95727578/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-38433https://nvd.nist.gov/vuln/detail/CVE-2023-38433https://www.cisa.gov/news-events/ics-advisories/icsa-23-248-01https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:fujitsu:ip-900d_firmwarecpe:/o:fujitsu:ip-900e_firmwarecpe:/o:fujitsu:ip-900iid_firmwarecpe:/o:fujitsu:ip-90_firmwarecpe:/o:fujitsu:ip-920d_firmwarecpe:/o:fujitsu:ip-920e_firmwarecpe:/o:fujitsu:ip-9610_firmwarecpe:/o:fujitsu:ip-he900d_firmwarecpe:/o:fujitsu:ip-he900e_firmwarecpe:/o:fujitsu:ip-he950d_firmwarecpe:/o:fujitsu:ip-he950e_firmware2024-04-12T18:04+09:002023-07-26T18:00+09:002024-04-12T18:04+09:00Improper restriction of XML external entity references (XXE) in Applicant Programme
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000075.html
Applicant Programme provided by The Ministry of Justice improperly restricts XML external entity references (XXE) (CWE-611).
Toyama Taku and Sakaki Ryutaro of NEC Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000075https://jvn.jp/en/jp/JVN37857022/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-32639https://nvd.nist.gov/vuln/detail/CVE-2023-32639https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:moj:applicant_programme2024-04-22T14:20+09:002023-07-24T15:44+09:002024-04-22T14:20+09:00GBrowse vulnerable to unrestricted upload of files with dangerous types
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000073.html
GBrowse provided by Generic Model Organism Database Project is a web-based genome browser. GBrowse allows the users to upload their own data in several file formats (see "GBrowse User Uploads").
The affected versions of GBrowse accept files with any formats uploaded (CWE-434), and place them in the area accessible through unauthenticated web requests.
The reporter states that attacks exploiting this vulnerability have been observed.
Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000073https://jvn.jp/en/jp/JVN35897618/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-32637https://nvd.nist.gov/vuln/detail/CVE-2023-32637https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:gmod:gbrowse2024-04-12T17:31+09:002023-07-21T15:02+09:002024-04-12T17:31+09:00Multiple vulnerabilities in WordPress Plugin "TS Webfonts for SAKURA"
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000070.html
WordPress Plugin "TS Webfonts for SAKURA" provided by SAKURA internet Inc. contains multiple vulnerabilities listed below.
* Cross-site scripting (CWE-79) - CVE-2023-32624
* Cross-site request forgery (CWE-352) - CVE-2023-32625
SAKURA internet Inc. reported these vulnerabilities to IPA to notify users of the solutions through JVN. JPCERT/CC and SAKURA internet Inc. coordinated under the Information Security Early Warning Partnership.JVNDB-2023-000070https://jvn.jp/en/jp/JVN90560760/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-32624https://www.cve.org/CVERecord?id=CVE-2023-32625https://nvd.nist.gov/vuln/detail/CVE-2023-32624https://nvd.nist.gov/vuln/detail/CVE-2023-32625https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:sakura:ts_webfonts_for_sakura2024-04-17T17:20+09:002023-07-20T16:05+09:002024-04-17T17:20+09:00Multiple Vulnerabilities in Hitachi Device Manager
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002510.html
Multiple vulnerabilities have been found in Hitachi Device Manager.JVNDB-2023-002510https://www.cve.org/CVERecord?id=CVE-2023-34142https://www.cve.org/CVERecord?id=CVE-2023-34143https://nvd.nist.gov/vuln/detail/CVE-2023-34142https://nvd.nist.gov/vuln/detail/CVE-2023-34143https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:device_manager2023-07-19T14:48+09:002023-07-19T14:48+09:002023-07-19T14:48+09:00File and Directory Permissions Vulnerability in Hitachi Command Suite
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002511.html
A File and Directory Permissions Vulnerability (CVE-2020-36695) exists in Hitachi Command Suite.JVNDB-2023-002511https://www.cve.org/CVERecord?id=CVE-2020-36695https://nvd.nist.gov/vuln/detail/CVE-2020-36695https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:compute_systems_managercpe:/a:hitachi:device_managercpe:/a:hitachi:replication_managercpe:/a:hitachi:tiered_storage_managercpe:/a:hitachi:tuning_manager2024-04-26T12:29+09:002023-07-19T14:48+09:002024-04-26T12:29+09:00EL Injection Vulnerability in Hitachi Replication Manager
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002512.html
An EL Injection Vulnerability (CVE-2022-4146) exists in Hitachi Replication Manager.JVNDB-2023-002512https://www.cve.org/CVERecord?id=CVE-2022-4146https://nvd.nist.gov/vuln/detail/CVE-2022-4146https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:replication_manager2024-04-26T12:24+09:002023-07-19T14:48+09:002024-04-26T12:24+09:00Improper restriction of XML external entity references (XXE) in XBRL data create application
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000072.html
XBRL data create application provided by Financial Services Agency improperly restricts XML external entity references (XXE) (CWE-611).
Taku Toyama of NEC Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000072https://jvn.jp/en/jp/JVN44726469/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-32635https://nvd.nist.gov/vuln/detail/CVE-2023-32635https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:edinet-fsa:xbrl_data_create2024-03-19T18:11+09:002023-07-18T15:22+09:002024-03-19T18:11+09:00Multiple vulnerabilities in ELECOM and LOGITEC wireless LAN routers
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002413.html
Multiple wireless LAN routers provided by ELECOM CO.,LTD. and LOGITEC CORPORATION contain multiple vulnerabilities listed below.
* Command Injection on the web management page (CWE-77) - CVE-2023-37566, CVE-2023-37568
* Command Injection on a certain port of the web management page (CWE-77) - CVE-2023-37567
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.
JVNDB-2023-002413https://jvn.jp/en/vu/JVNVU91850798/https://www.cve.org/CVERecord?id=CVE-2023-37566https://www.cve.org/CVERecord?id=CVE-2023-37567https://www.cve.org/CVERecord?id=CVE-2023-37568https://nvd.nist.gov/vuln/detail/CVE-2023-37566https://nvd.nist.gov/vuln/detail/CVE-2023-37567https://nvd.nist.gov/vuln/detail/CVE-2023-37568https://cwe.mitre.org/data/definitions/77.htmlcpe:/o:elecom:wrc-1167febk-a_firmwarecpe:/o:elecom:wrc-1167gebk-s_firmwarecpe:/o:elecom:wrc-1167ghbk-s_firmwarecpe:/o:elecom:wrc-1167ghbk3-a_firmwarecpe:/o:elecom:wrc-1467ghbk-a_firmwarecpe:/o:elecom:wrc-1900ghbk-a_firmwarecpe:/o:elecom:wrc-600ghbk-a_firmwarecpe:/o:elecom:wrc-733febk2-a_firmwarecpe:/o:elecom:wrc-f1167acf2_firmwarecpe:/o:logitec:lan-w301nr_firmware2024-04-22T16:18+09:002023-07-12T16:15+09:002024-04-22T16:18+09:00Multiple vulnerabilities in multiple ELECOM wireless LAN routers and wireless LAN repeaters
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000071.html
Wireless LAN routers and wireless LAN repeaters provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below.
* Cross-site Scripting (CWE-79) - CVE-2023-37560
* Open Redirect (CWE-601) - CVE-2023-37561
* Cross-Site Request Forgery (CWE-352) - CVE-2023-37562
* Information disclosure (CWE-200) - CVE-2023-37563
* OS Command Injection (CWE-78) - CVE-2023-37564
* Code Injection (CWE-94) - CVE-2023-37565
CVE-2023-37560
Yamaguchi Kakeru reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-37561, CVE-2023-37562
Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-37563
Shu Yoshikoshi reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC during the same period, and JPCERT/CC coordinated with the developer.
CVE-2023-37564
Shu Yoshikoshi reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-37565
MASAHIRO IIDA and SHUTA IDE of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000071http://jvn.jp/en/jp/JVN05223215/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-37560https://www.cve.org/CVERecord?id=CVE-2023-37561https://www.cve.org/CVERecord?id=CVE-2023-37562https://www.cve.org/CVERecord?id=CVE-2023-37563https://www.cve.org/CVERecord?id=CVE-2023-37564https://www.cve.org/CVERecord?id=CVE-2023-37565https://nvd.nist.gov/vuln/detail/CVE-2023-37560https://nvd.nist.gov/vuln/detail/CVE-2023-37561https://nvd.nist.gov/vuln/detail/CVE-2023-37562https://nvd.nist.gov/vuln/detail/CVE-2023-37563https://nvd.nist.gov/vuln/detail/CVE-2023-37564https://nvd.nist.gov/vuln/detail/CVE-2023-37565https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:elecom:wrc-1167febk-a_firmwarecpe:/o:elecom:wrc-1167febk-scpe:/o:elecom:wrc-1167gebk-s_firmwarecpe:/o:elecom:wrc-1167ghbk-s_firmwarecpe:/o:elecom:wrc-1167ghbk3-a_firmwarecpe:/o:elecom:wrh-300wh-h_firmwarecpe:/o:elecom:wtc-300hwhcpe:/o:elecom:wtc-c1167gc-bcpe:/o:elecom:wtc-c1167gc-w2024-03-29T15:28+09:002023-07-11T15:37+09:002024-03-29T15:28+09:00Multiple vulnerabilities in SoftEther VPN and PacketiX VPN
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000069.html
SoftEther VPN provided by University of Tsukuba SoftEther VPN Project and PacketiX VPN provided by SoftEther Corporation contain multiple vulnerabilities listed below in VPN Client function, and Dynamic DNS Client function included in the VPN server.<ul><li>Heap-based buffer overflow (CWE-122) - CVE-2023-27395</li><li>Integer overflow or wraparound (CWE-190) - CVE-2023-22325</li><li>Exposure of resource to wrong sphere (CWE-668) - CVE-2023-32275</li><li>Improper access control (CWE-284) - CVE-2023-27516</li><li>Channel accessible by non-endpoint (CWE-300) - CVE-2023-32634</li><li>Use of uninitialized resource (CWE-908) - CVE-2023-31192</li></ul>Lilith of Cisco Talos of Cisco Systems, Inc., United States of America reported these vulnerabilities to the developer and coordinated. The developer reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000069http://jvn.jp/en/jp/JVN64316789/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27395https://www.cve.org/CVERecord?id=CVE-2023-22325https://www.cve.org/CVERecord?id=CVE-2023-32275https://www.cve.org/CVERecord?id=CVE-2023-27516https://www.cve.org/CVERecord?id=CVE-2023-31192https://www.cve.org/CVERecord?id=CVE-2023-32634https://nvd.nist.gov/vuln/detail/CVE-2023-22325https://nvd.nist.gov/vuln/detail/CVE-2023-27395https://nvd.nist.gov/vuln/detail/CVE-2023-27516https://nvd.nist.gov/vuln/detail/CVE-2023-31192https://nvd.nist.gov/vuln/detail/CVE-2023-32275https://nvd.nist.gov/vuln/detail/CVE-2023-32634https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:softether_packetix_vpncpe:/a:softether:vpn2024-05-22T17:47+09:002023-07-03T15:07+09:002024-05-22T17:47+09:00"NewsPicks" App uses a hard-coded API key for an external service
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000068.html
"NewsPicks" App for Android and "NewsPicks" App for iOS provided by NewsPicks, Inc. use a hard-coded API key for an external service (CWE-798).
Sunagawa Masanori of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000068http://jvn.jp/en/jp/JVN32739265/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-28387https://nvd.nist.gov/vuln/detail/CVE-2023-28387https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:newspicks_newspicks_economic_news_appcpe:/a:misc:newspicks_newspicks_economic_news_app_useful_for_business2024-04-30T18:09+09:002023-06-30T15:06+09:002024-04-30T18:09+09:00Null pointer dereference vulnerability in multiple printers and MFPs which implement BROTHER debut web server
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002270.html
Multiple printers and MFPs (multifunction printers) which implement Brother debut web server contain a null pointer dereference vulnerability (CWE-476, CVE-2023-29984).
Darren Johnson directly reported this vulnerability to BROTHER INDUSTRIES, LTD. and FUJIFILM Business Innovation Corp., and both vendors reported this case to JPCERT/CC to request the coordination between the reporter and the susceptible multiple vendors.JVNDB-2023-002270http://jvn.jp/en/vu/JVNVU93767756/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-29984https://nvd.nist.gov/vuln/detail/CVE-2023-29984http://cwe.mitre.org/data/definitions/476.htmlcpe:/a:brother:debutwebserver2024-04-22T16:07+09:002023-06-30T11:49+09:002024-04-22T16:07+09:00WordPress Plugin "Snow Monkey Forms" vulnerable to directory traversal
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000067.html
WordPress Plugin "Snow Monkey Forms" provided by Monkey Wrench Inc. contains a directory traversal vulnerability (CWE-22).
Shinsaku Nomura of Bitforest Co.,Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000067http://jvn.jp/en/jp/JVN97127032/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-32623https://nvd.nist.gov/vuln/detail/CVE-2023-32623https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:2inc:snow_monkey_forms2024-04-26T17:56+09:002023-06-27T17:05+09:002024-04-26T17:56+09:00Multiple vulnerabilities in WAVLINK WL-WN531AX2
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000065.html
WL-WN531AX2 provided by WAVLINK contains multiple vulnerabilities listed below.
* Client-side enforcement of server-side security (CWE-602) - CVE-2023-32612
* Exposure of resource to wrong sphere (CWE-668) - CVE-2023-32613
* Improper authentication (CWE-287) - CVE-2023-32620
* Unrestricted upload of file with dangerous type (CWE-434) - CVE-2023-32621
* Improper neutralization of special elements (CWE-138) - CVE-2023-32622
Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000065http://jvn.jp/en/jp/JVN78634340/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-32612https://www.cve.org/CVERecord?id=CVE-2023-32613https://www.cve.org/CVERecord?id=CVE-2023-32620https://www.cve.org/CVERecord?id=CVE-2023-32621https://www.cve.org/CVERecord?id=CVE-2023-32622https://nvd.nist.gov/vuln/detail/CVE-2023-32612https://nvd.nist.gov/vuln/detail/CVE-2023-32613https://nvd.nist.gov/vuln/detail/CVE-2023-32620https://nvd.nist.gov/vuln/detail/CVE-2023-32621https://nvd.nist.gov/vuln/detail/CVE-2023-32622https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:wavlink:wl-wn531ax2_firmware2023-06-27T16:50+09:002023-06-27T16:50+09:002023-06-27T16:50+09:00Multiple vulnerabilities in Aterm series
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000066.html
Aterm series provided by NEC Corporation contain multiple vulnerabilities listed below.
* Directory traversal (CWE-22) - CVE-2023-3330
* Directory traversal (CWE-22) - CVE-2023-3331
* Stored cross-site scripting (CWE-79) - CVE-2023-3332
* OS command injection (CWE-78) - CVE-2023-3333
Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000066http://jvn.jp/en/jp/JVN38343415/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-3330https://www.cve.org/CVERecord?id=CVE-2023-3331https://www.cve.org/CVERecord?id=CVE-2023-3332https://www.cve.org/CVERecord?id=CVE-2023-3333https://nvd.nist.gov/vuln/detail/CVE-2023-3330https://nvd.nist.gov/vuln/detail/CVE-2023-3331https://nvd.nist.gov/vuln/detail/CVE-2023-3332https://nvd.nist.gov/vuln/detail/CVE-2023-3333https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:nec:aterm_wf300hp_firmwarecpe:/o:nec:aterm_wg1400hp_firmwarecpe:/o:nec:aterm_wg1800hp2_firmwarecpe:/o:nec:aterm_wg1800hp_firmwarecpe:/o:nec:aterm_wg2200hp_firmwarecpe:/o:nec:aterm_wg2600hpcpe:/o:nec:aterm_wg2600hp2_firmwarecpe:/o:nec:aterm_wg300hp_firmwarecpe:/o:nec:aterm_wg600hp_firmwarecpe:/o:nec:aterm_wr8170n_firmwarecpe:/o:nec:aterm_wr8175n_firmwarecpe:/o:nec:aterm_wr8370n_firmwarecpe:/o:nec:aterm_wr8600n_firmwarecpe:/o:nec:aterm_wr8700n_firmwarecpe:/o:nec:aterm_wr8750n_firmwarecpe:/o:nec:aterm_wr9300n_firmwarecpe:/o:nec:aterm_wr9500n_firmware2024-05-22T18:16+09:002023-06-27T15:12+09:002024-05-22T18:16+09:00Multiple vulnerabilities in Pleasanter
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000060.html
Pleasanter provided by Implem Inc. contains multiple vulnerabilities listed below.
* Stored cross-site scripting vulnerability (CWE-79) - CVE-2023-32607
* Directory traversal vulnerability (CWE-22) - CVE-2023-32608
Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to Implem Inc. and Implem Inc. reported them to IPA.
JPCERT/CC and Implem Inc. coordinated under the Information Security Early Warning Partnership.JVNDB-2023-000060http://jvn.jp/en/jp/JVN97818024/https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32607https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32608https://nvd.nist.gov/vuln/detail/CVE-2023-32607https://nvd.nist.gov/vuln/detail/CVE-2023-32608https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:pleasanter:pleasanter2024-05-07T14:10+09:002023-06-22T15:49+09:002024-05-07T14:10+09:00SYNCK GRAPHICA Mailform Pro CGI vulnerable to Regular expression Denial-of-Service (ReDoS)
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000064.html
Mailform Pro CGI provided by SYNCK GRAPHICA contains a Regular expression Denial-of-Service (ReDoS) vulnerability (CWE-1333).
Tran Quang Vu of FPT Software reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000064https://jvn.jp/en/jp/JVN70502982/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-32610https://nvd.nist.gov/vuln/detail/CVE-2023-32610https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:synck_graphica:mailform_pro_cgi2024-04-26T18:03+09:002023-06-20T14:48+09:002024-04-26T18:03+09:00Multiple vulnerabilities in Panasonic AiSEG2
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000063.html
Panasonic AiSEG2 contains multiple vulnerabilities listed below.
* OS Command Injection (CWE-78) - CVE-2023-28726
* Improper Authentication (CWE-287) - CVE-2023-28727
Taku Toyama of NEC Corporation reported CVE-2023-28726 and CVE-2023-28727 vulnerabilities to Panasonic and coordinated. Panasonic and JPCERT/CC published respective advisories in order to notify users of the vulnerabilities.
Yota Egusa of SAKURA internet Inc. reported CVE-2023-28727 vulnerability to IPA. JPCERT/CC coordinated with Panasonic under Information Security Early Warning Partnership.JVNDB-2023-000063https://jvn.jp/en/jp/JVN19748237/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-28726https://www.cve.org/CVERecord?id=CVE-2023-28727https://nvd.nist.gov/vuln/detail/CVE-2023-28726https://nvd.nist.gov/vuln/detail/CVE-2023-28727 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:panasonic:aiseg2_firmware2023-06-16T14:05+09:002023-06-16T14:05+09:002023-06-16T14:05+09:00Printer Driver Packager NX creates driver installation packages without modification detection
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002111.html
Printer Driver Packager NX provided by Ricoh Company, Ltd. is a tool to create driver installation packages. A driver installation package is used to install and configure printer drivers on the target PCs.
The installation and configuration of printer drivers require an administrative privilege, and a created driver installation package can bundle administrative credentials in encrypted form enabling non-administrative users to install printer drivers without administrator's help.
The driver installation package, created by the affected version of Printer Driver Packager NX, fails to detect its modification (CWE-345) and may spawn an unexpected process with the administrative privilege.
Ricoh Company, Ltd. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.JVNDB-2023-002111https://jvn.jp/en/vu/JVNVU92207133/https://www.cve.org/CVERecord?id=CVE-2023-30759https://nvd.nist.gov/vuln/detail/CVE-2023-30759https://cwe.mitre.org/data/definitions/345.htmlcpe:/a:ricoh:ridoc_ez_Installer_nx2024-05-23T15:45+09:002023-06-15T16:06+09:002024-05-23T15:45+09:00Security updates for multiple Trend Micro products for enterprises (June 2023)
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002100.html
Trend Micro Incorporated has released security updates for multiple Trend Micro products for enterprises. For more details, refer to the information provided by the developer.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2023-002100https://jvn.jp/en/vu/JVNVU91852506/https://jvn.jp/en/vu/JVNVU93384719/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-32521https://www.cve.org/CVERecord?id=CVE-2023-32522https://www.cve.org/CVERecord?id=CVE-2023-32523https://www.cve.org/CVERecord?id=CVE-2023-32524https://www.cve.org/CVERecord?id=CVE-2023-32525https://www.cve.org/CVERecord?id=CVE-2023-32526https://www.cve.org/CVERecord?id=CVE-2023-32527https://www.cve.org/CVERecord?id=CVE-2023-32528https://www.cve.org/CVERecord?id=CVE-2023-30902https://www.cve.org/CVERecord?id=CVE-2023-32552https://www.cve.org/CVERecord?id=CVE-2023-32553https://www.cve.org/CVERecord?id=CVE-2023-32554https://www.cve.org/CVERecord?id=CVE-2023-32555https://www.cve.org/CVERecord?id=CVE-2023-32556https://www.cve.org/CVERecord?id=CVE-2023-32557https://www.cve.org/CVERecord?id=CVE-2023-34144https://www.cve.org/CVERecord?id=CVE-2023-34145https://www.cve.org/CVERecord?id=CVE-2023-34146https://www.cve.org/CVERecord?id=CVE-2023-34147https://www.cve.org/CVERecord?id=CVE-2023-34148https://www.cve.org/CVERecord?id=CVE-2023-32529https://www.cve.org/CVERecord?id=CVE-2023-32530https://www.cve.org/CVERecord?id=CVE-2023-32531https://www.cve.org/CVERecord?id=CVE-2023-32532https://www.cve.org/CVERecord?id=CVE-2023-32533https://www.cve.org/CVERecord?id=CVE-2023-32534https://www.cve.org/CVERecord?id=CVE-2023-32535https://www.cve.org/CVERecord?id=CVE-2023-32536https://www.cve.org/CVERecord?id=CVE-2023-32537https://www.cve.org/CVERecord?id=CVE-2023-32604https://www.cve.org/CVERecord?id=CVE-2023-32605https://nvd.nist.gov/vuln/detail/CVE-2023-30902https://nvd.nist.gov/vuln/detail/CVE-2023-32521https://nvd.nist.gov/vuln/detail/CVE-2023-32522https://nvd.nist.gov/vuln/detail/CVE-2023-32523https://nvd.nist.gov/vuln/detail/CVE-2023-32524https://nvd.nist.gov/vuln/detail/CVE-2023-32525https://nvd.nist.gov/vuln/detail/CVE-2023-32526https://nvd.nist.gov/vuln/detail/CVE-2023-32527https://nvd.nist.gov/vuln/detail/CVE-2023-32528https://nvd.nist.gov/vuln/detail/CVE-2023-32552https://nvd.nist.gov/vuln/detail/CVE-2023-32553https://nvd.nist.gov/vuln/detail/CVE-2023-32554https://nvd.nist.gov/vuln/detail/CVE-2023-32555https://nvd.nist.gov/vuln/detail/CVE-2023-32556https://nvd.nist.gov/vuln/detail/CVE-2023-32557https://nvd.nist.gov/vuln/detail/CVE-2023-34144https://nvd.nist.gov/vuln/detail/CVE-2023-34145https://nvd.nist.gov/vuln/detail/CVE-2023-34146https://nvd.nist.gov/vuln/detail/CVE-2023-34147https://nvd.nist.gov/vuln/detail/CVE-2023-32529https://nvd.nist.gov/vuln/detail/CVE-2023-32530https://nvd.nist.gov/vuln/detail/CVE-2023-32531https://nvd.nist.gov/vuln/detail/CVE-2023-32532https://nvd.nist.gov/vuln/detail/CVE-2023-32533https://nvd.nist.gov/vuln/detail/CVE-2023-32534https://nvd.nist.gov/vuln/detail/CVE-2023-32535https://nvd.nist.gov/vuln/detail/CVE-2023-32536https://nvd.nist.gov/vuln/detail/CVE-2023-32537https://nvd.nist.gov/vuln/detail/CVE-2023-32604https://nvd.nist.gov/vuln/detail/CVE-2023-32605https://nvd.nist.gov/vuln/detail/CVE-2023-34148https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/367.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/426.htmlhttps://cwe.mitre.org/data/definitions/269.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:trendmicro:apex_centralcpe:/a:trendmicro:apex_onecpe:/a:trendmicro:mobile_security2024-05-23T15:23+09:002023-06-14T14:47+09:002024-05-23T15:23+09:00Chatwork Desktop Application (Mac) vulnerable to code injection
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000061.html
Chatwork Desktop Application (Mac) provided by Chatwork Co., Ltd. contains a code injection vulnerability (CWE-94).
Koh M. Nakagawa of FFRI Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000061https://jvn.jp/en/jp/JVN96828492/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-32546https://nvd.nist.gov/vuln/detail/CVE-2023-32546https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:chatwork:chatwork2024-05-24T16:02+09:002023-06-13T13:38+09:002024-05-24T16:02+09:00"WPS Office" vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000062.html
"WPS Office" which was provided by KINGSOFT JAPAN, INC. contains an OS command injection vulnerability (CWE-78).JVNDB-2023-000062https://jvn.jp/en/jp/JVN36060509/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-32548https://nvd.nist.gov/vuln/detail/CVE-2023-32548https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:kingsoft:kingsoft_wps_office2024-04-18T17:49+09:002023-06-12T12:57+09:002024-04-18T17:49+09:00ASUS Router RT-AX3000 vulnerable to using sensitive cookies without 'Secure' attribute
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000048.html
ASUS Router RT-AX3000 provided by ASUSTeK COMPUTER INC. uses sensitive cookies without 'Secure' attribute (CWE-614).
Shungo Kumasaka of GMO Cyber Security by IERAE reported this vulnerability to the developer and JPCERT/CC published respective advisories in order to notify users of this vulnerability.JVNDB-2023-000048http://jvn.jp/en/jp/JVN34232595/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-31195https://nvd.nist.gov/vuln/detail/CVE-2023-31195https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/h:asus:asus_router_rt-ax30002024-04-18T17:44+09:002023-06-09T15:18+09:002024-04-18T17:44+09:00Multiple vulnerabilities in Inaba Denki Sangyo Wi-Fi AP UNIT
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000059.html
Wi-Fi AP UNIT provided by Inaba Denki Sangyo Co., Ltd. contains multiple vulnerabilities listed below.
<ul>
<li>Missing authentication for critical function (CWE-306) - CVE-2023-31196
<li>OS command injection (CWE-78) - CVE-2023-31198
<li>OS command injection (CWE-78) - CVE-2023-28392</ul>
MASAHIRO IIDA of LAC Co., Ltd. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000059http://jvn.jp/en/jp/JVN28412757/index.htmlhttp://jvn.jp/en/vu/JVNVU98968780/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-31196https://www.cve.org/CVERecord?id=CVE-2023-31198https://www.cve.org/CVERecord?id=CVE-2023-28392https://nvd.nist.gov/vuln/detail/CVE-2023-28392https://nvd.nist.gov/vuln/detail/CVE-2023-31196https://nvd.nist.gov/vuln/detail/CVE-2023-31198https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:inaba:ac-pd-wapu-p_firmwarecpe:/o:inaba:ac-pd-wapum-p_firmwarecpe:/o:inaba:ac-pd-wapum_firmwarecpe:/o:inaba:ac-pd-wapu_firmwarecpe:/o:inaba:ac-wapu-300-p_firmwarecpe:/o:inaba:ac-wapu-300_firmwarecpe:/o:inaba:ac-wapum-300-p_firmwarecpe:/o:inaba:ac-wapum-300_firmware2024-05-27T16:38+09:002023-06-09T15:18+09:002024-05-27T16:38+09:00Multiple vulnerabilities in Fuji Electric products
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002072.html
Multiple vulnerabilities listed below exist in the simulator module and the remote monitoring software 'V-Server Lite' and 'V-Server' contained in the graphic editor 'V-SFT', and the remote monitoring software 'TELLUS' and 'TELLUS Lite' provided by FUJI ELECTRIC CO., LTD.
* Stack-based buffer overflow in V-Serve, V-Server Lite (CWE-121) - CVE-2023-31239
* Stack-based buffer overflow in TELLUS, TELLUS Lite (CWE-121) - CVE-2023-32538, CVE-2023-32273, CVE-2023-32201
* Out-of-bounds read in TELLUS, TELLUS Lite (CWE-125) - CVE-2023-32288
* Stack-based buffer overflow in TELLUS, TELLUS Lite (CWE-121) - CVE-2023-32276
* Access of memory location after end of buffer in TELLUS, TELLUS Lite (CWE-788) - CVE-2023-32270
* Out-of-bounds read in TELLUS, TELLUS Lite (CWE-125) - CVE-2023-32542
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-002072https://jvn.jp/en/vu/JVNVU98818508/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-31239https://www.cve.org/CVERecord?id=CVE-2023-32538https://www.cve.org/CVERecord?id=CVE-2023-32273https://www.cve.org/CVERecord?id=CVE-2023-32201https://www.cve.org/CVERecord?id=CVE-2023-32288https://www.cve.org/CVERecord?id=CVE-2023-32276https://www.cve.org/CVERecord?id=CVE-2023-32270https://www.cve.org/CVERecord?id=CVE-2023-32542https://nvd.nist.gov/vuln/detail/CVE-2023-31239https://nvd.nist.gov/vuln/detail/CVE-2023-32201https://nvd.nist.gov/vuln/detail/CVE-2023-32270https://nvd.nist.gov/vuln/detail/CVE-2023-32273https://nvd.nist.gov/vuln/detail/CVE-2023-32276https://nvd.nist.gov/vuln/detail/CVE-2023-32288https://nvd.nist.gov/vuln/detail/CVE-2023-32538https://nvd.nist.gov/vuln/detail/CVE-2023-32542https://cwe.mitre.org/data/definitions/121.htmlhttps://cwe.mitre.org/data/definitions/125.htmlhttps://cwe.mitre.org/data/definitions/788.htmlcpe:/a:fujielectric:telluscpe:/a:fujielectric:tellus_litecpe:/a:fujielectric:v-server2024-05-23T15:33+09:002023-06-09T12:23+09:002024-05-23T15:33+09:00Multiple vulnerabilities in KbDevice digital video recorders
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002055.html
Multiple digital video recorders provided by KbDevice,Inc. contain multiple vulnerabilities listed below.
* Improper authentication (CWE-287) - CVE-2023-30762
* OS command injection (CWE-78) - CVE-2023-30764
* Hidden functionality (CWE-912) - CVE-2023-30766
Yoshiki Mori, Ushimaru Hayato, Hiromu Kubiura and Masaki Kubo of National Institute of Information and Communications Technology Cybersecurity Research Institute reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-002055https://jvn.jp/en/vu/JVNVU90812349/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-30762https://www.cve.org/CVERecord?id=CVE-2023-30764https://www.cve.org/CVERecord?id=CVE-2023-30766https://nvd.nist.gov/vuln/detail/CVE-2023-30762https://nvd.nist.gov/vuln/detail/CVE-2023-30764https://nvd.nist.gov/vuln/detail/CVE-2023-30766https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/912.htmlcpe:/o:kbdevice:kb-ahr04d_firmwarecpe:/o:kbdevice:kb-ahr08d_firmwarecpe:/o:kbdevice:kb-ahr16d_firmwarecpe:/o:kbdevice:kb-irip04a_firmwarecpe:/o:kbdevice:kb-irip08a_firmwarecpe:/o:kbdevice:kb-irip16a_firmware2024-05-24T15:57+09:002023-06-07T11:52+09:002024-05-24T15:57+09:00Multiple vulnerabilities in FUJI ELECTRIC FRENIC RHC Loader
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002022.html
FRENIC RHC Loader provided by FUJI ELECTRIC CO., LTD. contains multiple vulnerabilities listed below.
* Stack-based buffer overflow (CWE-121) - CVE-2023-29160
* Out-of-bounds read (CWE-125) - CVE-2023-29167
* Improper restriction of XML external entity reference (CWE-611) - CVE-2023-29498
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-002022https://jvn.jp/en/vu/JVNVU97809354/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-29160https://www.cve.org/CVERecord?id=CVE-2023-29167https://www.cve.org/CVERecord?id=CVE-2023-29498https://nvd.nist.gov/vuln/detail/CVE-2023-29160https://nvd.nist.gov/vuln/detail/CVE-2023-29167https://nvd.nist.gov/vuln/detail/CVE-2023-29498https://cwe.mitre.org/data/definitions/121.htmlhttps://cwe.mitre.org/data/definitions/125.htmlhttps://cwe.mitre.org/data/definitions/611.htmlcpe:/a:fujielectric:frenic_rhc_loader2024-04-18T17:40+09:002023-06-05T15:55+09:002024-04-18T17:40+09:00"Jiyu Kukan Toku-Toku coupon" App vulnerable to improper server certificate verification
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000057.html
"Jiyu Kukan Toku-Toku coupon" App provided by RUNSYSTEM CO.,LTD. is vulnerable to improper server certificate verification (CWE-295).
Ryo Nihonyanagi of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000057http://jvn.jp/en/jp/JVN33836375/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-29501https://nvd.nist.gov/vuln/detail/CVE-2023-29501https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:runsystem:jiyu_kukan_toku-toku_coupon2024-05-23T17:19+09:002023-06-01T14:51+09:002024-05-23T17:19+09:00Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS)
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002002.html
CONPROSYS HMI System (CHS) provided by Contec Co., Ltd. contains multiple vulnerabilities listed below.
* Plaintext storage of a password (CWE-256) - CVE-2023-28713
* Incorrect permission assignment for critical resource (CWE-732) - CVE-2023-28399
* Improper access control (CWE-284) - CVE-2023-28657
* Cross-site scripting (CWE-79) - CVE-2023-28651
* Server-side request forgery (CWE-918)- CVE-2023-28824
* SQL injection (CWE-89) - CVE-2023-29154
* Improper control of interaction frequency (CWE-799) - CVE-2023-2758
Michael Heinzl reported the vulnerabilities listed below to JPCERT/CC, and JPCERT/CC coordinated with the developer.
CVE-2023-28713, CVE-2023-28399, CVE-2023-28657, CVE-2023-28651, CVE-2023-28824, CVE-2023-29154
Tenable, Inc. reported CVE-2023-2758 vulnerability to the developer, and based on the coordination request made by the developer, JPCERT/CC coordinated with Tenable, Inc. and the developer.JVNDB-2023-002002https://jvn.jp/en/vu/JVNVU93372935/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-28713https://www.cve.org/CVERecord?id=CVE-2023-28399https://www.cve.org/CVERecord?id=CVE-2023-28657https://www.cve.org/CVERecord?id=CVE-2023-28651https://www.cve.org/CVERecord?id=CVE-2023-28824https://www.cve.org/CVERecord?id=CVE-2023-29154https://www.cve.org/CVERecord?id=CVE-2023-2758https://nvd.nist.gov/vuln/detail/CVE-2023-2758https://nvd.nist.gov/vuln/detail/CVE-2023-28399https://nvd.nist.gov/vuln/detail/CVE-2023-28651https://nvd.nist.gov/vuln/detail/CVE-2023-28657https://nvd.nist.gov/vuln/detail/CVE-2023-28713https://nvd.nist.gov/vuln/detail/CVE-2023-28824https://nvd.nist.gov/vuln/detail/CVE-2023-29154https://cwe.mitre.org/data/definitions/256.htmlhttps://cwe.mitre.org/data/definitions/284.htmlhttps://cwe.mitre.org/data/definitions/732.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/799.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/918.htmlcpe:/a:contec:conprosys_hmi_system2024-03-19T18:13+09:002023-06-01T13:48+09:002024-03-19T18:13+09:00DataSpider Servista uses a hard-coded cryptographic key
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000052.html
DataSpider Servista provided by SAISON INFORMATION SYSTEMS CO.,LTD. is a data integration software. ScriptRunner and ScriptRunner for Amazon SQS are used to start the configured processes on DataSpider Servista.
The cryptographic key is embedded in ScriptRunner and ScriptRunner for Amazon SQS, which is common to all users (CWE-321).
Sato Nobuhiro of Suzuki Motor Corporation and You Okuma of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000052https://jvn.jp/en/jp/JVN38222042/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-28937https://nvd.nist.gov/vuln/detail/CVE-2023-28937https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:saison:dataspider_servista2024-03-19T17:44+09:002023-05-31T15:34+09:002024-03-19T17:44+09:00Pleasanter vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000058.html
Pleasanter provided by Implem Inc. contains a cross-site scripting vulnerability (CWE-79).
Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to Implem Inc. and Implem Inc. reported it to IPA.
JPCERT/CC and Implem Inc. coordinated under the Information Security Early Warning Partnership.JVNDB-2023-000058http://jvn.jp/en/jp/JVN62111727/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-30758https://nvd.nist.gov/vuln/detail/CVE-2023-30758https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:pleasanter:pleasanter2024-03-19T18:17+09:002023-05-31T15:34+09:002024-03-19T18:17+09:00Starlette vulnerable to directory traversal
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000056.html
Starlette provided by Encode contains a directory traversal vulnerability (CWE-22).
Masashi Yamane of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000056http://jvn.jp/en/jp/JVN95981715/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-29159https://nvd.nist.gov/vuln/detail/CVE-2023-29159https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:encode:starlette2024-03-19T18:08+09:002023-05-30T13:34+09:002024-03-19T18:08+09:00ESS REC Agent Server Edition for Linux etc. vulnerable to directory traversal
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000055.html
ESS REC Agent Server Edition for Linux etc. provided by Encourage Technologies Co.,Ltd. contain a directory traversal vulnerability (CWE-23).
Hayato Ushimaru of Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000055https://jvn.jp/en/jp/JVN19243534/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-28382https://nvd.nist.gov/vuln/detail/CVE-2023-28382https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:et-x:ess_rec2024-03-21T17:15+09:002023-05-26T13:58+09:002024-03-21T17:15+09:00Wacom Tablet Driver installer for macOS vulnerable to improper link resolution before file access
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000054.html
Wacom Tablet Driver installer for macOS provided by Wacom contains an improper link resolution before file access vulnerability (CWE-59).
Koh M. Nakagawa reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000054https://jvn.jp/en/jp/JVN90278893/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27529https://nvd.nist.gov/vuln/detail/CVE-2023-27529https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:wacom:wacom_tablet_driver2023-05-25T13:40+09:002023-05-25T13:40+09:002023-05-25T13:40+09:00Cross-site Scripting Vulnerability in Hitachi Ops Center Analyzer
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001926.html
A Cross-site Scripting Vulnerability exists in Hitachi Ops Center Analyzer.JVNDB-2023-001926https://www.cve.org/CVERecord?id=CVE-2023-30469https://nvd.nist.gov/vuln/detail/CVE-2023-30469https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:ops_center_analyzer2024-05-24T17:01+09:002023-05-24T11:40+09:002024-05-24T17:01+09:00Tornado vulnerable to open redirect
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000053.html
Tornado provided by tornadoweb contains a vulnerability that triggers open redirect (CWE-601) under certain non-default configurations.
Masashi Yamane of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000053https://jvn.jp/en/jp/JVN45127776/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-28370https://nvd.nist.gov/vuln/detail/CVE-2023-28370https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:tornadoweb:tornado2024-03-21T17:05+09:002023-05-22T13:30+09:002024-03-21T17:05+09:00Android App "Brother iPrint&Scan" vulnerable to improper access control
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001894.html
Android App "Brother iPrint&Scan" provided by BROTHER INDUSTRIES, LTD. contains an improper access control vulnerability (CWE-284, CVE-2023-28369).
Johan Francsics reported this vulnerability to BROTHER INDUSTRIES, LTD. and coordinated. After the coordination, BROTHER INDUSTRIES, LTD. reported this case to JPCERT/CC to notify users of its solution through JVN.JVNDB-2023-001894https://jvn.jp/en/vu/JVNVU97891206/https://www.cve.org/CVERecord?id=CVE-2023-28369https://nvd.nist.gov/vuln/detail/CVE-2023-28369https://cwe.mitre.org/data/definitions/284.htmlcpe:/a:brother:iprint%26scan2023-05-19T15:40+09:002023-05-19T15:40+09:002023-05-19T15:40+09:00Multiple vulnerabilities in T&D and ESPEC MIC data logger products
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000051.html
Multiple data logger products provided by T&D Corporation and ESPEC MIC CORP. contain multiple vulnerabilities listed below.
* Client-side enforcement of server-side security (CWE-602) - CVE-2023-22654
* Improper authentication (CWE-287) - CVE-2023-27388
* Missing authentication for critical function (CWE-306) - CVE-2023-23545
* Cross-site request forgery (CWE-352) - CVE-2023-27387
CVE-2023-22654
Takaya Noma, Tomoya Inazawa, Yudai Morii, Junnosuke Kushibiki, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-27388
Tomoya Inazawa, Takaya Noma, Yudai Morii, Junnosuke Kushibiki, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-23545
Yudai Morii, Takaya Noma, Tomoya Inazawa, Junnosuke Kushibiki, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-27387
Junnosuke Kushibiki, Takaya Noma, Tomoya Inazawa, Yudai Morii, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000051https://jvn.jp/en/jp/JVN14778242/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-23545https://www.cve.org/CVERecord?id=CVE-2023-22654https://www.cve.org/CVERecord?id=CVE-2023-27387https://www.cve.org/CVERecord?id=CVE-2023-27388https://nvd.nist.gov/vuln/detail/CVE-2023-22654https://nvd.nist.gov/vuln/detail/CVE-2023-23545https://nvd.nist.gov/vuln/detail/CVE-2023-27387https://nvd.nist.gov/vuln/detail/CVE-2023-27388https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:especmic:rs-12n_firmwarecpe:/o:especmic:rt-12n_firmwarecpe:/o:especmic:rt-22bn_firmwarecpe:/o:especmic:teu-12n_firmwarecpe:/o:tandd:rtr-5w_firmwarecpe:/o:tandd:tr-71w_firmwarecpe:/o:tandd:tr-72w_firmwarecpe:/o:tandd:wdr-3_firmwarecpe:/o:tandd:wdr-7_firmwarecpe:/o:tandd:ws-2_firmware2024-05-23T17:03+09:002023-05-19T15:21+09:002024-05-23T17:03+09:00Qrio Smart Lock Q-SL2 vulnerable to authentication bypass by capture-replay
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000026.html
Qrio Smart Lock Q-SL2 provided by Qrio, inc. contains an authentication bypass by capture-replay vulnerability (CWE-294).
Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000026https://jvn.jp/en/jp/JVN48687031/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-25946https://nvd.nist.gov/vuln/detail/CVE-2023-25946https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:qrio:q-sl2_firmware2024-05-23T17:18+09:002023-05-18T14:13+09:002024-05-23T17:18+09:00OS command injection vulnerability in Inaba Denki Sangyo Wi-Fi AP UNIT
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001852.html
Wi-Fi AP UNIT provided by Inaba Denki Sangyo Co., Ltd. contains an OS command injection vulnerability (CWE-78).
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-001852https://jvn.jp/en/vu/JVNVU98968780/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-28392https://nvd.nist.gov/vuln/detail/CVE-2023-28392https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:inaba:ac-wapu-300-p_firmwarecpe:/o:inaba:ac-wapu-300_firmwarecpe:/o:inaba:ac-wapum-300-p_firmwarecpe:/o:inaba:ac-wapum-300_firmware2023-05-17T15:09+09:002023-05-17T15:09+09:002023-05-17T15:09+09:00Multiple vulnerabilities in Cybozu Garoon
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000049.html
Cybozu Garoon provided by Cybozu, Inc. contains multiple vulnerabilities listed below.
* [CyVDB-3122] Denial-of-service (DoS) in Message (CWE-400) - CVE-2023-26595
* [CyVDB-3142] Operation restriction bypass vulnerability in Message and Bulletin (CWE-285) - CVE-2023-27304
* [CyVDB-3165] Operation restriction bypass vulnerability in MultiReport (CWE-284) - CVE-2023-27384
CVE-2023-27384
Yuji Tounai reported this vulnerability to Cybozu, Inc. and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN.
CVE-2023-26595, CVE-2023-27304
Cybozu, Inc. reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2023-000049https://jvn.jp/en/jp/JVN41694426/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-26595https://www.cve.org/CVERecord?id=CVE-2023-27304https://www.cve.org/CVERecord?id=CVE-2023-27384https://nvd.nist.gov/vuln/detail/CVE-2023-26595https://nvd.nist.gov/vuln/detail/CVE-2023-27304https://nvd.nist.gov/vuln/detail/CVE-2023-27384https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:cybozu:garoon2024-05-24T15:26+09:002023-05-15T14:29+09:002024-05-24T15:26+09:00Multiple vulnerabilities in WordPress Plugin "MW WP Form" and "Snow Monkey Forms"
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000050.html
WordPress Plugin "MW WP Form" and "Snow Monkey Forms" provided by Monkey Wrench Inc. contain multiple vulnerabilities listed below.
* Directory traversal (CWE-22) - CVE-2023-28408
* Unrestricted upload of file with dangerous type (CWE-434) - CVE-2023-28409
* Directory traversal (CWE-22) - CVE-2023-28413
CVE-2023-28408
Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-28409
Shuya Ota of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-28413
Monkey Wrench Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.JVNDB-2023-000050https://jvn.jp/en/jp/JVN01093915/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-28408https://www.cve.org/CVERecord?id=CVE-2023-28409https://www.cve.org/CVERecord?id=CVE-2023-28413https://nvd.nist.gov/vuln/detail/CVE-2023-28408https://nvd.nist.gov/vuln/detail/CVE-2023-28409https://nvd.nist.gov/vuln/detail/CVE-2023-28413https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:2inc:mw_wp_formcpe:/a:2inc:snow_monkey_forms2024-05-29T16:27+09:002023-05-15T14:29+09:002024-05-29T16:27+09:00Beekeeper Studio vulnerable to code injection
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000047.html
Beekeeper Studio provided by Beekeeper Studio, Inc. contains a code injection vulnerability (CWE-74).
Eiji Mori of Flatt Security Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000047https://jvn.jp/en/jp/JVN11705010/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-28394https://nvd.nist.gov/vuln/detail/CVE-2023-28394https://cwe.mitre.org/data/definitions/74.htmlcpe:/a:beekeeperstudio:beekeeper-studio2024-05-24T16:17+09:002023-05-12T16:42+09:002024-05-24T16:17+09:00Multiple vulnerabilities in MicroEngine Mailform
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000043.html
MicroEngine Mailform provided by MicroEngine Inc. contains multiple vulnerabilities listed below.<ul><li>Unrestricted upload of file with dangerous type (CWE-434) - CVE-2023-27397</li><li>Path traversal (CWE-22) - CVE-2023-27507</li></ul>Yuji Tounai of Mitsui Bussan Secure Directions, Inc. and hibiki moriyama of STNet, Incorporated reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000043http://jvn.jp/en/jp/JVN31701509/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27397https://www.cve.org/CVERecord?id=CVE-2023-27507https://nvd.nist.gov/vuln/detail/CVE-2023-27397https://nvd.nist.gov/vuln/detail/CVE-2023-27507https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:microengine:mailform2024-05-24T17:07+09:002023-05-10T13:57+09:002024-05-24T17:07+09:00Multiple vulnerabilities in SolarView Compact
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001774.html
SolarView Compact provided by CONTEC CO.,LTD. contains multiple vulnerabilities listed below.
* Use of hard-coded credentials (CWE-798) - CVE-2023-27512
* OS command injection in the download page (CWE-78) - CVE-2023-27514
* Buffer overflow in the multiple setting pages (CWE-120) - CVE-2023-27518
* OS command injection in the mail setting page (CWE-78) - CVE-2023-27521
* Improper access control in the system date/time setting page (CWE-284) - CVE-2023-27920
CVE-2023-27512, CVE-2023-27514, CVE-2023-27518, CVE-2023-27521
Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
CVE-2023-27920
CONTEC CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solutions through JVN.JVNDB-2023-001774https://jvn.jp/en/vu/JVNVU92106300/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27512https://www.cve.org/CVERecord?id=CVE-2023-27514https://www.cve.org/CVERecord?id=CVE-2023-27518https://www.cve.org/CVERecord?id=CVE-2023-27521https://www.cve.org/CVERecord?id=CVE-2023-27920https://nvd.nist.gov/vuln/detail/CVE-2023-27512https://nvd.nist.gov/vuln/detail/CVE-2023-27514https://nvd.nist.gov/vuln/detail/CVE-2023-27518https://nvd.nist.gov/vuln/detail/CVE-2023-27521https://nvd.nist.gov/vuln/detail/CVE-2023-27920https://cwe.mitre.org/data/definitions/120.htmlhttps://cwe.mitre.org/data/definitions/284.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/798.htmlcpe:/o:contec:sv-cpt-mc310f_firmwarecpe:/o:contec:sv-cpt-mc310_firmware2024-06-27T13:30+09:002023-05-09T16:09+09:002024-06-27T13:30+09:00WordPress Plugin "VK Blocks" and "VK All in One Expansion Unit" vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000045.html
WordPress Plugin "VK Blocks" and "VK All in One Expansion Unit" provided by Vektor,Inc. contain multiple cross-site scripting vulnerabilities (CWE-79) listed below.<ul><li>Cross-site scripting vulnerability in Tag edit function - CVE-2023-27923</li><li>Cross-site scripting vulnerability in Post function - CVE-2023-27925</li><li>Cross-site scripting vulnerability in Profile setting function - CVE-2023-27926</li><li>Cross-site scripting vulnerability in CTA post function - CVE-2023-28367</li></ul>apple502j reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000045http://jvn.jp/en/jp/JVN95792402/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27923https://www.cve.org/CVERecord?id=CVE-2023-27925https://www.cve.org/CVERecord?id=CVE-2023-27926https://www.cve.org/CVERecord?id=CVE-2023-28367https://nvd.nist.gov/vuln/detail/CVE-2023-27923https://nvd.nist.gov/vuln/detail/CVE-2023-27925https://nvd.nist.gov/vuln/detail/CVE-2023-27926https://nvd.nist.gov/vuln/detail/CVE-2023-28367https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:vektor-inc:vk_all_in_one_expansion_unitcpe:/a:vektor-inc:vk_blockscpe:/a:vektor-inc:vk_blocks_pro2024-05-24T17:05+09:002023-05-09T15:14+09:002024-05-24T17:05+09:00WordPress Plugin "Newsletter" vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000042.html
WordPress Plugin "Newsletter" provided by Stefano Lissa & The Newsletter Team contains a cross-site scripting vulnerability (CWE-79).
Gen Sato of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to the developer and coordinated. JPCERT/CC published respective advisories in order to notify users of this vulnerability.JVNDB-2023-000042http://jvn.jp/en/jp/JVN59341308/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27922https://nvd.nist.gov/vuln/detail/CVE-2023-27922https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:thenewsletterplugin:newsletter2024-06-13T16:14+09:002023-05-09T14:42+09:002024-06-13T16:14+09:00SR-7100VN vulnerable to privilege escalation
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000046.html
SR-7100VN provided by ICOM INCORPORATED contains a privilege escalation vulnerability (CWE-268).
HAMANO Kiyoto of SOUM Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000046http://jvn.jp/en/jp/JVN80476232/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-28390https://nvd.nist.gov/vuln/detail/CVE-2023-28390https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:icom:sr-7100vn%2331_firmwarecpe:/o:icom:sr-7100vn_firmware2024-05-24T16:13+09:002023-05-09T13:58+09:002024-05-24T16:13+09:00LINE WORKS Drive Explorer vulnerable to code injection
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000041.html
LINE WORKS Drive Explorer provided by WORKS MOBILE Japan Corp. contains a code injection vulnerability (CWE-94).
Koh M. Nakagawa reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000041http://jvn.jp/en/jp/JVN01937209/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-25953https://nvd.nist.gov/vuln/detail/CVE-2023-25953https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:worksmobile:drive_explorer2024-05-23T17:03+09:002023-05-08T15:16+09:002024-05-23T17:03+09:00JINS MEME CORE uses a hard-coded cryptographic key
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000044.html
JINS MEME CORE provided by JINS Inc. is a nose pad type sensor attached to a glass frame. JINS MEME CORE uses a hard-coded cryptographic key (CWE-321).
MASAHIRO IIDA of LAC Co.,Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000044http://jvn.jp/en/jp/JVN13306058/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27921https://nvd.nist.gov/vuln/detail/CVE-2023-27921https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:jins:jins_meme_firmware2024-06-13T16:19+09:002023-05-08T15:13+09:002024-06-13T16:19+09:00Heap-based buffer overflow vulnerability in OMRON CX-Drive
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001639.html
CX-Drive provided by OMRON Corporation contains a heap-based buffer overflow vulnerability (CWE-122, CVE-2023-27385).
Michael Heinzl reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-001639http://jvn.jp/en/vu/JVNVU97372625/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27385https://nvd.nist.gov/vuln/detail/CVE-2023-27385https://cwe.mitre.org/data/definitions/122.htmlcpe:/a:omron:cx-drive2024-05-27T18:11+09:002023-04-25T14:31+09:002024-05-27T18:11+09:00WordPress Plugin "Appointment and Event Booking Calendar for WordPress - Amelia" vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000040.html
WordPress Plugin "Appointment and Event Booking Calendar for WordPress - Amelia" provided by TMS contains a cross-site scripting vulnerability (CWE-79).
Gen Sato of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to the developer and coordinated. The developer and JPCERT/CC published respective advisories in order to notify users of this vulnerability.JVNDB-2023-000040http://jvn.jp/en/jp/JVN00971105/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27918https://nvd.nist.gov/vuln/detail/CVE-2023-27918https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:tms-outsource:amelia2024-05-28T16:59+09:002023-04-24T13:41+09:002024-05-28T16:59+09:00Improper restriction of XML external entity references (XXE) in Shinseiyo Sogo Soft
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000035.html
Shinseiyo Sogo Soft provided by The Ministry of Justice improperly restricts XML external entity references (XXE) (CWE-611).
Taku Toyama of NEC Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000035https://jvn.jp/en/jp/JVN73178249/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27527https://nvd.nist.gov/vuln/detail/CVE-2023-27527https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:moj:shinseiyo_sogo_soft2024-05-29T16:58+09:002023-04-19T14:49+09:002024-05-29T16:58+09:00WordPress plugin "LIQUID SPEECH BALLOON" vulnerable to cross-site request forgery
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000039.html
WordPress plugin "LIQUID SPEECH BALLOON" provided by LIQUID DESIGN Ltd. contains a cross-site request forgery vulnerability (CWE-352).
Ryo Sato of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000039https://jvn.jp/en/jp/JVN99657911/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27889https://nvd.nist.gov/vuln/detail/CVE-2023-27889https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:lqd:liquid_speech_balloon2024-05-28T16:56+09:002023-04-19T14:24+09:002024-05-28T16:56+09:00EC-CUBE plugin "NEXT ENGINE Integration Plugin (for EC-CUBE 2.0 series)" vulnerable to authentication bypass
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000038.html
EC-CUBE plugin "NEXT ENGINE Integration Plugin (for EC-CUBE 2.0 series)" provided by NE Inc. contains an authentication bypass vulnerability (CWE-287).
TSUKADA Nobuhisa of Seasoft reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000038https://jvn.jp/en/jp/JVN50862842/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27919https://nvd.nist.gov/vuln/detail/CVE-2023-27919https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:next-engine:next_engine_integration2024-05-30T15:11+09:002023-04-19T14:06+09:002024-05-30T15:11+09:00Security Issues in FINS protocol
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001534.html
FINS (Factory Interface Network Service) is a message communication protocol, which is designed to be used in closed FA (Factory Automation) networks, and is used in FA networks composed of Omron products. FINS commands enable to read/write information, conduct various operations and set the configuration on FINS-compliant devices. The supported FINS commands vary depending on the products.
* I/O memory area read/write
* Parameter area read/write
* Program area read/write
* Manage operation mode
* System configuration read
* CPU unit status read
* Time information access
* Message read/delete
* Manage access privileges
* Read fault history report, etc.
* File operation
* Forced set/reset
FINS message consists of "FINS header", "FINS command code" and "parameter". When receiving a FINS command message, the entity conducts the operation corresponding to the "FINS command code", and sends the result as a response message to the destinations listed in "FINS header" of the command message. FINS protocol is designed with the assumptions that the network is closed inside the device, the production lines, or within the factory, and does not provide any encryption, data verification, nor authentication functions. Recent security researches show multiple issues on FINS protocol, under the conditions which FINS protocol does not consider, e.g., a FINS network is connected to other outside networks, FINS network can be physically accessed, etc. The following issues on FINS protocol have been reported:
1. Plaintext communication
Encrypted communication is not defined in FINS protocol. FINS messages are transmitted unencrypted and the contents can be seen easily when intercepted. Also alterations of FINS messages cannot be detected.
* Clear-text Transmission of Sensitive Information (CWE-319)
* Insufficient Verification of Data Authenticity (CWE-345)
2. No authentication required
Authentication is not defined in FINS protocol. Attacks from malicious devices cannot be detected.
* Authentication Bypass by Spoofing (CWE-290)
* Authentication Bypass by Capture-replay (CWE-294)
* Missing Authentication for Critical Function (CWE-306)
* Insufficient Verification of Data Authenticity (CWE-345)
* Uncontrolled Resource Consumption (CWE-400)
* Unrestricted Externally Accessible Lock(CWE-412)
* Improper Control of Interaction Frequency (CWE-799)
This document is written by Omron and JPCERT/CC.JVNDB-2023-001534https://jvn.jp/en/ta/JVNTA91513661/https://www.cve.org/CVERecord?id=CVE-2023-27396https://nvd.nist.gov/vuln/detail/CVE-2023-27396https://www.cisa.gov/news-events/ics-advisories/icsa-20-063-03https://www.cisa.gov/news-events/ics-advisories/icsa-19-346-02https://www.cisa.gov/news-events/ics-advisories/icsa-22-179-02https://cwe.mitre.org/data/definitions/290.htmlhttps://cwe.mitre.org/data/definitions/294.htmlhttps://cwe.mitre.org/data/definitions/306.htmlhttps://cwe.mitre.org/data/definitions/319.htmlhttps://cwe.mitre.org/data/definitions/345.htmlhttps://cwe.mitre.org/data/definitions/400.htmlhttps://cwe.mitre.org/data/definitions/412.htmlhttps://cwe.mitre.org/data/definitions/799.htmlcpe:/o:omron:sysmac_cj_series_cpu_unitcpe:/o:omron:sysmac_cp_series_cpu_unitcpe:/o:omron:sysmac_cs_series_cpu_unitcpe:/o:omron:sysmac_nj_series_cpu_unitcpe:/o:omron:sysmac_nx102_series_cpu_unitcpe:/o:omron:sysmac_nx1p_series_cpu_unitcpe:/o:omron:sysmac_nx7_database_connection_cpu_unit2024-05-23T17:35+09:002023-04-18T13:58+09:002024-05-23T17:35+09:00Joruri Gw vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000037.html
Joruri Gw provided by SiteBridge Inc. is groupware. Message Memo function of Joruri Gw contains a cross-site scripting vulnerability (CWE-79).
Tsutomu Aramaki of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000037https://jvn.jp/en/jp/JVN87559956/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27888https://nvd.nist.gov/vuln/detail/CVE-2023-27888https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:sitebridge:joruri_gw2024-05-30T16:19+09:002023-04-17T14:19+09:002024-05-30T16:19+09:00API server of TONE Family vulnerable to authentication bypass using an alternate path
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000036.html
API server of TONE Family provided by DREAM TRAIN INTERNET INC. contains an authentication bypass vulnerability using an alternate path (CWE-288).
Kodai Karakawa reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000036https://jvn.jp/en/jp/JVN14492006/index.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:dream_train_internet_tone_family2023-04-17T14:04+09:002023-04-17T14:04+09:002023-04-17T14:04+09:00JB Inquiry form vulnerable to exposure of private personal information to an unauthorized actor
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000034.html
JB Inquiry form provided by Jubei Inc. contains an exposure of private personal information to an unauthorized actor vulnerability (CWE-359).
Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000034https://jvn.jp/en/jp/JVN36340790/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27510https://nvd.nist.gov/vuln/detail/CVE-2023-27510https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:jubei:jb_inquiry_formcpe:/a:jubei:jb_inquiry_formcpe:/a:jubei:jb_inquiry_formcpe:/a:jubei:jb_inquiry_form2024-05-29T16:44+09:002023-04-14T15:48+09:002024-05-29T16:44+09:00Trend Micro Security may insecurely load Dynamic Link Libraries
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000033.html
Trend Micro Security provided by Trend Micro Incorporated contains an insecure DLL loading issue (CWE-427).
While the affected version of Trend Micro Security is installed and a malicious DLL is placed in a directory where some application executable resides, invoking the application executable may result in Trend Micro Security loading the malicious DLL.
Rintaro Fujita of Nippon Telegraph and Telephone Corporation, Hiroki Hada of NTT Security (Japan) KK and Hiroki Mashiko of NTT DATA Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000033https://jvn.jp/en/jp/JVN76257155/index.htmlhttps://jvn.jp/en/ta/JVNTA91240916/https://www.cve.org/CVERecord?id=CVE-2023-28929https://nvd.nist.gov/vuln/detail/CVE-2023-28929https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:trendmicro:security2024-04-26T17:48+09:002023-04-14T15:44+09:002024-04-26T17:48+09:00Multiple mobile printing apps for Android vulnerable to improper intent handling
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001493.html
Multiple mobile printing apps for Android are vulnerable to improper intent handling (CWE-668).
Johan Francsics reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.
JVNDB-2023-001493https://jvn.jp/en/vu/JVNVU98434809/https://www.cve.org/CVERecord?id=CVE-2023-25954https://nvd.nist.gov/vuln/detail/CVE-2023-25954https://cwe.mitre.org/data/definitions/668.htmlcpe:/a:misc:kyocera_document_solutions_android_kyocera_mobile_printcpe:/a:olivetti:mobile_printcpe:/a:triumph-adler:mobile_print2024-05-30T15:48+09:002023-04-13T11:09+09:002024-05-30T15:48+09:00Vulnerability in JP1/VERITAS
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001492.html
A vulnerability (VTS23-003) exists in JP1/VERITAS.
JVNDB-2023-001492https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:jp1_veritas_netbackupcpe:/a:veritas:netbackup2023-04-12T15:01+09:002023-04-12T15:01+09:002023-04-12T15:01+09:00Yokogawa Electric CENTUM series vulnerable to cleartext storage of sensitive information
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001411.html
CENTUM series provided by Yokogawa Electric Corporation are vulnerable to cleartext storage of sensitive information (CWE-312, CVE-2023-26593).
Yokogawa Electric Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.JVNDB-2023-001411https://jvn.jp/en/vu/JVNVU98775218/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-26593https://nvd.nist.gov/vuln/detail/CVE-2023-26593https://cwe.mitre.org/data/definitions/312.htmlcpe:/a:yokogawa:b%2fm9000cscpe:/a:yokogawa:b%2fm9000_vpcpe:/a:yokogawa:centum_cs_1000cpe:/a:yokogawa:centum_cs_3000cpe:/a:yokogawa:centum_vp2024-05-29T18:23+09:002023-04-06T14:59+09:002024-05-29T18:23+09:00Multiple vulnerabilities in JustSystems products
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000031.html
Multiple products provided by JustSystems Corporation contain multiple vulnerabilities listed below.
<ul><li>Use After Free (CWE-416) - CVE-2022-43664</li>
<li>Heap-based Buffer Overflow (CWE-122) - CVE-2022-45115</li>
<li>Free of Memory not on the Heap (CWE-590) - CVE-2023-22291</li>
<li>Heap-based Buffer Overflow (CWE-122) - CVE-2023-22660</li></ul>
Cisco Talos Security Intelligence & Research Group reported these vulnerabilities to JustSystems Corporation and coordinated. JustSystems Corporation and JPCERT/CC published respective advisories in order to notify users of the solutions through JVN.JVNDB-2023-000031http://jvn.jp/en/jp/JVN79149117/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-43664https://www.cve.org/CVERecord?id=CVE-2022-45115https://www.cve.org/CVERecord?id=CVE-2023-22291https://www.cve.org/CVERecord?id=CVE-2023-22660https://nvd.nist.gov/vuln/detail/CVE-2022-43664https://nvd.nist.gov/vuln/detail/CVE-2022-45115https://nvd.nist.gov/vuln/detail/CVE-2023-22291https://nvd.nist.gov/vuln/detail/CVE-2023-22660https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:justsystems:hanakocpe:/a:justsystems:homepage_builder_21cpe:/a:justsystems:ichitarocpe:/a:justsystems:just_governmentcpe:/a:justsystems:just_officecpe:/a:justsystems:just_policecpe:/a:justsystems:label_mightycpe:/a:justsystems:rakuraku_hagaki2024-05-29T17:32+09:002023-04-04T15:22+09:002024-05-29T17:32+09:00Improper restriction of XML external entity references (XXE) in National land numerical information data conversion tool
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000032.html
National land numerical information data conversion tool provided by MLIT improperly restricts XML external entity references (XXE) (CWE-611).
Taku Toyama and Kohei Matsumoto of NEC Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000032http://jvn.jp/en/jp/JVN75742861/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-25955https://nvd.nist.gov/vuln/detail/CVE-2023-25955https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:mlit:national_land_numerical_information_data_conversion_tool2024-06-04T15:56+09:002023-04-04T15:22+09:002024-06-04T15:56+09:00JTEKT ELECTRONIC Screen Creator Advance 2 vulnerable to improper restriction of operations within the bounds of a memory buffer
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001402.html
Screen Creator Advance 2 provided by JTEKT ELECTRONICS CORPORATION is vulnerable to improper restriction of operations within the bounds of a memory buffer (CWE-119) due to improper check of its data size when processing a project file.
Michael Heinzl reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-001402https://jvn.jp/en/vu/JVNVU99710864/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-25755https://nvd.nist.gov/vuln/detail/CVE-2023-25755https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:jtekt:screen_creator_advance_22024-06-04T17:15+09:002023-04-03T16:24+09:002024-06-04T17:15+09:00CONPROSYS HMI System(CHS) vulnerable to SQL injection
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001400.html
CONPROSYS HMI System(CHS) provided by Contec Co., Ltd. contains an SQL injection vulnerability (CWE-89, CVE-2023-1658).
Tenable Network Security reported this vulnerability to the developer.
JPCERT/CC coordinated with the reporter and the developer.JVNDB-2023-001400https://jvn.jp/en/vu/JVNVU92145493/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-1658https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:contec:conprosys_hmi_system2023-04-03T16:19+09:002023-04-03T16:19+09:002023-04-03T16:19+09:00Multiple vulnerabilities in Seiko Solutions SkyBridge MB-A100/A110/A200/A130 SkySpider MB-R210
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000029.html
SkyBridge MB-A100/A110/A200/A130 SkySpider MB-R210 provided by Seiko Solutions Inc. contain multiple vulnerabilities listed below.
<ul>
<li>Exposure of sensitive information to an unauthorized actor (CWE-200) - CVE-2016-2183
<li>Command injection (CWE-77) - CVE-2022-36556
<li>Unrestricted upload of file with dangerous type (CWE-434) - CVE-2022-36557
<li>Use of hard-coded credentials (CWE-798) - CVE-2022-36558
<li>Command injection (CWE-77) - CVE-2022-36559
<li>Use of hard-coded credentials (CWE-798) - CVE-2022-36560
<li>Improper privilege management (CWE-269) - CVE-2023-22361
<li>Missing authentication for critical function (CWE-306) - CVE-2023-22441
<li>Improper access control (CWE-284) - CVE-2023-23578
<li>Improper following of a certificate's chain of trust (CWE-296) - CVE-2023-23901
<li>Missing authentication for critical function (CWE-306) - CVE-2023-23906
<li>Cleartext storage of sensitive information (CWE-312) - CVE-2023-24586
<li>Cleartext transmission of sensitive information (CWE-319) - CVE-2023-25070
<li>Use of weak credentials (CWE-1391) - CVE-2023-25072
<li>Use of weak credentials (CWE-1391) - CVE-2023-25184
</ul>
The developer states that attacks exploiting CVE-2022-36556 have been observed.
CVE-2023-22441
MASAHIRO IIDA of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2016-2183, CVE-2022-36556, CVE-2022-36557, CVE-2022-36558, CVE-2022-36559, CVE-2022-36560, CVE-2023-22361, CVE-2023-23578, CVE-2023-23901, CVE-2023-23906, CVE-2023-24586, CVE-2023-25070, CVE-2023-25072, CVE-2023-25184
Thomas J. Knudsen and Samy Younsi of NeroTeam Security Labs reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
JVNDB-2023-000029http://jvn.jp/en/jp/JVN40604023/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22361https://www.cve.org/CVERecord?id=CVE-2023-22441https://www.cve.org/CVERecord?id=CVE-2023-23578https://www.cve.org/CVERecord?id=CVE-2023-23901https://www.cve.org/CVERecord?id=CVE-2023-23906https://www.cve.org/CVERecord?id=CVE-2023-24586https://www.cve.org/CVERecord?id=CVE-2023-25070https://www.cve.org/CVERecord?id=CVE-2023-25072https://www.cve.org/CVERecord?id=CVE-2023-25184https://www.cve.org/CVERecord?id=CVE-2016-2183https://www.cve.org/CVERecord?id=CVE-2022-36556https://www.cve.org/CVERecord?id=CVE-2022-36557https://www.cve.org/CVERecord?id=CVE-2022-36558https://www.cve.org/CVERecord?id=CVE-2022-36559https://www.cve.org/CVERecord?id=CVE-2022-36560https://nvd.nist.gov/vuln/detail/CVE-2016-2183https://nvd.nist.gov/vuln/detail/CVE-2022-36556https://nvd.nist.gov/vuln/detail/CVE-2022-36557https://nvd.nist.gov/vuln/detail/CVE-2022-36558https://nvd.nist.gov/vuln/detail/CVE-2022-36559https://nvd.nist.gov/vuln/detail/CVE-2022-36560https://nvd.nist.gov/vuln/detail/CVE-2023-22361https://nvd.nist.gov/vuln/detail/CVE-2023-22441https://nvd.nist.gov/vuln/detail/CVE-2023-23578https://nvd.nist.gov/vuln/detail/CVE-2023-23901https://nvd.nist.gov/vuln/detail/CVE-2023-23906https://nvd.nist.gov/vuln/detail/CVE-2023-24586https://nvd.nist.gov/vuln/detail/CVE-2023-25070https://nvd.nist.gov/vuln/detail/CVE-2023-25072https://nvd.nist.gov/vuln/detail/CVE-2023-25184https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:seiko-sol:skybridge_basic_mb-a130_firmwarecpe:/o:seiko-sol:skybridge_mb-a100_firmwarecpe:/o:seiko-sol:skybridge_mb-a110_firmwarecpe:/o:seiko-sol:skybridge_mb-a200_firmwarecpe:/o:seiko-sol:skyspider_mb-r210_firmware2024-05-27T17:08+09:002023-03-31T15:54+09:002024-05-27T17:08+09:00HAProxy vulnerable to HTTP request/response smuggling
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000030.html
HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name, and when deployed in front of a server that incorrectly process this malformed header, it may be used to conduct an HTTP request/response smuggling attack (CWE-444).
Yuki Mogi of FFRI Security, Inc. reported this vulnerability to the developer and coordinated. The developer and JPCERT/CC published this advisory in order to notify users of this vulnerability.JVNDB-2023-000030http://jvn.jp/en/jp/JVN38170084/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-25950https://nvd.nist.gov/vuln/detail/CVE-2023-25950https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:haproxy:haproxy2024-06-04T16:17+09:002023-03-31T15:54+09:002024-06-04T16:17+09:00baserCMS vulnerable to arbitrary file uploads
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000028.html
baserCMS provided by baserCMS Users Community allows an authenticated user to upload arbitrary files (CWE-434).
Taisei Inoue of GMO Cybersecurity by Ierae, Inc. and Yusuke Akagi of Mitsui Bussan Secure Directions, Inc., Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000028http://jvn.jp/en/jp/JVN61105618/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-25655https://nvd.nist.gov/vuln/detail/CVE-2023-25655https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:basercms:basercms2024-06-06T17:31+09:002023-03-27T13:39+09:002024-06-06T17:31+09:00ELECOM WAB-MAT registers its windows service executable with an unquoted file path
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000027.html
WAB-MAT provided by ELECOM CO.,LTD. is Access Point Management Tool for corporate users. WAB-MAT registers its windows service executable with an unquoted file path (CWE-428).
Tomohisa Hasegawa of Canon IT Solutions Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000027https://jvn.jp/en/jp/JVN35246979/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22282https://nvd.nist.gov/vuln/detail/CVE-2023-22282https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:elecom:wab-mat2024-06-03T17:36+09:002023-03-24T14:35+09:002024-06-03T17:36+09:00Multiple vulnerabilities in Contec CONPROSYS IoT Gateway products
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001320.html
CONPROSYS IoT Gateway products provided by Contec CO.,LTD. contain multiple vulnerabilities listed below.
* OS Command Injection (CWE-78) - CVE-2023-27917
Network Maintenance page validates input values improperly, resulting in OS command injection.
* Inadequate Encryption Strength (CWE-326) - CVE-2023-27389
Firmware update file contains a firmware image encrypted, which can be decrypted by examining the bundled install script and a little more work.
* Improper Access Control (CWE-284) - CVE-2023-23575
Network Maintenance page should be available only to administrative users, but the device fails to restrict access.JVNDB-2023-001320http://jvn.jp/en/vu/JVNVU96198617/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27917https://www.cve.org/CVERecord?id=CVE-2023-27389https://www.cve.org/CVERecord?id=CVE-2023-23575https://nvd.nist.gov/vuln/detail/CVE-2023-23575https://nvd.nist.gov/vuln/detail/CVE-2023-27389https://nvd.nist.gov/vuln/detail/CVE-2023-27917https://cwe.mitre.org/data/definitions/284.htmlhttps://cwe.mitre.org/data/definitions/326.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:contec:cps-mc341-a1-111_firmwarecpe:/o:contec:cps-mc341-adsc1-111_firmwarecpe:/o:contec:cps-mc341-adsc1-931_firmwarecpe:/o:contec:cps-mc341-adsc2-111_firmwarecpe:/o:contec:cps-mc341-ds1-111_firmwarecpe:/o:contec:cps-mc341-ds11-111_firmwarecpe:/o:contec:cps-mc341-ds2-911_firmwarecpe:/o:contec:cps-mc341g-adsc1-110_firmwarcpe:/o:contec:cps-mc341q-adsc1-111_firmwarecpe:/o:contec:cps-mcs341-ds1-111_firmwarecpe:/o:contec:cps-mcs341-ds1-131_firmwarecpe:/o:contec:cps-mcs341g-ds1-130_firmwarecpe:/o:contec:cps-mcs341g5-ds1-130_firmwarecpe:/o:contec:cps-mcs341q-ds1-131_firmwarecpe:/o:contec:cps-mg341-adsc1-111_firmwarecpe:/o:contec:cps-mg341-adsc1-931_firmwarecpe:/o:contec:cps-mg341g-adsc1-111_firmwarecpe:/o:contec:cps-mg341g-adsc1-930_firmwarecpe:/o:contec:cps-mg341g5-adsc1-931_firmware2024-06-04T17:00+09:002023-03-22T13:41+09:002024-06-04T17:00+09:00TP-Link T2600G-28SQ uses vulnerable SSH host keys
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000025.html
TP-Link layer-2 switch T2600G-28SQ uses vulnerable SSH host keys (CWE-1391).
Kuniyuki Hasegawa of VeriServe Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000025https://jvn.jp/en/jp/JVN62420378/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-28368https://nvd.nist.gov/vuln/detail/CVE-2023-28368https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:tp-link:t2600g-28sq_firmware2024-06-04T16:58+09:002023-03-17T12:27+09:002024-06-04T16:58+09:00Android App "Wolt Delivery: Food and more" uses a hard-coded API key for an external service
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000024.html
Android App "Wolt Delivery: Food and more" provided by Wolt uses a hard-coded API key for an external service (CWE-798).
Naoya Kurosawa of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000024https://jvn.jp/en/jp/JVN64453490/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22429https://nvd.nist.gov/vuln/detail/CVE-2023-22429https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:wolt:wolt_delivery2024-06-03T17:15+09:002023-03-13T12:28+09:002024-06-03T17:15+09:00Multiple vulnerabilities in Buffalo network devices
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001308.html
Multiple network devices provided by BUFFALO INC. contain multiple vulnerabilities listed below.
* Use of hard-coded credentials (CWE-798) - CVE-2023-26588
* Improper access control (CWE-284) - CVE-2023-24544
* Stored cross-site scripting (CWE-79) - CVE-2023-24464JVNDB-2023-001308https://jvn.jp/en/vu/JVNVU96824262/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-26588https://www.cve.org/CVERecord?id=CVE-2022-24544https://www.cve.org/CVERecord?id=CVE-2022-24464https://nvd.nist.gov/vuln/detail/CVE-2023-26588https://nvd.nist.gov/vuln/detail/CVE-2023-24544https://nvd.nist.gov/vuln/detail/CVE-2023-24464https://cwe.mitre.org/data/definitions/284.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/798.htmlcpe:/o:buffalo_inc:bs-gs2008p_firmwarecpe:/o:buffalo_inc:bs-gs2008_firmwarecpe:/o:buffalo_inc:bs-gs2016p_firmwarecpe:/o:buffalo_inc:bs-gs2016_firmwarecpe:/o:buffalo_inc:bs-gs2024p_firmwarecpe:/o:buffalo_inc:bs-gs2024_firmwarecpe:/o:buffalo_inc:bs-gs2048_firmwarecpe:/o:buffalo_inc:bs-gsl2016p_firmwarecpe:/o:buffalo_inc:bs-gsl2016_firmwarecpe:/o:buffalo_inc:bs-gsl2024_firmware2024-06-04T16:42+09:002023-03-08T15:12+09:002024-06-04T16:42+09:00Multiple vulnerabilities in SEIKO EPSON printers/network interface Web Config
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000022.html
Web Config for printers/network interface provided by SEIKO EPSON CORPORATION contains multiple vulnerabilities listed below.
<li>Stored cross-site Scripting (CWE-79) - CVE-2023-23572
<li>Cross-Site Request Forgery (CWE-352) - CVE-2023-27520
Takaya Noma, Yudai Morii, Hiroki Yasui, Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000022http://jvn.jp/en/jp/JVN82424996/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-27520https://www.cve.org/CVERecord?id=CVE-2023-23572https://nvd.nist.gov/vuln/detail/CVE-2023-23572https://nvd.nist.gov/vuln/detail/CVE-2023-27520https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:epson:web_config2024-06-03T17:36+09:002023-03-08T15:09+09:002024-06-03T17:36+09:00Multiple vulnerabilities in JTEKT ELECTRONICS Kostac PLC Programming Software
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001304.html
Kostac PLC Programming Software provided by JTEKT ELECTRONICS CORPORATION contains multiple vulnerabilities listed below.
* Out-of-bounds read (CWE-125) - CVE-2023-22419, CVE-2023-22421
* Use-after-free (CWE-416) - CVE-2023-22424
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-001304http://jvn.jp/en/vu/JVNVU94966432/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22419https://www.cve.org/CVERecord?id=CVE-2023-22421https://www.cve.org/CVERecord?id=CVE-2023-22424https://nvd.nist.gov/vuln/detail/CVE-2023-22419https://nvd.nist.gov/vuln/detail/CVE-2023-22421https://nvd.nist.gov/vuln/detail/CVE-2023-22424https://www.cisa.gov/news-events/ics-advisories/icsa-23-096-03https://cwe.mitre.org/data/definitions/125.htmlhttps://cwe.mitre.org/data/definitions/416.htmlcpe:/a:jtekt:kostac_plc2024-06-07T16:39+09:002023-03-06T15:31+09:002024-06-07T16:39+09:00Multiple vulnerabilities in PostgreSQL extension module pg_ivm
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000023.html
pg_ivm provided by IVM Development Group is a PostgreSQL extension module that provides incremental view maintenance functionality of materialized views. pg_ivm contains multiple vulnerabilities listed below.
<ul><li>Exposure of sensitive information to an unauthorized actor (CWE-200) - CVE-2023-22847
An Incrementally Maintainable Materialized View (IMMV) created by pg_ivm may reflect rows with Row-Level Security that the owner of the IMMV should not have access to.</ul>
<ul><li>Uncontrolled search path element (CWE-427) - CVE-2023-23554
When refreshing an IMMV, pg_ivm executes functions without specifying schema names. Under certain conditions, pg_ivm may be tricked to execute unexpected functions from other schemas with the IMMV owner's privilege.</ul>
IVM Development Group reported these vulnerabilities to IPA to notify users of its solution through JVN. JPCERT/CC and IVM Development Group coordinated under the Information Security Early Warning Partnership.JVNDB-2023-000023http://jvn.jp/en/jp/JVN19872280/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22847https://www.cve.org/CVERecord?id=CVE-2023-23554https://nvd.nist.gov/vuln/detail/CVE-2023-22847https://nvd.nist.gov/vuln/detail/CVE-2023-23554https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:sraoss:pg_ivm2024-06-10T16:41+09:002023-03-06T15:22+09:002024-06-10T16:41+09:00Multiple vulnerabilities in Trend Micro Maximum Security
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001291.html
Trend Micro Incorporated has released security updates for Trend Micro Maximum Security.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2023-001291http://jvn.jp/en/vu/JVNVU96882769/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-30687https://www.cve.org/CVERecord?id=CVE-2022-34893https://www.cve.org/CVERecord?id=CVE-2022-35234https://www.cve.org/CVERecord?id=CVE-2022-37347https://www.cve.org/CVERecord?id=CVE-2022-37348https://www.cve.org/CVERecord?id=CVE-2022-48191https://nvd.nist.gov/vuln/detail/CVE-2022-30687https://nvd.nist.gov/vuln/detail/CVE-2022-34893https://nvd.nist.gov/vuln/detail/CVE-2022-35234https://nvd.nist.gov/vuln/detail/CVE-2022-37347https://nvd.nist.gov/vuln/detail/CVE-2022-37348https://nvd.nist.gov/vuln/detail/CVE-2022-48191https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/125.htmlhttps://cwe.mitre.org/data/definitions/367.htmlcpe:/a:trendmicro:maximum_security_2022cpe:/a:trendmicro:security2024-06-13T17:06+09:002023-03-03T11:10+09:002024-06-13T17:06+09:00Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001292.html
Trend Micro Incorporated has released security updates for Apex One and Apex One as a Service.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2023-001292http://jvn.jp/en/vu/JVNVU96221942/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-0587https://www.cve.org/CVERecord?id=CVE-2023-25143https://www.cve.org/CVERecord?id=CVE-2023-25144https://www.cve.org/CVERecord?id=CVE-2023-25145https://www.cve.org/CVERecord?id=CVE-2023-25146https://www.cve.org/CVERecord?id=CVE-2023-25147https://www.cve.org/CVERecord?id=CVE-2023-25148https://nvd.nist.gov/vuln/detail/CVE-2023-0587https://nvd.nist.gov/vuln/detail/CVE-2023-25143https://nvd.nist.gov/vuln/detail/CVE-2023-25144https://nvd.nist.gov/vuln/detail/CVE-2023-25145https://nvd.nist.gov/vuln/detail/CVE-2023-25146https://nvd.nist.gov/vuln/detail/CVE-2023-25147https://nvd.nist.gov/vuln/detail/CVE-2023-25148https://cwe.mitre.org/data/definitions/434.htmlhttps://cwe.mitre.org/data/definitions/427.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:trendmicro:apex_one2024-06-07T16:59+09:002023-03-02T17:33+09:002024-06-07T16:59+09:00File and Directory Permissions Vulnerability in Hitachi Automation Director, Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001269.html
A File and Directory Permissions Vulnerability (CVE-2020-36652) exists in Hitachi Automation Director, Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center.JVNDB-2023-001269https://www.cve.org/CVERecord?id=CVE-2020-36652https://nvd.nist.gov/vuln/detail/CVE-2020-36652https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/276.htmlcpe:/a:hitachi:automation_directorcpe:/a:hitachi:infrastructure_analytics_advisorcpe:/a:hitachi:ops_center_analyzercpe:/a:hitachi:ops_center_automatorcpe:/a:hitachi:ops_center_viewpoint2024-06-11T16:42+09:002023-03-01T16:59+09:002024-06-11T16:42+09:00Multiple vulnerabilities in SS1 and Rakuraku PC Cloud
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000021.html
SS1 is asset management software and Rakuraku PC Cloud is cloud-based asset management service. SS1 and Rakuraku PC Cloud Agent contain multiple vulnerabilities listed below.
<ul><li>Improper Access Control (CWE-284) - CVE-2023-22335</li><li>Path Traversal (CWE-22) - CVE-2023-22336</li><li>Use of Hard-coded Credentials (CWE-798) - CVE-2023-22344</li></ul>
Denis Faiustov, and Ruslan Sayfiev of GMO Cyber Security by IERAE reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000021http://jvn.jp/en/jp/JVN57224029/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22335https://www.cve.org/CVERecord?id=CVE-2023-22336https://www.cve.org/CVERecord?id=CVE-2023-22344https://nvd.nist.gov/vuln/detail/CVE-2023-22335https://nvd.nist.gov/vuln/detail/CVE-2023-22336https://nvd.nist.gov/vuln/detail/CVE-2023-22344https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:dos-osaka:rakuraku_pc_cloud_agentcpe:/a:dos-osaka:ss12024-06-06T18:02+09:002023-03-01T15:57+09:002024-06-06T18:02+09:00Multiple cross-site scripting vulnerabilities in EC-CUBE
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000019.html
EC-CUBE provided by EC-CUBE CO.,LTD. contains multiple cross-site scripting vulnerabilities listed below.
* Cross-site scripting vulnerability in Contents Management (CWE-79) - CVE-2023-22438
* Cross-site scripting vulnerability in Authentication Key Settings (CWE-79) - CVE-2023-25077
* Cross-site scripting vulnerability in Product List Screen and Product Detail Screen (CWE-79) - CVE-2023-22838
CVE-2023-22438
Gaku Mochizuki, Taiga Shirakura of Mitsui Bussan Secure Directions, Inc. and Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-25077
Noriaki Iwasaki of Cyber Defense Institute, Inc. reported this vulnerability to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. Inc. reported it to JPCERT/CC to notify users of its solution through JVN.
CVE-2023-22838
Rei TAKAHASHI of Hashiura Lab., Dept. of Data Science, Nippon Institute of Technology reported this vulnerability to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. reported it to JPCERT/CC to notify users of its solution through JVN.JVNDB-2023-000019http://jvn.jp/en/jp/JVN04785663/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22438https://www.cve.org/CVERecord?id=CVE-2023-25077https://www.cve.org/CVERecord?id=CVE-2023-22838https://nvd.nist.gov/vuln/detail/CVE-2023-22438https://nvd.nist.gov/vuln/detail/CVE-2023-22838https://nvd.nist.gov/vuln/detail/CVE-2023-25077https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ec-cube:ec-cube2024-06-10T17:28+09:002023-02-28T16:38+09:002024-06-10T17:28+09:00web2py development tool vulnerable to open redirect
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000020.html
The admin development tool included in the web2py source code contains an open redirect vulnerability (CWE-601).
According to the developer, they do not recommend using the tool in operational environment or disclosing it on the Internet.
Takuto Yoshikai of Aeye Security Lab reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000020http://jvn.jp/en/jp/JVN78253670/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22432https://nvd.nist.gov/vuln/detail/CVE-2023-22432https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:web2py:web2py2024-06-07T16:31+09:002023-02-28T15:00+09:002024-06-07T16:31+09:00Multiple cross-site scripting vulnerabilities in SHIRASAGI
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000018.html
SHIRASAGI provided by SHIRASAGI Project contains multiple vulnerabilities listed below.
* Stored cross-site scripting vulnerability on Schedule function (CWE-79) - CVE-2023-22425
* Stored cross-site scripting vulnerability on Theme switching function (CWE-79) - CVE-2023-22427
CVE-2023-22425
Ren Toda of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-22427
SHIRASAGI Project reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.JVNDB-2023-000018http://jvn.jp/en/jp/JVN18765463/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22425https://www.cve.org/CVERecord?id=CVE-2023-22427https://nvd.nist.gov/vuln/detail/CVE-2023-22425https://nvd.nist.gov/vuln/detail/CVE-2023-22427https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ss-proj:shirasagi2024-06-10T17:18+09:002023-02-22T15:16+09:002024-06-10T17:18+09:00The installers of ELECOM Camera Assistant and QuickFileDealer may insecurely load Dynamic Link Libraries
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000016.html
The installers of ELECOM Camera Assistant and QuickFileDealer provided by ELECOM CO.,LTD. contain an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).
Tomohisa Hasegawa of Canon IT Solutions Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000016http://jvn.jp/en/jp/JVN60263237/index.htmlhttps://jvn.jp/en/ta/JVNTA91240916/https://www.cve.org/CVERecord?id=CVE-2023-22368https://nvd.nist.gov/vuln/detail/CVE-2023-22368https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:elecom:camera_assistantcpe:/a:elecom:quickfiledealer2023-02-14T17:00+09:002023-02-14T17:00+09:002023-02-14T17:00+09:00Improper restriction of XML external entity reference (XXE) vulnerability in tsClinical Define.xml Generator and tsClinical Metadata Desktop Tools
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000017.html
tsClinical Define.xml Generator and tsClinical Metadata Desktop Tools provided by FUJITSU LIMITED contain an improper restriction of XML external entity reference (XXE) vulnerability (CWE-611).
Toyama Taku and Sakaki Ryutaro of NEC Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000017http://jvn.jp/en/jp/JVN00712821/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22377https://nvd.nist.gov/vuln/detail/CVE-2023-22377https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:fujitsu:tsclinical_define.xml_generatorcpe:/a:fujitsu:tsclinical_metadata_desktop_tools2024-06-12T11:15+09:002023-02-14T17:00+09:002024-06-12T11:15+09:00Multiple vulnerabilities in PLANEX COMMUNICATIONS Network Camera CS-WMV02G
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000015.html
Wired/Wireless LAN Pan/Tilt Network Camera CS-WMV02G provided by PLANEX COMMUNICATIONS INC. contains multiple vulnerabilities listed below.
<ul><li>Stored cross-site scripting (CWE-79) - CVE-2023-22370</li><li>Cross-site request forgery (CWE-352) - CVE-2023-22375</li><li>Reflected cross-site scripting (CWE-79) - CVE-2023-22376</li>
CVE-2023-22370
Yudai Morii, Takaya Noma, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2023-22375, CE-2023-22376
Takayuki Sasaki, Yudai Morii, Takaya Noma and Katsunari Yoshioka of Yokohama National University reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000015http://jvn.jp/en/jp/JVN98612206/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22370https://www.cve.org/CVERecord?id=CVE-2023-22375https://www.cve.org/CVERecord?id=CVE-2023-22376https://nvd.nist.gov/vuln/detail/CVE-2023-22370https://nvd.nist.gov/vuln/detail/CVE-2023-22375https://nvd.nist.gov/vuln/detail/CVE-2023-22376https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:planex:cs-wmv02g_firmware2024-06-12T17:03+09:002023-02-13T14:48+09:002024-06-12T17:03+09:00Zuken Elmic KASAGO uses insufficient random values for TCP Initial Sequence Numbers
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001215.html
Zuken Elmic KASAGO, TCP/IP protocol stack for embedded systems, uses its own random number generator function when generating TCP initial sequence numbers, which leads to use insufficient random values (CWE-330).
Zuken Elmic reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.JVNDB-2023-001215http://jvn.jp/en/vu/JVNVU99551468/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-43501https://nvd.nist.gov/vuln/detail/CVE-2022-43501https://cwe.mitre.org/data/definitions/330.htmlcpe:/a:elwsc:kasago_ipv4cpe:/a:elwsc:kasago_ipv4_lightcpe:/a:elwsc:kasago_ipv6%2fv4_dualcpe:/a:elwsc:kasago_mobile_ipv62024-06-14T15:45+09:002023-02-13T14:18+09:002024-06-14T15:45+09:00NEC PC Settings Tool vulnerable to missing authentication for critical function
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000014.html
PC Settings Tool is an application pre-installed on computers provided by NEC by default. PC Settings Tool Library contained in the application is vulnerable to missing authentication for critical function (CWE-306).
Haruki Yadani of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000014https://jvn.jp/en/jp/JVN60320736/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-25011https://nvd.nist.gov/vuln/detail/CVE-2023-25011https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:nec:pc_settings_tool2024-06-10T18:13+09:002023-02-10T14:43+09:002024-06-10T18:13+09:00Multiple vulnerabilities in JTEKT ELECTRONICS Screen Creator Advance 2
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001212.html
Screen Creator Advance 2 provided by JTEKT ELECTRONICS CORPORATION contains multiple vulnerabilities listed below.
* Out-of-bound write (CWE-787) - CVE-2023-22345
* Out-of-bound read (CWE-125) - CVE-2023-22346, CVE-2023-22347, CVE-2023-22349, CVE-2023-22350, CVE-2023-22353
* Use-after-free (CWE-416) - CVE-2023-22360
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-001212https://jvn.jp/en/vu/JVNVU98917488/https://www.cve.org/CVERecord?id=CVE-2023-22345https://www.cve.org/CVERecord?id=CVE-2023-22346https://www.cve.org/CVERecord?id=CVE-2023-22347https://www.cve.org/CVERecord?id=CVE-2023-22349https://www.cve.org/CVERecord?id=CVE-2023-22350https://www.cve.org/CVERecord?id=CVE-2023-22353https://www.cve.org/CVERecord?id=CVE-2023-22360https://nvd.nist.gov/vuln/detail/CVE-2023-22345https://nvd.nist.gov/vuln/detail/CVE-2023-22346https://nvd.nist.gov/vuln/detail/CVE-2023-22347https://nvd.nist.gov/vuln/detail/CVE-2023-22349https://nvd.nist.gov/vuln/detail/CVE-2023-22350https://nvd.nist.gov/vuln/detail/CVE-2023-22353https://nvd.nist.gov/vuln/detail/CVE-2023-22360https://www.cisa.gov/news-events/ics-advisories/icsa-23-096-02https://cwe.mitre.org/data/definitions/125.htmlhttps://cwe.mitre.org/data/definitions/416.htmlhttps://cwe.mitre.org/data/definitions/787.htmlcpe:/a:jtekt:screen_creator_advance_22024-06-10T17:25+09:002023-02-08T12:46+09:002024-06-10T17:25+09:00Ichiran App vulnerable to improper server certificate verification
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000013.html
Ichiran App developed by Betrend Corporation and provided by ICHIRAN INC. is vulnerable to improper server certificate verification (CWE-295).
Ryo Nihonyanagi of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000013https://jvn.jp/en/jp/JVN11257333/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22367https://nvd.nist.gov/vuln/detail/CVE-2023-22367https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ichiranusa:ichiran2024-06-12T14:25+09:002023-02-06T14:31+09:002024-06-12T14:25+09:00Vulnerability in Driver Distributor where passwords are stored in a recoverable format
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000012.html
Driver Distributor provided by FUJIFILM Business Innovation Corp. contains a vulnerability where passwords are stored in a recoverable format (CWE-257).
Sato Ryo, Yokoi Hiroshi, and Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000012http://jvn.jp/en/jp/JVN22830348/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-43460https://nvd.nist.gov/vuln/detail/CVE-2022-43460https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:fuji_xerox:driver_distributor2024-06-12T11:07+09:002023-01-31T14:14+09:002024-06-12T11:07+09:00SUSHIRO App for Android outputs sensitive information to the log file
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000011.html
SUSHIRO App for Android provided by AKINDO SUSHIRO CO., LTD. outputs sensitive information to the log file (CWE-532).JVNDB-2023-000011http://jvn.jp/en/jp/JVN84642320/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22362https://nvd.nist.gov/vuln/detail/CVE-2023-22362https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:akindo-sushiro:hong_kong_sushirocpe:/a:akindo-sushiro:singapore_sushirocpe:/a:akindo-sushiro:sushirocpe:/a:akindo-sushiro:taiwan_sushirocpe:/a:akindo-sushiro:thailand_sushiro2024-06-11T17:35+09:002023-01-31T14:10+09:002024-06-11T17:35+09:00Improper restriction of XML external entity reference (XXE) vulnerability in OMRON CX-Motion Pro
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001110.html
CX-Motion Pro provided by OMRON Corporation contains an improper restriction of XML external entity reference (XXE) vulnerability (CWE-611).
Michael Heinzl reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-001110https://jvn.jp/en/vu/JVNVU94200979/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22322https://nvd.nist.gov/vuln/detail/CVE-2023-22322https://cwe.mitre.org/data/definitions/611.htmlcpe:/a:omron:cx-motion_pro2023-01-25T14:28+09:002023-01-25T14:28+09:002023-01-25T14:28+09:00EasyMail vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000009.html
EasyMail provided by First Net Japan Inc. contains a stored cross-site scripting vulnerability (CWE-79).
Toyama Taku reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
JVNDB-2023-000009http://jvn.jp/en/jp/JVN05288621/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22333https://nvd.nist.gov/vuln/detail/CVE-2023-22333https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:mubag:easymail2023-01-24T16:00+09:002023-01-24T16:00+09:002023-01-24T16:00+09:00pgAdmin 4 vulnerable to directory traversal
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000010.html
PostgreSQL management tool pgAdmin 4 contains a directory traversal vulnerability (CWE-22).
Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000010http://jvn.jp/en/jp/JVN01398015/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-0241https://nvd.nist.gov/vuln/detail/CVE-2023-0241https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:pgadmin:pgadmin2024-06-05T16:22+09:002023-01-24T16:00+09:002024-06-05T16:22+09:00Contec CONPROSYS HMI System (CHS) vulnerable to multiple SQL injections
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001108.html
CONPROSYS HMI System (CHS) provided by CONTEC CO.,LTD. contains multiple SQL injection vulnerabilities (CWE-89).
Mosin from ELEX FEIGONG RESEARCH INSTITUTE of Elex CyberSecurity, Inc., reported these vulnerabilities to Contec Co., Ltd.
Contec Co., Ltd. reported the issues to JPCERT/CC in order to notify the solutions to the users through JVN.JVNDB-2023-001108https://jvn.jp/en/vu/JVNVU97195023/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22324https://nvd.nist.gov/vuln/detail/CVE-2023-22324https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:contec:conprosys_hmi_system2023-01-24T13:38+09:002023-01-24T13:38+09:002023-01-24T13:38+09:00Pgpool-II vulnerable to information disclosure
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000008.html
Pgpool-II is cluster management tool. Pgpool-II contains an information disclosure vulnerability (CWE-200) in its watchdog function.
Note that, only systems that meet all of the following setting requirements are affected by this vulnerability.
<ul>
<li>Watchdog function is enabled (use_watchdog = on)
<li>"query mode" is used for the alive monitoring of watchdog (wd_lifecheck_method = 'query')
<li>Plain text password is set for wd_lifecheck_password
</ul>
PgPool Global Development Group reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and PgPool Global Development Group coordinated under the Information Security Early Warning Partnership.
JVNDB-2023-000008http://jvn.jp/en/jp/JVN72418815/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22332https://nvd.nist.gov/vuln/detail/CVE-2023-22332https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:pgpool:pgpool-ii2024-06-20T17:54+09:002023-01-23T16:35+09:002024-06-20T17:54+09:00File and Directory Permissions Vulnerability in Hitachi Tuning Manager
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001008.html
A File and Directory Permissions Vulnerability (CVE-2020-36611) exists in Hitachi Tuning Manager.
JVNDB-2023-001008https://www.cve.org/CVERecord?id=CVE-2020-36611https://nvd.nist.gov/vuln/detail/CVE-2020-36611https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:tuning_manager2023-01-18T13:51+09:002023-01-18T13:51+09:002023-01-18T13:51+09:00WordPress plugin "Welcart e-Commerce" vulnerable to directory traversal
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000007.html
WordPress plugin "Welcart e-Commerce" provided by Collne Inc. contains a directory traversal vulnerability (CWE-22).
Masato Ikeda of Mitsui Bussan Secure Directions, Inc. and Takeshi Suzuki reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
JVNDB-2023-000007https://jvn.jp/en/jp/JVN31073333/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-4140https://nvd.nist.gov/vuln/detail/CVE-2022-4140https://wpscan.com/vulnerability/0d649a7e-3334-48f7-abca-fff0856e12c7https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:collne:welcart_e-commerce2023-01-17T14:17+09:002023-01-17T14:17+09:002023-01-17T14:17+09:00Active debug code vulnerability in OMRON CP1L-EL20DR-D
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001005.html
Active debug code (CWE-489) exists in CP1L-EL20DR-D provided by OMRON Corporation, which may lead to a command that is not specified in FINS protocol being executed without authentication.
Georgy Kiguradze of Positive Technologies reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-001005http://jvn.jp/en/vu/JVNVU97575890/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22357https://nvd.nist.gov/vuln/detail/CVE-2023-22357https://cwe.mitre.org/data/definitions/489.htmlcpe:/o:omron:cp1l-el20dr-d_firmware2023-01-12T15:53+09:002023-01-12T15:53+09:002023-01-12T15:53+09:00Access of uninitialized pointer vulnerability in OMRON CX-Motion-MCH
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001003.html
CX-Motion-MCH provided by OMRON Corporation contains an access of uninitialized pointer vulnerability (CWE-824, CVE-2023-22366).
Michael Heinzl reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2023-001003https://jvn.jp/en/vu/JVNVU91744508/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22366https://nvd.nist.gov/vuln/detail/CVE-2023-22366https://cwe.mitre.org/data/definitions/824.htmlcpe:/o:omron:cx-motion-mch_firmware2023-01-12T15:06+09:002023-01-12T15:06+09:002023-01-12T15:06+09:00Multiple vulnerabilities in PIXELA PIX-RT100
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000006.html
PIX-RT100 provided by PIXELA CORPORATION contains multiple vulnerabilities listed below.
<ul>
<li>OS command injection (CWE-78) - CVE-2023-22304
<li>Backdoor access issue (CWE-912) - CVE-2023-22316
</ul>
MASAHIRO IIDA of LAC Co.,Ltd. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000006https://jvn.jp/en/jp/JVN57296685/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22304https://www.cve.org/CVERecord?id=CVE-2023-22316https://nvd.nist.gov/vuln/detail/CVE-2023-22304https://nvd.nist.gov/vuln/detail/CVE-2023-22316https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:pixela:pix-rt100_firmware2023-01-12T14:50+09:002023-01-12T14:50+09:002023-01-12T14:50+09:00OpenAM Web Policy Agent (OpenAM Consortium Edition) vulnerable to path traversal
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001002.html
OpenAM Web Policy Agent (OpenAM Consortium Edition) provided by OpenAM Consortium parses URLs improperly, leading to a path traversal vulnerability (CWE-22).
Furthermore, a crafted URL may be evaluated incorrectly.
OpenAM Consortium reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
JPCERT/CC and OpenAM Consortium coordinated under the Information Security Early Warning Partnership.JVNDB-2023-001002https://jvn.jp/en/vu/JVNVU91740661/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22320https://nvd.nist.gov/vuln/detail/CVE-2023-22320https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:osstech:openam2023-01-11T17:07+09:002023-01-11T17:07+09:002023-01-11T17:07+09:00Multiple vulnerabilities in MAHO-PBX NetDevancer series
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000005.html
There are multiple vulnerabilities in the Management screen of MAHO-PBX NetDevancer series provided by Mahoroba Kobo, Inc.
OS Command Injection (CWE-78) - CVE-2023-22279
OS Command Injection (CWE-78) - CVE-2023-22280
Cross-Site Request Forgery (CWE-352) - CVE-2023-22286
Reflected Cross-site Scripting (CWE-79) - CVE-2023-22296
</ul>
Masamu Asato of GMO Cyber Security by IERAE reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000005https://jvn.jp/en/jp/JVN99957889/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22279https://www.cve.org/CVERecord?id=CVE-2023-22280https://www.cve.org/CVERecord?id=CVE-2023-22286https://www.cve.org/CVERecord?id=CVE-2023-22296https://nvd.nist.gov/vuln/detail/CVE-2023-22279https://nvd.nist.gov/vuln/detail/CVE-2023-22280https://nvd.nist.gov/vuln/detail/CVE-2023-22286https://nvd.nist.gov/vuln/detail/CVE-2023-22296https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:ate-mahoroba:maho-pbx_netdevancer_firmwarecpe:/o:ate-mahoroba:maho-pbx_netdevancer_mobilegate_firmwarecpe:/o:ate-mahoroba:maho-pbx_netdevancer_vsg_firmware2023-01-11T16:11+09:002023-01-11T16:11+09:002023-01-11T16:11+09:00TP-Link SG105PE vulnerable to authentication bypass
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000003.html
TP-Link SG105PE contains an authentication bypass vulnerability (CWE-287).
Baba Takao of BPS Co., Ltd reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000003https://jvn.jp/en/jp/JVN78481846/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22303https://nvd.nist.gov/vuln/detail/CVE-2023-22303https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:tp-link:tl-sg105pe_firmware2023-01-11T15:04+09:002023-01-11T15:04+09:002023-01-11T15:04+09:00pgAdmin 4 vulnerable to open redirect
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000004.html
pgAdmin 4 provided by pgAdmin Project contains an open redirect vulnerability (CWE-601).
SHIGA TAKUMA of BroadBand Security, Inc. and Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000004https://jvn.jp/en/jp/JVN03832974/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22298https://nvd.nist.gov/vuln/detail/CVE-2023-22298https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:pgadmin:pgadmin2023-01-11T14:23+09:002023-01-11T14:23+09:002023-01-11T14:23+09:00Digital Arts m-FILTER vulnerable to improper authentication
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000002.html
m-FILTER provided by Digital Arts Inc. is an emaill security product.
m-FILTER contains an improper authentication vulnerability (CWE-287) when emails are being sent under certain conditions, and unintended emails may be sent by a remote attacker.
Digital Arts Inc. states that attacks exploiting this vulnerability have been observed.
Digital Arts Inc. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Digital Arts Inc. coordinated under the Information Security Early Warning Partnership.JVNDB-2023-000002http://jvn.jp/en/jp/JVN55675303/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2023-22278https://nvd.nist.gov/vuln/detail/CVE-2023-22278https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:daj:m-filter2023-01-06T14:57+09:002023-01-06T14:57+09:002023-01-06T14:57+09:00Multiple code injection vulnerabilities in ruby-git
https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000001.html
ruby-git is a Ruby library that can be used to create, read and operate Git repositories. ruby-git contains multiple code injection vulnerabilities (CWE-94).
Yuki Kokubun of DeNA Co., Ltd. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2023-000001https://jvn.jp/en/jp/JVN16765254/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-46648https://www.cve.org/CVERecord?id=CVE-2022-47318https://nvd.nist.gov/vuln/detail/CVE-2022-46648https://nvd.nist.gov/vuln/detail/CVE-2022-47318https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ruby-git_project:ruby-git2023-01-05T15:51+09:002023-01-05T15:51+09:002023-01-05T15:51+09:00Multiple vulnerabilities in Fuji Electric V-Server
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002838.html
V-Server provided by FUJI ELECTRIC CO., LTD. contains multiple vulnerabilities listed below.
* Stack-based Buffer ovewflow (CWE-121) - CVE-2022-47908
* Out-of-bounds Read (CWE-125) - CVE-2022-41645
* Out-of-bounds Write (CWE-787) - CVE-2022-47317
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2022-002838http://jvn.jp/en/vu/JVNVU92811888/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-47908https://www.cve.org/CVERecord?id=CVE-2022-41645https://www.cve.org/CVERecord?id=CVE-2022-47317https://nvd.nist.gov/vuln/detail/CVE-2022-41645https://nvd.nist.gov/vuln/detail/CVE-2022-47317https://nvd.nist.gov/vuln/detail/CVE-2022-47908https://cwe.mitre.org/data/definitions/121.htmlhttps://cwe.mitre.org/data/definitions/125.htmlhttps://cwe.mitre.org/data/definitions/787.htmlcpe:/a:fujielectric:v-server2023-01-04T14:21+09:002023-01-04T14:21+09:002023-01-04T14:21+09:00Multiple vulnerabilities in Fuji Electric V-SFT and TELLUS
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002837.html
V-SFT and TELLUS provided by FUJI ELECTRIC CO., LTD. contain multiple vulnerabilities listed below.
* Out-of-bounds Read (CWE-125) - CVE-2022-46360
* Out-of-bounds Write (CWE-787) - CVE-2022-43448
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2022-002837http://jvn.jp/en/vu/JVNVU90679513/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-46360https://www.cve.org/CVERecord?id=CVE-2022-43448https://nvd.nist.gov/vuln/detail/CVE-2022-43448https://nvd.nist.gov/vuln/detail/CVE-2022-46360https://cwe.mitre.org/data/definitions/125.htmlhttps://cwe.mitre.org/data/definitions/787.htmlcpe:/a:fujielectric:telluscpe:/a:fujielectric:v-sft2023-01-04T14:16+09:002023-01-04T14:16+09:002023-01-04T14:16+09:00Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002836.html
Trend Micro Incorporated has released security updates for Apex One and Apex One as a Service.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2022-002836https://jvn.jp/en/vu/JVNVU96679793/index.htmlhttp://jvn.jp/en/vu/JVNVU91848962/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-45797https://www.cve.org/CVERecord?id=CVE-2022-45798https://nvd.nist.gov/vuln/detail/CVE-2022-45797https://nvd.nist.gov/vuln/detail/CVE-2022-45798https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:trendmicro:apex_one2024-05-30T17:47+09:002022-12-26T16:21+09:002024-05-30T17:47+09:00Installers generated by Squirrel.Windows may insecurely load Dynamic Link Libraries
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000102.html
Squirrel.Windows is both a toolset and a library that provides installation and update functionality for Windows desktop applications.
Installers generated by Squirrel.Windows contain an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).
Koh You Liang of Sompo Holdings, Inc. reported this vulnerability to the developer first, and to IPA later.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000102https://jvn.jp/en/jp/JVN29902403/index.htmlhttps://jvn.jp/en/ta/JVNTA91240916/https://www.cve.org/CVERecord?id=CVE-2022-46330https://nvd.nist.gov/vuln/detail/CVE-2022-46330https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:squirrel.windows_project:squirrel.windows2022-12-21T14:23+09:002022-12-21T14:23+09:002022-12-21T14:23+09:00+Message App improper handling of Unicode control characters
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000101.html
+Message App displays text unprocessed, even when control characters are contained, and the text is shown based on Unicode control character's specifications.
Therefore, a crafted text may display misleading web links (CWE-451).
Akaki Tsunoda reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000101https://jvn.jp/en/jp/JVN43561812/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-43543https://nvd.nist.gov/vuln/detail/CVE-2022-43543https://unicode.org/reports/tr36/https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:kddi:%2b_messagecpe:/a:nttdocomo:%2b_messagecpe:/a:softbank:%2b_message2022-12-21T14:13+09:002022-12-21T14:13+09:002022-12-21T14:13+09:00Use-after-free vulnerability in Omron CX-Drive
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002783.html
CX-Drive provided by Omron Corporation contains a use-after-free vulnerability (CWE-416).
Michael Heinzl reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2022-002783https://jvn.jp/en/vu/JVNVU92689335/https://www.cve.org/CVERecord?id=CVE-2022-46282https://nvd.nist.gov/vuln/detail/CVE-2022-46282https://cwe.mitre.org/data/definitions/416.htmlcpe:/a:omron:cx-drive2022-12-20T15:32+09:002022-12-20T15:32+09:002022-12-20T15:32+09:00Command injection vulnerability in SHARP Multifunctional Products (MFP)
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002780.html
SHARP Multifunctional Products (MFP) contain a command injection vulnerability (CWE-77, CVE-2022-45796).
The OS layer is affected beyond the web application component, however treating the web application component as separate from the OS layer, 'Scope' is analyzed as 'S:C'.
Sharp reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
JVNDB-2022-002780http://jvn.jp/en/vu/JVNVU96195138/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-45796https://nvd.nist.gov/vuln/detail/CVE-2022-45796https://zuso.ai/Advisory/ZA-2022-01.htmlhttps://cwe.mitre.org/data/definitions/77.htmlcpe:/a:sharp:multiple_product2022-12-20T12:12+09:002022-12-20T12:12+09:002022-12-20T12:12+09:00Corel Roxio Creator LJB starts a program with an unquoted file path
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000099.html
Roxio Creator LJB provided by Corel Corporation starts another program with an unquoted file path (CWE-428).
Haruka Hino of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000099https://jvn.jp/en/jp/JVN13075438/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-46662https://nvd.nist.gov/vuln/detail/CVE-2022-46662https://kb.corel.com/en/129393https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:corel:roxio_creator_ljb2022-12-19T13:47+09:002022-12-19T13:47+09:002022-12-19T13:47+09:00Zenphoto vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000098.html
Zenphoto contains a stored cross-site scripting vulnerability (CWE-79).
Terada Yu of Fujitsu System Integration Laboratories reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000098https://jvn.jp/en/jp/JVN06093462/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-44449https://nvd.nist.gov/vuln/detail/CVE-2022-44449https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:zenphoto:zenphoto2022-12-19T13:39+09:002022-12-19T13:39+09:002022-12-19T13:39+09:00Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS)
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002779.html
CONPROSYS HMI System (CHS) provided by Contec Co., Ltd. contains multiple vulnerabilities listed below.
* OS Command Injection (CWE-78) - CVE-2022-44456
* Use of Default Credentials (CWE-1392) - CVE-2023-22331
* Use of Password Hash Instead of Password for Authentication (CWE-836) - CVE-2023-22334
* Cross-site Scripting (CWE-79) - CVE-2023-22373
* Improper Access Control (CWE-284) - CVE-2023-22339
Floris Hendriks and Jeroen Wijenbergh of Radboud University reported these vulnerabilities to Contec Co., Ltd. and coordinated. Contec Co., Ltd. and JPCERT/CC published respective advisories in order to notify users of its solution.JVNDB-2022-002779https://jvn.jp/en/vu/JVNVU96873821/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-44456https://www.cve.org/CVERecord?id=CVE-2023-22331https://www.cve.org/CVERecord?id=CVE-2023-22334https://www.cve.org/CVERecord?id=CVE-2023-22373https://www.cve.org/CVERecord?id=CVE-2023-22339https://nvd.nist.gov/vuln/detail/CVE-2022-44456https://nvd.nist.gov/vuln/detail/CVE-2023-22331https://nvd.nist.gov/vuln/detail/CVE-2023-22334https://nvd.nist.gov/vuln/detail/CVE-2023-22339https://nvd.nist.gov/vuln/detail/CVE-2023-22373https://www.cisa.gov/uscert/ics/advisories/icsa-22-347-03https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/836.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/284.htmlhttps://cwe.mitre.org/data/definitions/1392.htmlcpe:/a:contec:conprosys_hmi_system2023-01-11T16:55+09:002022-12-16T13:29+09:002023-01-11T16:55+09:00Multiple vulnerabilities in DENSHI NYUSATSU CORE SYSTEM
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000097.html
DENSHI NYUSATSU CORE SYSTEM provided by Japan Construction Information Center contains multiple vulnerabilities listed below.
* Cross-site scripting vulnerability (CWE-79) - CVE-2022-41993
* Cross-site scripting vulnerability (CWE-79) - CVE-2022-46287
* Open redirect vulnerability (CWE-601) - CVE-2022-46288JVNDB-2022-000097https://jvn.jp/en/jp/JVN96321933/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-41993https://www.cve.org/CVERecord?id=CVE-2022-46287https://www.cve.org/CVERecord?id=CVE-2022-46288https://nvd.nist.gov/vuln/detail/CVE-2022-41993https://nvd.nist.gov/vuln/detail/CVE-2022-46287https://nvd.nist.gov/vuln/detail/CVE-2022-46288https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:jacic:electronic_bidding_core_system2024-05-29T17:40+09:002022-12-15T15:18+09:002024-05-29T17:40+09:00Redmine vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000096.html
Redmine contains a cross-site scripting vulnerability (CWE-79) caused by improper Textile processing.
Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000096https://jvn.jp/en/jp/JVN60211811/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-44637https://nvd.nist.gov/vuln/detail/CVE-2022-44637https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:redmine:redmine2024-06-03T16:47+09:002022-12-13T14:05+09:002024-06-03T16:47+09:00Multiple vulnerabilities in Buffalo network devices
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002775.html
Multiple network devices provided by BUFFALO INC. contain multiple vulnerabilities listed below.
* OS Command Injection (CWE-78) - CVE-2022-43466
* OS Command Injection (CWE-78) - CVE-2022-43443
* Hidden Functionality (CWE-912) - CVE-2022-43486
Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2022-002775http://jvn.jp/en/vu/JVNVU97099584/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-43466https://www.cve.org/CVERecord?id=CVE-2022-43443https://www.cve.org/CVERecord?id=CVE-2022-43486https://nvd.nist.gov/vuln/detail/CVE-2022-43443https://nvd.nist.gov/vuln/detail/CVE-2022-43466https://nvd.nist.gov/vuln/detail/CVE-2022-43486https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/912.htmlcpe:/o:buffalo_inc:wcr-1166ds_firmwarecpe:/o:buffalo_inc:wcr-1166ds_firmwarecpe:/o:buffalo_inc:wex-1800ax4ea_firmwarecpe:/o:buffalo_inc:wex-1800ax4_firmwarecpe:/o:buffalo_inc:wsr-1166dhp2_firmwarecpe:/o:buffalo_inc:wsr-1166dhp_firmwarecpe:/o:buffalo_inc:wsr-2533dhp2_firmwarecpe:/o:buffalo_inc:wsr-2533dhp3-bk_firmwarecpe:/o:buffalo_inc:wsr-2533dhpl2-bk_firmwarecpe:/o:buffalo_inc:wsr-2533dhplb_firmwarecpe:/o:buffalo_inc:wsr-2533dhpls_firmwarecpe:/o:buffalo_inc:wsr-2533dhpl_firmwarecpe:/o:buffalo_inc:wsr-2533dhp_firmwarecpe:/o:buffalo_inc:wsr-3200ax4b_firmwarecpe:/o:buffalo_inc:wsr-3200ax4s_firmwarecpe:/o:buffalo_inc:wsr-a2533dhp2_firmwarecpe:/o:buffalo_inc:wsr-a2533dhp3_firmwarecpe:/o:buffalo_inc:wxr-11000xe12_firmwarecpe:/o:buffalo_inc:wxr-5700ax7b_firmwarecpe:/o:buffalo_inc:wxr-5700ax7s_firmware2024-02-14T15:45+09:002022-12-12T15:28+09:002024-02-14T15:45+09:00Information Exposure Vulnerability in JP1/Automatic Operation
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002771.html
An information exposure vulnerability (CVE-2022-34881) exists in JP1/Automatic Operation.JVNDB-2022-002771https://www.cve.org/CVERecord?id=CVE-2022-34881https://nvd.nist.gov/vuln/detail/CVE-2022-34881https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:jp1%2fautomatic_operation2022-12-07T17:30+09:002022-12-07T17:30+09:002022-12-07T17:30+09:00Contec SolarView Compact vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002770.html
SolarView Compact provided by Contec Co., Ltd. is PV Measurement System.
SolarView Compact contains a cross-site scripting vulnerability (CWE-79, CVE-2022-44355) in Check Network Communication Page of the product's web server.
As of 2022 December 5, a Proof-of-Concept (PoC) code exploiting this vulnerability has already been made public.JVNDB-2022-002770http://jvn.jp/en/vu/JVNVU93526386/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-44355https://nvd.nist.gov/vuln/detail/CVE-2022-44355https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:contec:solarview_compact_firmware2024-06-04T17:13+09:002022-12-06T15:08+09:002024-06-04T17:13+09:00Multiple vulnerabilities in UNIMO Technology digital video recorders
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002768.html
Multiple digital video recorders provided by UNIMO Technology Co., Ltd contain multiple vulnerabilities listed below.
* Improper Authentication (CWE-287) - CVE-2022-44620
* OS Command Injection (CWE-78) - CVE-2022-44606
* Hidden Functionality (CWE-912) - CVE-2022-43464
The reporter states that attacks exploiting these vulnerabilities have been observed.
Yoshiki Mori, Ushimaru Hayato, Hiromu Kubiura and Masaki Kubo of National Institute of Information and Communications Technology Cybersecurity Research Institute reported these vulnerabilities to the developer and coordinated. After coordination was completed, this case was reported to JPCERT/CC and JPCERT/CC coordinated with the developer for the publication.
JVNDB-2022-002768https://jvn.jp/en/vu/JVNVU94514762/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-44620https://www.cve.org/CVERecord?id=CVE-2022-44606https://www.cve.org/CVERecord?id=CVE-2022-43464https://nvd.nist.gov/vuln/detail/CVE-2022-43464https://nvd.nist.gov/vuln/detail/CVE-2022-44606https://nvd.nist.gov/vuln/detail/CVE-2022-44620https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/912.htmlcpe:/o:unimo:udr-ja1604_firmwarecpe:/o:unimo:udr-ja1608_firmwarecpe:/o:unimo:udr-ja1616_firmware2024-06-03T16:55+09:002022-12-02T14:57+09:002024-06-03T16:55+09:00Multiple vulnerabilities in OMRON CX-Programmer
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002765.html
CX-Programmer provided by Omron Corporation contains multiple vulnerabilities listed below.
* Use-after-free (CWE-416) - CVE-2022-43508, CVE-2023-22277, CVE-2023-22317, CVE-2023-22314
* Out-of-bounds Write (CWE-787) - CVE-2022-43509
* Stack-based Buffer Overflow (CWE-121) - CVE-2022-43667
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
JVNDB-2022-002765https://jvn.jp/en/vu/JVNVU92877622/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-43508https://www.cve.org/CVERecord?id=CVE-2022-43509https://www.cve.org/CVERecord?id=CVE-2022-43667https://www.cve.org/CVERecord?id=CVE-2023-22277https://www.cve.org/CVERecord?id=CVE-2023-22314https://www.cve.org/CVERecord?id=CVE-2023-22317https://nvd.nist.gov/vuln/detail/CVE-2022-43508https://nvd.nist.gov/vuln/detail/CVE-2022-43509https://nvd.nist.gov/vuln/detail/CVE-2022-43667https://nvd.nist.gov/vuln/detail/CVE-2023-22277https://nvd.nist.gov/vuln/detail/CVE-2023-22314https://nvd.nist.gov/vuln/detail/CVE-2023-22317https://www.cisa.gov/uscert/ics/advisories/icsa-22-356-04https://cwe.mitre.org/data/definitions/121.htmlhttps://cwe.mitre.org/data/definitions/416.htmlhttps://cwe.mitre.org/data/definitions/787.htmlcpe:/a:omron:cx-programmer2024-04-05T18:15+09:002022-11-28T15:40+09:002024-04-05T18:15+09:00Cybozu Remote Service vulnerable to Uncontrolled Resource Consumption
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000095.html
Cybozu Remote Service provided by Cybozu, Inc. is vulnerable to uncontrolled resource consumption (CWE-400).
Cybozu, Inc. reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.JVNDB-2022-000095https://jvn.jp/en/jp/JVN87895771/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-44608https://nvd.nist.gov/vuln/detail/CVE-2022-44608https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:cybozu:cybozu_remote_service2024-06-03T16:08+09:002022-11-25T14:15+09:002024-06-03T16:08+09:00Multiple cross-site scripting vulnerabilities in baserCMS
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000094.html
baserCMS provided by baserCMS Users Community contains multiple cross-site scripting vulnerabilities listed below.
* Stored cross-site scripting vulnerability in User management (CWE-79) - CVE-2022-39325
* Stored cross-site scripting vulnerability in Permission Settings (CWE-79) - CVE-2022-41994
* Stored cross-site scripting vulnerability in User group management (CWE-79) - CVE-2022-42486
CVE-2022-39325
YUYA KOTAKE of CARTA HOLDINGS, INC. and Shogo Iyota of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2022-41994, CVE-2022-42486
Shogo Iyota of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000094https://jvn.jp/en/jp/JVN53682526/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-39325https://www.cve.org/CVERecord?id=CVE-2022-41994https://www.cve.org/CVERecord?id=CVE-2022-42486https://nvd.nist.gov/vuln/detail/CVE-2022-39325https://nvd.nist.gov/vuln/detail/CVE-2022-41994https://nvd.nist.gov/vuln/detail/CVE-2022-42486https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:basercms:basercms2024-05-31T18:17+09:002022-11-25T13:42+09:002024-05-31T18:17+09:00TP-Link RE300 V1 tdpServer vulnerable to improper processing of its input
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000093.html
tdpServer of TP-Link RE300 V1 improperly processes its input, possibly resulting to crash (CWE-228).
Tomoya Kitagawa and Toshiki Takatera of Ricerca Security, Inc. reported this vulnerability to the developer and coordinated. After coordination was completed, this case was reported to JPCERT/CC and JPCERT/CC coordinated with the developer for the publication.JVNDB-2022-000093https://jvn.jp/en/jp/JVN29657972/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-41783https://nvd.nist.gov/vuln/detail/CVE-2022-41783https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:tp-link:re300-v1_firmware2024-06-03T16:41+09:002022-11-24T14:46+09:002024-06-03T16:41+09:00Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002761.html
Trend Micro Incorporated has released security updates for Apex One and Apex One as a Service.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2022-002761https://jvn.jp/en/vu/JVNVU90082799http://jvn.jp/en/vu/JVNVU91848962/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-44647https://www.cve.org/CVERecord?id=CVE-2022-44648https://www.cve.org/CVERecord?id=CVE-2022-44649https://www.cve.org/CVERecord?id=CVE-2022-44650https://www.cve.org/CVERecord?id=CVE-2022-44651https://www.cve.org/CVERecord?id=CVE-2022-44652https://www.cve.org/CVERecord?id=CVE-2022-44653https://www.cve.org/CVERecord?id=CVE-2022-44654https://nvd.nist.gov/vuln/detail/CVE-2022-44647https://nvd.nist.gov/vuln/detail/CVE-2022-44648https://nvd.nist.gov/vuln/detail/CVE-2022-44649https://nvd.nist.gov/vuln/detail/CVE-2022-44650https://nvd.nist.gov/vuln/detail/CVE-2022-44651https://nvd.nist.gov/vuln/detail/CVE-2022-44652https://nvd.nist.gov/vuln/detail/CVE-2022-44653https://nvd.nist.gov/vuln/detail/CVE-2022-44654https://cwe.mitre.org/data/definitions/125.htmlhttps://cwe.mitre.org/data/definitions/787.htmlhttps://cwe.mitre.org/data/definitions/367.htmlhttps://cwe.mitre.org/data/definitions/755.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:trendmicro:apex_one2024-05-31T17:43+09:002022-11-21T18:25+09:002024-05-31T17:43+09:00Typora fails to properly neutralize JavaScript code.
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000092.html
Typora fails to properly neutralize JavaScript code (CWE-116).
Eiji Mori of Flatt Security Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000092https://jvn.jp/en/jp/JVN26044739/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-43668https://nvd.nist.gov/vuln/detail/CVE-2022-43668https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:typora:typora2024-06-03T15:13+09:002022-11-21T15:31+09:002024-06-03T15:13+09:00WordPress Plugin "WordPress Popular Posts" accepts untrusted external inputs to update certain internal variables
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000091.html
WordPress Plugin "WordPress Popular Posts" provided by Hector Cabrera accepts untrusted external inputs to update certain internal variables (CWE-454).
Tsubasa Iinuma of Origami Systems reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000091https://jvn.jp/en/jp/JVN13927745/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-43468https://nvd.nist.gov/vuln/detail/CVE-2022-43468https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:wordpress_popular_posts_project:wordpress_popular_posts2022-11-18T15:14+09:002022-11-18T15:14+09:002022-11-18T15:14+09:00RICOH Aficio SP 4210N vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000089.html
Aficio SP 4210N provided by RICOH COMPANY, LTD. contains a cross-site scripting vulnerability (CWE-79) in Web Image Monitor.
Yudai Morii, Takaya Noma, Hiroki Yasui, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000089https://jvn.jp/en/jp/JVN24659622/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-37406https://nvd.nist.gov/vuln/detail/CVE-2022-37406https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:ricoh:ipsio_sp_4210_firmware2022-11-17T11:15+09:002022-11-17T11:15+09:002022-11-17T11:15+09:00Multiple vulnerabilities in Movable Type
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000090.html
Movable Type provided by Six Apart Ltd. contains multiple vulnerabilities listed below.
* Improper Validation of Syntactic Correctness of Input (CWE-1286) - CVE-2022-45113
* Cross-site Scripting (CWE-79) - CVE-2022-45122
* Improper Neutralization of Server-Side Includes (SSI) Within a Web Page (CWE-97) - CVE-2022-4366
CVE-2022-45113, CVE-2022-45122
SHIGA TAKUMA of BroadBand Security, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2022-43660
Six Apart Ltd. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
JPCERT/CC and Six Apart Ltd. coordinated under the Information Security Early Warning Partnership.JVNDB-2022-000090https://jvn.jp/en/jp/JVN37014768/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-45113https://www.cve.org/CVERecord?id=CVE-2022-45122https://www.cve.org/CVERecord?id=CVE-2022-43660https://nvd.nist.gov/vuln/detail/CVE-2022-43660https://nvd.nist.gov/vuln/detail/CVE-2022-45113https://nvd.nist.gov/vuln/detail/CVE-2022-45122https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:sixapart:movable_type2024-06-03T15:31+09:002022-11-16T17:07+09:002024-06-03T15:31+09:00TERASOLUNA Global Framework and TERASOLUNA Server Framework for Java (Rich) vulnerable to ClassLoader manipulation
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000088.html
The past versions of TERASOLUNA Global Framework and TERASOLUNA Server Framework for Java (Rich) are vulnerable to a ClassLoader manipulation vulnerability due to using the old version of Spring Framework which contains the vulnerability.
According to the developer, this vulnerability is caused by an improper input validation issue (CWE-20) in the binding mechanism of Spring MVC.
NTT DATA Corporation reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and NTT DATA Corporation coordinated under the Information Security Early Warning Partnership.JVNDB-2022-000088https://jvn.jp/en/jp/JVN54728399/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-43484https://nvd.nist.gov/vuln/detail/CVE-2022-43484https://github.com/spring-projects/spring-framework/issues/15724https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:nttdata:terasoluna_global_frameworkcpe:/a:nttdata:terasoluna_server_framework_for_java_%28rich%292024-06-06T16:11+09:002022-11-14T16:45+09:002024-06-06T16:11+09:00Aiphone Video Multi-Tenant System Entrance Stations vulnerable to information disclosure
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000086.html
Video Multi-Tenant System Entrance Stations provided by AIPHONE CO., LTD. contain an information disclosure vulnerability (CWE-200).
Cameron Palmer of PROMON reported this vulnerability to Aiphone Co., Ltd. and coordinated. Aiphone Co., Ltd. and JPCERT/CC published respective advisories in order to notify users of this vulnerability.JVNDB-2022-000086http://jvn.jp/en/jp/JVN75437943/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-40903https://nvd.nist.gov/vuln/detail/CVE-2022-40903https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:aiphone:gt-db-vn_firmwarecpe:/o:aiphone:gt-dmb-lvn_firmwarecpe:/o:aiphone:gt-dmb-n_firmwarecpe:/o:aiphone:gt-dmb_firmware2024-06-06T17:37+09:002022-11-10T13:40+09:002024-06-06T17:37+09:00Multiple vulnerabilities in OMRON products
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002691.html
Machine automation controller NJ/NX series, Automation software "Sysmac Studio", and programmable terminal (PT) NA series provided by OMRON Corporation contain multiple vulnerabilities in the communication function.
The vulnerabilities are as follows.
* Use of Hard-coded Credentials (CWE-798) - CVE-2022-34151
* Authentication Bypass by Capture-replay (CWE-294) - CVE-2022-33208
* Active Debug Code (CWE-489) - CVE-2022-33971
OMRON Corporation reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2022-002691https://jvn.jp/en/vu/JVNVU97050784/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-34151https://www.cve.org/CVERecord?id=CVE-2022-33208https://www.cve.org/CVERecord?id=CVE-2022-33971https://nvd.nist.gov/vuln/detail/CVE-2022-34151https://nvd.nist.gov/vuln/detail/CVE-2022-33208https://nvd.nist.gov/vuln/detail/CVE-2022-33971https://www.cisa.gov/uscert/ncas/alerts/aa22-103ahttps://cwe.mitre.org/data/definitions/294.htmlhttps://cwe.mitre.org/data/definitions/489.htmlhttps://cwe.mitre.org/data/definitions/798.htmlcpe:/a:omron:automation_software_sysmac_studiocpe:/a:omron:machine_automation_controller_nj_seriescpe:/a:omron:machine_automation_controller_nx_seriescpe:/a:omron:programmable_terminal_na_series2022-11-10T09:46+09:002022-11-10T09:46+09:002022-11-10T09:46+09:00WordPress Plugin "Salon booking system" vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000085.html
WordPress Plugin "Salon booking system" contains a cross-site scripting vulnerability (CWE-79).
Gen Sato of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000085http://jvn.jp/en/jp/JVN59663854/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-43487https://nvd.nist.gov/vuln/detail/CVE-2022-43487https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:salonbookingsystem:salon_booking_system2024-06-05T18:07+09:002022-11-08T15:07+09:002024-06-05T18:07+09:00Multiple vulnerabilities in WordPress
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000087.html
WordPress contains multiple vulnerabilities listed below which are to the WordPress Post by Email Feature.
<ul><li>Stored Cross-site scripting (CWE-79) - CVE-2022-43497</li><li>Stored Cross-site scripting (CWE-79) - CVE-2022-43500</li><li>Improper authentication (CWE-287) - CVE-2022-43504</li></ul>
Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000087http://jvn.jp/en/jp/JVN09409909/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-43497https://www.cve.org/CVERecord?id=CVE-2022-43500https://www.cve.org/CVERecord?id=CVE-2022-43504https://nvd.nist.gov/vuln/detail/CVE-2022-43497https://nvd.nist.gov/vuln/detail/CVE-2022-43500https://nvd.nist.gov/vuln/detail/CVE-2022-43504https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:wordpress:wordpress2024-06-06T16:27+09:002022-11-08T14:59+09:002024-06-06T16:27+09:00Multiple vulnerabilities in the web interfaces of Kyocera Document Solutions MFPs and printers
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000079.html
The web interface "Command Center" of multiple MFPs and printers provided by KYOCERA Document Solutions Inc. contain multiple vulnerabilities listed below.
<ul>
<li><b>Session Information Easily Guessable (CWE-287)</b> - CVE-2022-41798</li>
<li><b>Missing authorization (CWE-425)</b> - CVE-2022-41807</li>
<li><b>Stored cross-site scripting (CWE-79)</b> - CVE-2022-41830</li>
</ul>
Takayuki Sasaki, Takaya Noma and Katsunari Yoshioka of Yokohama National University reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000079https://jvn.jp/en/jp/JVN46345126/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-41798https://www.cve.org/CVERecord?id=CVE-2022-41807https://www.cve.org/CVERecord?id=CVE-2022-41830https://nvd.nist.gov/vuln/detail/CVE-2022-41798https://nvd.nist.gov/vuln/detail/CVE-2022-41807https://nvd.nist.gov/vuln/detail/CVE-2022-41830https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:kyocera_document_solutions_multiple_product2024-06-06T17:01+09:002022-11-01T14:51+09:002024-06-06T17:01+09:00Multiple vulnerabilities in FUJI SOFT network devices
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000084.html
USB dongle +F FS040U and mobile routers +F FS020W/+F FS030W/+F FS040W provided by FUJI SOFT INCORPORATED contain multiple vulnerabilities listed below.
<ul><li>Plaintext Storage of a Password (CWE-256) - CVE-2022-43442<li>Cross-Site Request Forgery (CWE-352) - CVE-2022-43470</ul>
Tomohisa Hasegawa of Canon IT Solutions Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000084http://jvn.jp/en/jp/JVN74285622/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-43442https://www.cve.org/CVERecord?id=CVE-2022-43470https://nvd.nist.gov/vuln/detail/CVE-2022-43442https://nvd.nist.gov/vuln/detail/CVE-2022-43470https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:fsi:fs020w_firmwarecpe:/o:fsi:fs030w_firmwarecpe:/o:fsi:fs040u_firmwarecpe:/o:fsi:fs040w_firmware2024-06-06T16:48+09:002022-10-28T15:12+09:002024-06-06T16:48+09:00Multiple vulnerabilities in SHIRASAGI
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000083.html
SHIRASAGI provided by SHIRASAGI Project contains multiple vulnerabilities listed below.
<ul>
<li>Open Redirect (CWE-601) - CVE-2022-43479
<li>Stored Cross-site Scripting (CWE-79) - CVE-2022-43499</ul>
SHIGA TAKUMA of BroadBand Security, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000083http://jvn.jp/en/jp/JVN86350682/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-43479https://www.cve.org/CVERecord?id=CVE-2022-43499https://nvd.nist.gov/vuln/detail/CVE-2022-43479https://nvd.nist.gov/vuln/detail/CVE-2022-43499https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ss-proj:shirasagicpe:/a:ss-proj:shirasagi2024-06-05T16:06+09:002022-10-25T15:10+09:002024-06-05T16:06+09:00Multiple vulnerabilities in nadesiko3
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000082.html
Nadesiko3 provided by kujirahand contains multiple vulnerabilities listed below.
<ul>
<li>OS command injection vulnerability in processing compression and decompression (CWE-78) - CVE-2022-41642
</li>
<li>Improper check or handling of exceptional conditions in nako3edit (CWE-703) - CVE-2022-41777
</li>
<li>OS command injection vulnerability via "file" parameter in nako3edit (CWE-78) - CVE-2022-42496
</li>
</ul>
Satoki Tsuji reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000082https://jvn.jp/en/jp/JVN56968681/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-41642https://www.cve.org/CVERecord?id=CVE-2022-41777https://www.cve.org/CVERecord?id=CVE-2022-42496https://nvd.nist.gov/vuln/detail/CVE-2022-41642https://nvd.nist.gov/vuln/detail/CVE-2022-41777https://nvd.nist.gov/vuln/detail/CVE-2022-42496https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:kujirahand:nadesiko32024-06-05T17:28+09:002022-10-20T16:58+09:002024-06-05T17:28+09:00Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002544.html
Trend Micro Incorporated has released security updates for Apex One and Apex One as a Service.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2022-002544http://jvn.jp/en/vu/JVNVU97131578/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-41744https://www.cve.org/CVERecord?id=CVE-2022-41745https://www.cve.org/CVERecord?id=CVE-2022-41746https://www.cve.org/CVERecord?id=CVE-2022-41747https://www.cve.org/CVERecord?id=CVE-2022-41748https://www.cve.org/CVERecord?id=CVE-2022-41749https://nvd.nist.gov/vuln/detail/CVE-2022-41744https://nvd.nist.gov/vuln/detail/CVE-2022-41745https://nvd.nist.gov/vuln/detail/CVE-2022-41746https://nvd.nist.gov/vuln/detail/CVE-2022-41747https://nvd.nist.gov/vuln/detail/CVE-2022-41748https://nvd.nist.gov/vuln/detail/CVE-2022-41749https://cwe.mitre.org/data/definitions/367.htmlhttps://cwe.mitre.org/data/definitions/125.htmlhttps://cwe.mitre.org/data/definitions/425.htmlhttps://cwe.mitre.org/data/definitions/295.htmlhttps://cwe.mitre.org/data/definitions/276.htmlhttps://cwe.mitre.org/data/definitions/346.htmlcpe:/a:trendmicro:apex_one2024-06-13T13:58+09:002022-10-20T16:18+09:002024-06-13T13:58+09:00Stack-based buffer overflow vulnerability in Yokogawa Test & Measurement WTViewerE
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002537.html
WTViewerE provided by Yokogawa Test & Measurement Corporation contains a stack-based buffer overflow vulnerability (CWE-121).
Michael Heinzl reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2022-002537http://jvn.jp/en/vu/JVNVU99955870/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-40984https://nvd.nist.gov/vuln/detail/CVE-2022-40984https://cwe.mitre.org/data/definitions/121.htmlcpe:/a:misc:yokogawa_test_wtviewerefreecpe:/a:misc:yokogawa_test_wtviewere_7619412024-06-12T16:54+09:002022-10-19T16:23+09:002024-06-12T16:54+09:00Lemon8 App fails to restrict access permissions
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000081.html
Lemon8 by ByteDance K.K. provides the function to access a requested URL using Custom URL Scheme/DeepLink. The App does not restrict access to the function properly (CWE-939) which may be exploited to direct the App to access any sites.
Ryo Sato of BroadBand Security,Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000081https://jvn.jp/en/jp/JVN10921428/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-41797https://nvd.nist.gov/vuln/detail/CVE-2022-41797https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:bytedance_lemon82024-06-12T16:39+09:002022-10-19T14:08+09:002024-06-12T16:39+09:00Android App "IIJ SmartKey" vulnerable to information disclosure
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000080.html
Android App "IIJ SmartKey" provided by Internet Initiative Japan Inc. contains an information disclosure vulnerability (CWE-200).
Naoaki Iwakiri reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000080https://jvn.jp/en/jp/JVN74534998/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-41986https://nvd.nist.gov/vuln/detail/CVE-2022-41986https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:iij:iij_smartkey2024-06-27T13:40+09:002022-10-14T13:57+09:002024-06-27T13:40+09:00Multiple vulnerabilities in SVMPC1 and SVMPC2
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002451.html
SVMPC1 and SVMPC2 provided by Daikin Holdings Singapore Pte Ltd. contain multiple vulnerabilities listed below.
* Use of hard-coded password (CWE-259) - CVE-2022-41653
* Improper access control (CWE-284) - CVE-2022-38355JVNDB-2022-002451https://jvn.jp/en/vu/JVNVU93424017/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-41653https://www.cve.org/CVERecord?id=CVE-2022-38355https://nvd.nist.gov/vuln/detail/CVE-2022-38355https://nvd.nist.gov/vuln/detail/CVE-2022-41653https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-02https://cwe.mitre.org/data/definitions/259.htmlhttps://cwe.mitre.org/data/definitions/284.htmlcpe:/a:daikinlatam:svmpc1cpe:/a:daikinlatam:svmpc22024-05-30T16:38+09:002022-10-13T17:27+09:002024-05-30T16:38+09:00bingo!CMS vulnerable to authentication bypass
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000078.html
bingo!CMS provided by Shift Tech Inc. contains an authentication bypass vulnerability (CWE-288) in some of the management functions.
Shift Tech Inc. states that attacks exploiting this vulnerability have been observed.
Shift Tech Inc. reported this vulnerability to IPA to notify users of its solution through JVN.
JPCERT/CC and Shift Tech Inc. coordinated under the Information Security Early Warning Partnership.JVNDB-2022-000078http://jvn.jp/en/jp/JVN74592196/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-42458https://nvd.nist.gov/vuln/detail/CVE-2022-42458https://www.ipa.go.jp/security/ciadr/vul/20221011-jvn.htmlhttps://www.jpcert.or.jp/english/at/2022/at220026.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:shift-tech:bingo%21cms2024-05-30T17:57+09:002022-10-11T17:49+09:002024-05-30T17:57+09:00Multiple vulnerabilities in Trend Micro Deep Security and Cloud One - Workload Security agents for Windows
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002448.html
Trend Micro Incorporated has released a security update for Trend Micro Deep Security and Cloud One - Workload Security agents for Windows.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2022-002448https://jvn.jp/en/vu/JVNVU99960963/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-40707https://www.cve.org/CVERecord?id=CVE-2022-40708https://www.cve.org/CVERecord?id=CVE-2022-40709https://www.cve.org/CVERecord?id=CVE-2022-40710https://nvd.nist.gov/vuln/detail/CVE-2022-40707https://nvd.nist.gov/vuln/detail/CVE-2022-40708https://nvd.nist.gov/vuln/detail/CVE-2022-40709https://nvd.nist.gov/vuln/detail/CVE-2022-40710https://cwe.mitre.org/data/definitions/125.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:trendmicro:cloud_one_workload_securitycpe:/a:trendmicro:deep_security_agent2024-06-13T14:30+09:002022-10-11T17:02+09:002024-06-13T14:30+09:00The installer of Sony Content Transfer may insecurely load Dynamic Link Libraries
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000077.html
The installer of Content Transfer (for Windows) provided by Sony Corporation contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).
Tomohisa Hasegawa of Canon IT Solutions Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000077https://jvn.jp/en/jp/JVN40620121/index.htmlhttps://jvn.jp/en/ta/JVNTA91240916/https://www.cve.org/CVERecord?id=CVE-2022-41796https://nvd.nist.gov/vuln/detail/CVE-2022-41796https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:sony:content_transfer2024-06-12T12:12+09:002022-10-11T15:08+09:002024-06-12T12:12+09:00Growi vulnerable to improper access control
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000076.html
GROWI provided by WESEEK, Inc. contains an improper access control vulnerability (CWE-284).
Kenta Yamamoto of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000076http://jvn.jp/en/jp/JVN00845253/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-41799https://nvd.nist.gov/vuln/detail/CVE-2022-41799https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:weseek:growi2024-06-12T12:04+09:002022-10-07T14:30+09:002024-06-12T12:04+09:00IPFire WebUI vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000075.html
The web user interface of IPFire provided by IPFire Project contains multiple stored cross-site scripting vulnerabilities (CWE-79).
This analysis assumes a scenario where one administrative user prepares malicious content, and then another administrative user accesses this content, resulting in a cross-site scripting attack.
Satoshi Horikoshi reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000075http://jvn.jp/en/jp/JVN15411362/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-36368https://nvd.nist.gov/vuln/detail/CVE-2022-36368https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ipfire:ipfire2024-06-12T14:28+09:002022-10-06T13:05+09:002024-06-12T14:28+09:00Multiple vulnerabilities in Buffalo network devices
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002444.html
Multiple network devices provided by Buffalo Inc. contain multiple vulnerabilities listed below.
* Hidden Functionality (CWE-912) - CVE-2022-39044
* Use of Hard-coded Credentials (CWE-798) - CVE-2022-34840
* Authentication Bypass (CWE-288) - CVE-2022-4096
Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
JVNDB-2022-002444https://jvn.jp/en/vu/JVNVU92805279/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-39044https://www.cve.org/CVERecord?id=CVE-2022-34840https://www.cve.org/CVERecord?id=CVE-2022-40966https://nvd.nist.gov/vuln/detail/CVE-2022-34840https://nvd.nist.gov/vuln/detail/CVE-2022-39044https://nvd.nist.gov/vuln/detail/CVE-2022-40966https://cwe.mitre.org/data/definitions/288.htmlhttps://cwe.mitre.org/data/definitions/798.htmlhttps://cwe.mitre.org/data/definitions/912.htmlcpe:/o:buffalo_inc:bhr-4grv_firmwarecpe:/o:buffalo_inc:bhr-4grv_firmwarecpe:/o:buffalo_inc:dwr-hp-g300nh_firmwarecpe:/o:buffalo_inc:dwr-pg_firmwarecpe:/o:buffalo_inc:fs-600dhp_firmwarecpe:/o:buffalo_inc:fs-600dhp_firmwarecpe:/o:buffalo_inc:fs-g300n_firmwarecpe:/o:buffalo_inc:fs-g300n_firmwarecpe:/o:buffalo_inc:fs-hp-g300n_firmwarecpe:/o:buffalo_inc:fs-hp-g300n_firmwarecpe:/o:buffalo_inc:fs-r600dhp_firmwarecpe:/o:buffalo_inc:fs-r600dhp_firmwarecpe:/o:buffalo_inc:hw-450hp-zwe_firmwarecpe:/o:buffalo_inc:wcr-300_firmwarecpe:/o:buffalo_inc:wem-1266_firmwarecpe:/o:buffalo_inc:wem-1266_firmwpwarecpe:/o:buffalo_inc:wer-a54g54_firmwarecpe:/o:buffalo_inc:wer-ag54_firmwarecpe:/o:buffalo_inc:wer-am54g54_firmwarecpe:/o:buffalo_inc:wer-amg54_firmwarecpe:/o:buffalo_inc:whr-300hp_firmwarecpe:/o:buffalo_inc:whr-300_firmwarecpe:/o:buffalo_inc:whr-am54g54_firmwarecpe:/o:buffalo_inc:whr-amg54_firmwarecpe:/o:buffalo_inc:whr-ampg_firmwarecpe:/o:buffalo_inc:whr-g300n_firmwarecpe:/o:buffalo_inc:whr-g301n_firmwarecpe:/o:buffalo_inc:whr-g54s-ni_firmwarecpe:/o:buffalo_inc:whr-g54s_firmwarecpe:/o:buffalo_inc:whr-g_firmwarecpe:/o:buffalo_inc:whr-hp-ampg_firmwarecpe:/o:buffalo_inc:whr-hp-g300n_firmwarecpe:/o:buffalo_inc:whr-hp-g54_firmwarecpe:/o:buffalo_inc:whr-hp-gn_firmwarecpe:/o:buffalo_inc:whr-hp-g_firmwarecpe:/o:buffalo_inc:wlae-ag300n_firmwarecpe:/o:buffalo_inc:wlae-ag300n_firmwarecpe:/o:buffalo_inc:wli-h4-d600_firmwarecpe:/o:buffalo_inc:wli-tx4-ag300n_firmwarecpe:/o:buffalo_inc:wpl-05g300_firmwarecpe:/o:buffalo_inc:wrm-d2133hp_firmwarecpe:/o:buffalo_inc:wrm-d2133hs_firmwarecpe:/o:buffalo_inc:ws024bf-nw_firmwarecpe:/o:buffalo_inc:ws024bf_firmwarecpe:/o:buffalo_inc:wtr-m2133hp_firmwarecpe:/o:buffalo_inc:wtr-m2133hs_firmwarecpe:/o:buffalo_inc:wxr-1750dhp2_firmwarecpe:/o:buffalo_inc:wxr-1750dhp_firmwarecpe:/o:buffalo_inc:wxr-1900dhp2_firmwarecpe:/o:buffalo_inc:wxr-1900dhp3_firmwarecpe:/o:buffalo_inc:wxr-1900dhp_firmwarecpe:/o:buffalo_inc:wxr-5950ax12_firmwarecpe:/o:buffalo_inc:wxr-6000ax12b_firmwarecpe:/o:buffalo_inc:wxr-6000ax12s_firmwarecpe:/o:buffalo_inc:wzr-1166dhp2_firmwarecpe:/o:buffalo_inc:wzr-1166dhp_firmwarecpe:/o:buffalo_inc:wzr-1750dhp2_firmwarecpe:/o:buffalo_inc:wzr-1750dhp_firmwarecpe:/o:buffalo_inc:wzr-300hp_firmwarecpe:/o:buffalo_inc:wzr-300hp_firmwarecpe:/o:buffalo_inc:wzr-450hp-cwt_firmwarecpe:/o:buffalo_inc:wzr-450hp-ub_firmwarecpe:/o:buffalo_inc:wzr-450hp_firmwarecpe:/o:buffalo_inc:wzr-450hp_firmwarecpe:/o:buffalo_inc:wzr-600dhp2_firmwarecpe:/o:buffalo_inc:wzr-600dhp3_firmwarecpe:/o:buffalo_inc:wzr-600dhp_firmwarecpe:/o:buffalo_inc:wzr-600dhp_firmwarecpe:/o:buffalo_inc:wzr-900dhp2_firmwarecpe:/o:buffalo_inc:wzr-900dhp_firmwarecpe:/o:buffalo_inc:wzr-900dhp_firmwarecpe:/o:buffalo_inc:wzr-agl300nh_firmwarecpe:/o:buffalo_inc:wzr-ampg144nh_firmwarecpe:/o:buffalo_inc:wzr-ampg300nh_firmwarecpe:/o:buffalo_inc:wzr-d1100h_firmwarecpe:/o:buffalo_inc:wzr-g144nh_firmwarecpe:/o:buffalo_inc:wzr-g144n_firmwarecpe:/o:buffalo_inc:wzr-hp-ag300h_firmwarecpe:/o:buffalo_inc:wzr-hp-ag300h_firmwarecpe:/o:buffalo_inc:wzr-hp-g300nh_firmwarecpe:/o:buffalo_inc:wzr-hp-g301nh_firmwarecpe:/o:buffalo_inc:wzr-hp-g302h_firmwarecpe:/o:buffalo_inc:wzr-hp-g302h_firmwarecpe:/o:buffalo_inc:wzr-hp-g450h_firmwarecpe:/o:buffalo_inc:wzr-s1750dhp_firmwarecpe:/o:buffalo_inc:wzr-s600dhp_firmwarecpe:/o:buffalo_inc:wzr-s900dhp_firmwarecpe:/o:buffalo_inc:wzr2-g108_firmwarecpe:/o:buffalo_inc:wzr2-g300n_firmware2022-10-13T16:28+09:002022-10-05T17:44+09:002022-10-13T16:28+09:00Privilege Escalation Vulnerability in Hitachi Storage Plug-in for VMware vCenter
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002443.html
A privilege escalation vulnerability (CVE-2022-2637) exists in Hitachi Storage Plug-in for VMware vCenter.JVNDB-2022-002443https://www.cve.org/CVERecord?id=CVE-2022-2637https://nvd.nist.gov/vuln/detail/CVE-2022-2637https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:storage_plug-in2022-10-05T17:28+09:002022-10-05T17:28+09:002022-10-05T17:28+09:00BookStack vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000074.html
BookStack contains a cross-site scripting vulnerability (CWE-79).
Kenichi Okuno of Mitsui Bussan Secure Directions, Inc reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000074http://jvn.jp/en/jp/JVN78862034/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-40690https://nvd.nist.gov/vuln/detail/CVE-2022-40690https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:bookstackapp:bookstack2024-06-12T14:07+09:002022-09-30T14:48+09:002024-06-12T14:07+09:00OpenAM (OpenAM Consortium Edition) vulnerable to open redirect
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002367.html
OpenAM (OpenAM Consortium Edition) provided by OpenAM Consortium contains an open redirect vulnerability (CWE-601).
OpenAM Consortium reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
JPCERT/CC and OpenAM Consortium coordinated under the Information Security Early Warning Partnership.JVNDB-2022-002367http://jvn.jp/en/vu/JVNVU99326969/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-31735https://nvd.nist.gov/vuln/detail/CVE-2022-31735https://cwe.mitre.org/data/definitions/601.htmlcpe:/a:osstech:openam2024-06-13T11:39+09:002022-09-16T15:30+09:002024-06-13T11:39+09:00Multiple vulnerabilities in EC-CUBE
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000073.html
EC-CUBE provided by EC-CUBE CO.,LTD. contains multiple vulnerabilities listed below.
* Directory traversal vulnerability (CWE-22) - CVE-2022-40199
* DOM-based cross-site scripting vulnerability (CWE-79) - CVE-2022-38975
Noriaki Iwasaki of Cyber Defense Institute, Inc. reported these vulnerabilities to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. reported them to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2022-000073http://jvn.jp/en/jp/JVN21213852/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-40199https://www.cve.org/CVERecord?id=CVE-2022-38975https://nvd.nist.gov/vuln/detail/CVE-2022-40199https://nvd.nist.gov/vuln/detail/CVE-2022-38975https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ec-cube:ec-cube2024-06-13T11:09+09:002022-09-15T16:30+09:002024-06-13T11:09+09:00EC-CUBE plugin "Product Image Bulk Upload Plugin" vulnerable to insufficient verification in uploading files
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000072.html
EC-CUBE plugin "Product Image Bulk Upload Plugin", a plugin that enables to upload image files, provided by EC-CUBE CO.,LTD. contains an insufficient verification vulnerability when uploading files (CWE-20).
Exploiting this vulnerability allows a remote unauthenticated attacker to upload arbitrary files other than image files.
EC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.JVNDB-2022-000072http://jvn.jp/en/jp/JVN30900552/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-37346https://nvd.nist.gov/vuln/detail/CVE-2022-37346https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ec-cube:product_image_bulk_upload2024-06-13T11:03+09:002022-09-15T16:13+09:002024-06-13T11:03+09:00Multiple vulnerabilities in Trend Micro Apex One and Trend Micro Apex One as a Service
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000071.html
Trend Micro Apex One and Trend Micro Apex One as a Service provided by Trend Micro Incorporated contain multiple vulnerabilities listed below.
* Improper validation in some components of the rollback mechanism (CWE-20) - CVE-2022-40139
* Improper access control (CWE-284) - CVE-2022-40140
* Information exposure (CWE-200) - CVE-2022-40141
* Improper link resolution before file access (CWE-59) - CVE-2022-40142
* Improper link resolution before file access (CWE-59) - CVE-2022-40143
* Improper authentication (CWE-287) - CVE-2022-40144
Trend Micro Incorporated states that attacks exploiting CVE-2022-40139 have been observed.
CVE-2022-40139, CVE-2022-40140, CVE-2022-40141, CVE-2022-40142, CVE-2022-40143
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.
CVE-2022-40144
Akinori Takeuchi of Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000071https://jvn.jp/en/jp/JVN36454862/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-40139https://www.cve.org/CVERecord?id=CVE-2022-40140https://www.cve.org/CVERecord?id=CVE-2022-40141https://www.cve.org/CVERecord?id=CVE-2022-40142https://www.cve.org/CVERecord?id=CVE-2022-40143https://www.cve.org/CVERecord?id=CVE-2022-40144https://nvd.nist.gov/vuln/detail/CVE-2022-40139https://nvd.nist.gov/vuln/detail/CVE-2022-40140https://nvd.nist.gov/vuln/detail/CVE-2022-40141https://nvd.nist.gov/vuln/detail/CVE-2022-40142https://nvd.nist.gov/vuln/detail/CVE-2022-40143https://nvd.nist.gov/vuln/detail/CVE-2022-40144https://www.ipa.go.jp/security/ciadr/vul/20220913-jvn.htmlhttps://www.jpcert.or.jp/english/at/2022/at220023.htmlhttps://www.cisa.gov/known-exploited-vulnerabilities-cataloghttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:trendmicro:apex_one2024-06-13T11:34+09:002022-09-14T18:15+09:002024-06-13T11:34+09:00DoS Vulnerability in uCosminexus TP1/Client/J and Cosminexus Service Coordinator
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002364.html
DoS Vulnerability have been found in uCosminexus TP1/Client/J and Cosminexus Service Coordinator.
JVNDB-2022-002364https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:ucosminexus_service_architectcpe:/a:hitachi:ucosminexus_service_platformcpe:/a:hitachi:ucosminexus_service_platform_64cpe:/a:hitachi:ucosminexus_tp1_client_j2022-09-14T11:34+09:002022-09-14T11:34+09:002022-09-14T11:34+09:00Movable Type plugin A-Form vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000070.html
Movable Type plugin A-Form provided by ARK-Web co., ltd. contains a cross-site scripting vulnerability (CWE-79).
hibiki moriyama of STNet, Incorporated reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000070http://jvn.jp/en/jp/JVN48120704/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-38972https://nvd.nist.gov/vuln/detail/CVE-2022-38972https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ark-web:a-formcpe:/a:ark-web:a-form2024-06-13T13:49+09:002022-09-09T15:01+09:002024-06-13T13:49+09:00SYNCK GRAPHICA Mailform Pro CGI vulnerable to information disclosure
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000068.html
Mailform Pro CGI provided by SYNCK GRAPHICA contains an information disclosure vulnerability (CWE-200).
Thanks module of this product saves user input data for a certain period of time. The time is set to 30 seconds by default in configs/thanks.cgi file. To exploit this vulerability, it is requireid for an attacker to access the affected product within in 30 seconds.
Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000068http://jvn.jp/en/jp/JVN34205166/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-38400https://nvd.nist.gov/vuln/detail/CVE-2022-38400https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:synck_graphica:mailform_pro_cgi2024-06-13T16:00+09:002022-09-05T15:22+09:002024-06-13T16:00+09:00Multiple vulnerabilities in Contec FLEXLAN FX3000 and FX2000 series
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002346.html
FLEXLAN FX3000 and FX2000 series provided by Contec Co., Ltd. contain multiple vulnerabilities listed below.
* Hidden Functionality (CWE-912) - CVE-2022-36158
* Use of Hard-coded Credentials (CWE-798) - CVE-2022-36159
Thomas J. Knudsen and Samy Younsi of Necrum Security Labs reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2022-002346http://jvn.jp/en/vu/JVNVU98305100/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-36158https://www.cve.org/CVERecord?id=CVE-2022-36159https://nvd.nist.gov/vuln/detail/CVE-2022-36158https://nvd.nist.gov/vuln/detail/CVE-2022-36159https://cwe.mitre.org/data/definitions/798.htmlhttps://cwe.mitre.org/data/definitions/912.htmlcpe:/o:contec:flexlan_fx2000_firmwarecpe:/o:contec:flexlan_fx3000_firmware2022-09-02T18:08+09:002022-09-02T18:08+09:002022-09-02T18:08+09:00PowerCMS XMLRPC API vulnerable to command injection
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000069.html
PowerCMS XMLRPC API provided by Alfasado Inc. contains a command injection vulnerability (CWE-74).
Sending a specially crafted message by POST method to PowerCMS XMLRPC API may allow arbitrary Perl script execution, and an arbitrary OS command may be executed through it.
According to the developer, it is unable to execute a command with an arbitrary value added to its argument, even if the vulnerability is exploited.
Alfasado Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Alfasado Inc. coordinated under the Information Security Early Warning Partnership.JVNDB-2022-000069https://jvn.jp/en/jp/JVN76024879/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-33941https://nvd.nist.gov/vuln/detail/CVE-2022-33941https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:alfasado:powercms2024-06-13T11:44+09:002022-09-02T15:49+09:002024-06-13T11:44+09:00Multiple vulnerabilities in CentreCOM AR260S V2
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000066.html
CentreCOM AR260S V2 provided by Allied Telesis K.K. contains multiple vulnerabilities listed below.
* OS command injection vulnerability in GUI setting page (CWE-78) - CVE-2022-35273
* Use of hard-coded credentials for the telnet server (CWE-798) - CVE-2022-38394
* Undocumented hidden command that can be excuted from the telnet function (CWE-912) - CVE-2022-34869
* OS command injection vulnerability in the telnet function (CWE-78) - CVE-2022-38094
Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000066https://jvn.jp/en/jp/JVN45473612/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-35273https://www.cve.org/CVERecord?id=CVE-2022-38394https://www.cve.org/CVERecord?id=CVE-2022-34869https://www.cve.org/CVERecord?id=CVE-2022-38094https://nvd.nist.gov/vuln/detail/CVE-2022-34869https://nvd.nist.gov/vuln/detail/CVE-2022-35273https://nvd.nist.gov/vuln/detail/CVE-2022-38094https://nvd.nist.gov/vuln/detail/CVE-2022-38394https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:allied_telesis_k.k.:centrecom_ar260s_firmware2024-06-13T16:21+09:002022-08-29T17:37+09:002024-06-13T16:21+09:00Installer of Ricoh Device Software Manager may insecurely load Dynamic Link Libraries
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000067.html
Installer of Device Software Manager provided by RICOH COMPANY, LTD. contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).
Tomohisa Hasegawa of Canon IT Solutions Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000067https://jvn.jp/en/jp/JVN44721267/index.htmlhttps://jvn.jp/en/ta/JVNTA91240916/https://www.cve.org/CVERecord?id=CVE-2022-36403https://nvd.nist.gov/vuln/detail/CVE-2022-36403https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ricoh:device_software_manager2024-06-13T13:53+09:002022-08-29T15:57+09:002024-06-13T13:53+09:00Movable Type XMLRPC API vulnerable to command injection
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000064.html
Movable Type XMLRPC API provided by Six Apart Ltd. contains a command injection vulnerability (CWE-74).
Sending a specially crafted message by POST method to Movable Type XMLRPC API may allow arbitrary Perl script execution, and an arbitrary OS command may be executed through it.
According to the developer, it is unable to execute a command with an arbitrary value added to its argument, even if the vulnerability is exploited.
Osaka University of Economics reported this vulnerability to Six Apart Ltd. and coordinated. Six Apart Ltd. and JPCERT/CC published respective advisories in order to notify users of this vulnerability.
And almost at the same time, SHIGA TAKUMA of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with Six Apart Ltd. under Information Security Early Warning Partnership.JVNDB-2022-000064https://jvn.jp/en/jp/JVN57728859/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-38078https://nvd.nist.gov/vuln/detail/CVE-2022-38078https://www.ipa.go.jp/security/ciadr/vul/20220824-jvn.htmlhttps://www.jpcert.or.jp/english/at/2022/at220022.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:sixapart:movable_type2024-06-13T18:11+09:002022-08-24T15:58+09:002024-06-13T18:11+09:00Multiple vulnerabilities in Exment
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000065.html
Exment provided by Kajitori Co.,Ltd contains multiple vulnerabilities listed below.
* Reflected cross-site scripting (CWE-79) - CVE-2022-38080
* SQL injection (CWE-89) - CVE-2022-37333
* Stored cross-site scripting (CWE-79) - CVE-2022-38089
CVE-2022-38080, CVE-2022-37333
Hibiki Moriyama of STNet, Incorporated reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2022-38089
Yuya Chudo of N.F.Laboratories Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000065https://jvn.jp/en/jp/JVN46239102/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-38080https://www.cve.org/CVERecord?id=CVE-2022-37333https://www.cve.org/CVERecord?id=CVE-2022-38089https://nvd.nist.gov/vuln/detail/CVE-2022-37333https://nvd.nist.gov/vuln/detail/CVE-2022-38080https://nvd.nist.gov/vuln/detail/CVE-2022-38089https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:exceedone:kajitori_exceedone_exmentcpe:/a:exceedone:laravel-admin2024-06-14T11:09+09:002022-08-24T14:23+09:002024-06-14T11:09+09:00Multiple vulnerabilities in PukiWiki
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002339.html
PukiWiki provided by PukiWiki Development Team contains multiple vulnerabilities listed below.
* Path Traversal (CWE-22) - CVE-2022-34486
* Reflected Cross-site Scripting (CWE-79) - CVE-2022-27637
Harold Kim reported these vulnerabilities to the developer and coordinated. After coordination was completed, this case was reported to JPCERT/CC and JPCERT/CC coordinated with the developer for the publication.JVNDB-2022-002339http://jvn.jp/en/vu/JVNVU96002401/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-34486https://www.cve.org/CVERecord?id=CVE-2022-27637https://nvd.nist.gov/vuln/detail/CVE-2022-27637https://nvd.nist.gov/vuln/detail/CVE-2022-34486https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:pukiwiki:pukiwiki2024-06-14T11:55+09:002022-08-24T14:17+09:002024-06-14T11:55+09:00PLANEX MZK-DP150N contains hidden administrative functionality
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002338.html
MZK-DP150N provided by PLANEX COMMUNICATIONS INC. contains a hidden administrative screen (CVE-2021-37289, CWE-912).
In the initial settings of the product, the login account for the configuration screen is common to all products.
Please change the account information from the initial settings before using it.
Thomas J. Knudsen and Samy Younsi of Necrum Security Labs reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2022-002338http://jvn.jp/en/vu/JVNVU98291763/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2021-37289https://nvd.nist.gov/vuln/detail/CVE-2021-37289https://cwe.mitre.org/data/definitions/912.htmlcpe:/o:planex:mzk-dp150n_firmware2024-06-14T14:06+09:002022-08-23T15:02+09:002024-06-14T14:06+09:00PukiWiki vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000063.html
PukiWiki provided by PukiWiki Developers Team contains a stored cross-site scripting vulnerability (CWE-79).
Ryuhoh Ide of Department of Applied Physics, School of Engineering, The University of Tokyo reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000063https://jvn.jp/en/jp/JVN43979089/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-36350https://nvd.nist.gov/vuln/detail/CVE-2022-36350https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:pukiwiki:pukiwiki2024-06-14T12:00+09:002022-08-23T14:40+09:002024-06-14T12:00+09:00UNIMO Technology digital video recorders vulnerable to missing authentication for critical functions
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002337.html
Multiple digital video recorders provided by UNIMO Technology Co., Ltd do not perform authentication for some critical functions (CWE-306) in the device management web interface.
The reporter states that attacks exploiting this vulnerability have been observed.
Yoshiki Mori, Ushimaru Hayato and Masaki Kubo of National Institute of Information and Communications Technology Cybersecurity Research Institute reported this vulnerability to the developer and coordinated. After coordination was completed, this case was reported to JPCERT/CC and JPCERT/CC coordinated with the developer for the publication.JVNDB-2022-002337http://jvn.jp/en/vu/JVNVU90821877/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-35733https://nvd.nist.gov/vuln/detail/CVE-2022-35733https://cwe.mitre.org/data/definitions/306.htmlcpe:/o:unimo:udr-ja1004_firmwarecpe:/o:unimo:udr-ja1008_firmwarecpe:/o:unimo:udr-ja1016_firmware2024-06-14T10:24+09:002022-08-23T14:31+09:002024-06-14T10:24+09:00Multiple vulnerabilities in Trend Micro Security
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002295.html
Trend Micro Incorporated has released security updates for Trend Micro Security.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2022-002295https://jvn.jp/en/vu/JVNVU93109244/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-30702https://www.cve.org/CVERecord?id=CVE-2022-30703https://nvd.nist.gov/vuln/detail/CVE-2022-30702https://nvd.nist.gov/vuln/detail/CVE-2022-30703https://cwe.mitre.org/data/definitions/125.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:trendmicro:security2022-08-19T11:42+09:002022-08-19T11:42+09:002022-08-19T11:42+09:00Trend Micro Endpoint security products for enterprises vulnerable to Link Following Local Privilege Escalation
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002265.html
Trend Micro Incorporated has released security updates for Endpoint security products for enterprises.
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2022-002265http://jvn.jp/en/vu/JVNVU96643038/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-36336https://nvd.nist.gov/vuln/detail/CVE-2022-36336https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:trendmicro:apex_onecpe:/a:trendmicro:business_securitycpe:/a:trendmicro:business_security_services2024-06-14T17:11+09:002022-08-18T15:45+09:002024-06-14T17:11+09:00Kaitai Struct: compiler vulnerable to denial-of-service (DoS)
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000062.html
Kaitai Struct: compiler provided by Kaitai team contains SnakeYAML library version 1.25, which is used in parsing .ksy files.
SnakeYAML version 1.25 expands recursive aliases unlimitedly (CWE-674), hence Katai Struct: compiler is vulnerable to a denial-of-service (DoS) attack by Billion Laughs Attack.
Taichi Kotake of Sterra Security Co.,Ltd. / Akatsuki Games Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000062https://jvn.jp/en/jp/JVN42883072/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2017-18640https://nvd.nist.gov/vuln/detail/CVE-2017-18640https://snyk.io/blog/java-yaml-parser-with-snakeyaml/https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:kaitai_team_kaitai_struct_compiler2022-08-04T15:14+09:002022-08-04T15:14+09:002022-08-04T15:14+09:00CONTEC SolarView Compact vulnerable to insufficient verification in uploading files
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002112.html
SolarView Compact provided by CONTEC CO., LTD. is PV Measurement System.
The image file management page of SolarView Compact contains an insufficient verification vulnerability when uploadi
webray reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.ng files (CWE-20).JVNDB-2022-002112https://jvn.jp/en/vu/JVNVU93696585/https://www.cve.org/CVERecord?id=CVE-2022-35239https://nvd.nist.gov/vuln/detail/CVE-2022-35239https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:contec:sv-cpt-mc310f_firmwarecpe:/o:contec:sv-cpt-mc310_firmware2024-06-14T15:21+09:002022-08-03T17:40+09:002024-06-14T15:21+09:00Information Disclosure Vulnerability in Hitachi Automation Director and Hitachi Ops Center Automator
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002143.html
Information Disclosure Vulnerability have been found in Hitachi Automation Director and Hitachi Ops Center Automator.
JVNDB-2022-002143https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hitachi:automation_directorcpe:/a:hitachi:ops_center_automator2022-08-01T17:10+09:002022-08-01T17:10+09:002022-08-01T17:10+09:00Multiple vulnerabilities in Nintendo Wi-Fi Network Adaptor WAP-001
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000056.html
Nintendo Wi-Fi Network Adaptor provided by Nintendo Co.,Ltd. contains multiple vulnerabilities listed below.
* OS command injection (CWE-78) - CVE-2022-36381
* Buffer overflow (CWE-121) - CVE-2022-36293
Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000056http://jvn.jp/en/jp/JVN17625382/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-36381https://www.cve.org/CVERecord?id=CVE-2022-36293https://nvd.nist.gov/vuln/detail/CVE-2022-36381https://nvd.nist.gov/vuln/detail/CVE-2022-36293https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:nintendo:wi-fi_network_adaptor_wap_001_firmware2024-06-14T16:27+09:002022-07-29T13:43+09:002024-06-14T16:27+09:00"JustSystems JUST Online Update for J-License" starts a program with an unquoted file path
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000061.html
"JustSystems JUST Online Update for J-License" is bundled with multiple products for corporate users provided by JustSystems Corporation, as in Ichitaro through Pro5 and others, and it is registered as a Windows service.
"JustSystems JUST Online Update for J-License" starts another program with an unquoted file path (CWE-428).
Hiroki MATSUKUMA of Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000061http://jvn.jp/en/jp/JVN57073973/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-36344https://nvd.nist.gov/vuln/detail/CVE-2022-36344https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:justsystems:just_online_update2022-07-28T13:40+09:002022-07-28T13:40+09:002022-07-28T13:40+09:00"Hulu" App for iOS vulnerable to improper server certificate verification
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000060.html
"Hulu" App for iOS provided by HJ Holdings, Inc. is vulnerable to improper server certificate verification (CWE-295).
Shungo Kumasaka of GMO Cyber Security by IERAE reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000060http://jvn.jp/en/jp/JVN81563390/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-34156https://nvd.nist.gov/vuln/detail/CVE-2022-34156https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hjholdings:hulu2024-06-14T12:25+09:002022-07-28T09:51+09:002024-06-14T12:25+09:00"Hulu" App for Android uses a hard-coded API key for an external service
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000059.html
"Hulu" App for Android provided by HJ Holdings, Inc. uses a hard-coded API key for an external service (CWE-798).
Ryo Sato of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000059http://jvn.jp/en/jp/JVN40907489/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-35734https://nvd.nist.gov/vuln/detail/CVE-2022-35734https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:hjholdings:hulu2024-06-14T14:42+09:002022-07-28T09:14+09:002024-06-14T14:42+09:00WordPress Plugin "Newsletter" vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000057.html
WordPress Plugin "Newsletter" provided by Stefano Lissa & The Newsletter Team contains a cross-site scripting vulnerability (CWE-79).
Gen Sato of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000057http://jvn.jp/en/jp/JVN77850327/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-1756https://nvd.nist.gov/vuln/detail/CVE-2022-1756https://wpscan.com/vulnerability/6ad407fe-db2b-41fb-834b-dd8c4f62b072https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:thenewsletterplugin:newsletter2024-06-18T11:21+09:002022-07-25T14:30+09:002024-06-18T11:21+09:00Multiple vulnerabilities in untangle
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000058.html
untangle provided by Christian Stefanescu is a Python library for processing XML documents. untangle contains multiple vulnerabilities listed below.
* Improper Restriction of Recursive Entity References in DTDs (CWE-776) - CVE-2022-33977
* Improper Restriction of XML External Entity Reference (CWE-611) - CVE-2022-31471</li></ul>
Taichi Kotake of Sterra Security Co.,Ltd. / Akatsuki Games Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000058http://jvn.jp/en/jp/JVN30454777/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-33977https://www.cve.org/CVERecord?id=CVE-2022-31471https://nvd.nist.gov/vuln/detail/CVE-2022-33977https://nvd.nist.gov/vuln/detail/CVE-2022-31471https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:misc:christian_stefanescu_untangle2024-06-17T11:03+09:002022-07-25T14:18+09:002024-06-17T11:03+09:00Booked vulnerable to open redirect
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000055.html
Booked provided by Twinkle Toes Software contains an open redirect vulnerability (CWE-601).
Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
JVNDB-2022-000055https://jvn.jp/en/jp/JVN75063798/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-30706https://nvd.nist.gov/vuln/detail/CVE-2022-30706https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:twinkletoessoftware:booked2024-06-14T17:43+09:002022-07-22T13:40+09:002024-06-14T17:43+09:00Multiple vulnerabilities in Cybozu Office
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000054.html
Cybozu Office provided by Cybozu, Inc. contains multiple vulnerabilities listed below.
* [CyVDB-839][CyVDB-2300][CyVDB-3109] Browse restriction bypass vulnerability in Cabinet (CWE-284) - CVE-2022-32283
* [CyVDB-1795] Operation restriction bypass vulnerability in Project (CWE-285) - CVE-2022-32544
* [CyVDB-1800][CyVDB-2798][CyVDB-2927] Browse restriction bypass vulnerability in Custom App (CWE-284) - CVE-2022-29891
* [CyVDB-1849] Cross-site scripting vulnerability in the specific parameters (CWE-79) - CVE-2022-33151
* [CyVDB-1851][CyVDB-1856][CyVDB-1873][CyVDB-1944][CyVDB-2173] Cross-site scripting vulnerability in the specific parameters (CWE-79) - CVE-2022-28715
* [CyVDB-1859] Cross-site scripting vulnerability in the specific parameters (CWE-79) - CVE-2022-30604
* [CyVDB-2030] HTTP header injection vulnerability (CWE-113) - CVE-2022-32453
* [CyVDB-2152][CyVDB-2153][CyVDB-2154][CyVDB-2155] Information disclosure vulnerability in the system configuration (CWE-200) - CVE-2022-30693
* [CyVDB-2693] Operation restriction bypass vulnerability in Scheduler (CWE-285) - CVE-2022-32583
* [CyVDB-2695][CyVDB-2819] Browse restriction bypass vulnerability in Scheduler (CWE-284) - CVE-2022-25986
* [CyVDB-2770] Browse restriction bypass vulnerability in Address Book (CWE-284) - CVE-2022-33311
* [CyVDB-2939] Cross-site scripting vulnerability in the specific parameters (CWE-79) - CVE-2022-29487
CVE-2022-28715, CVE-2022-30604, CVE-2022-32453, CVE-2022-33151
Masato Kinugawa reported these vulnerabilities to Cybozu, Inc. and Cybozu, Inc. reported them to JPCERT/CC to notify users of the solutions through JVN.
CVE-2022-29891, CVE-2022-32544, CVE-2022-32583
Yuji Tounai reported these vulnerabilities to Cybozu, Inc. and Cybozu, Inc. reported them to JPCERT/CC to notify users of the solutions through JVN.
CVE-2022-30693
Kanta Nishitani of Ierae Security Inc. reported this vulnerability to Cybozu, Inc. and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN.
CVE-2022-29487, CVE-2022-25986, CVE-2022-32283, CVE-2022-33311
Cybozu, Inc. reported these vulnerabilities to JPCERT/CC to notify users of the solution through JVN.JVNDB-2022-000054https://jvn.jp/en/jp/JVN20573662/index.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25986https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28715https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29487https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29891https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30604https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30693https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32283https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32453https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32544https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32583https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33151https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33311https://nvd.nist.gov/vuln/detail/CVE-2022-25986https://nvd.nist.gov/vuln/detail/CVE-2022-28715https://nvd.nist.gov/vuln/detail/CVE-2022-29487https://nvd.nist.gov/vuln/detail/CVE-2022-29891https://nvd.nist.gov/vuln/detail/CVE-2022-30604https://nvd.nist.gov/vuln/detail/CVE-2022-30693https://nvd.nist.gov/vuln/detail/CVE-2022-32283https://nvd.nist.gov/vuln/detail/CVE-2022-32453https://nvd.nist.gov/vuln/detail/CVE-2022-32544https://nvd.nist.gov/vuln/detail/CVE-2022-32583https://nvd.nist.gov/vuln/detail/CVE-2022-33151https://nvd.nist.gov/vuln/detail/CVE-2022-33311https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:cybozu:office2024-06-14T14:02+09:002022-07-20T17:28+09:002024-06-14T14:02+09:00U-Boot squashfs filesystem implementation vulnerable to heap-based buffer overflow
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002017.html
U-Boot is a boot loader for multiple platforms, and squashfs filesystem feature is provided since v2020.10-rc2 (commit c5100613). squashfs filesystem implementation of U-Boot contains a heap-based buffer overflow vulnerability (CWE-122) due to a defect in the metadata reading process.
Tatsuhiko Yasumatsu of Sony Corporation reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated between the reporter and the developer.JVNDB-2022-002017https://jvn.jp/en/vu/JVNVU97846460/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-33967https://nvd.nist.gov/vuln/detail/CVE-2022-33967https://cwe.mitre.org/data/definitions/122.htmlcpe:/a:denx:u-boot2024-06-14T17:53+09:002022-07-14T15:59+09:002024-06-14T17:53+09:00Django Extract and Trunc functions vulnerable to SQL injection
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000053.html
Django provided by Django Software Foundation is a Web application framework. Extract and Trunc functions of Django used to treat date data contain an SQL injection vulnerability(CWE-89).
Takuto Yoshikai of Aeye Security Lab reported this vulnerability to the developer and coordinated. After coordination was completed, this case was reported to IPA, and JPCERT/CC coordinated with the developer for the publication under Information Security Early Warning Partnership.JVNDB-2022-000053https://jvn.jp/en/jp/JVN12610194/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-34265https://nvd.nist.gov/vuln/detail/CVE-2022-34265https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:djangoproject:django2024-06-18T11:57+09:002022-07-12T13:47+09:002024-06-18T11:57+09:00Passage Drive vulnerable to insufficient data verification
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000052.html
Passage Drive provided by Yokogawa Rental & Lease Corporation contains an insufficient data verification vulnerability for interprocess communication (CWE-20).
Yokogawa Rental & Lease Corporation reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Yokogawa Rental & Lease Corporation coordinated under the Information Security Early Warning Partnership.JVNDB-2022-000052http://jvn.jp/en/jp/JVN23766146/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-34866https://nvd.nist.gov/vuln/detail/CVE-2022-34866https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:yrl:passage_drivecpe:/a:yrl:passage_drive_for_box2024-06-14T17:48+09:002022-07-08T13:42+09:002024-06-14T17:48+09:00Multiple vulnerabilities in Cybozu Garoon
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000051.html
Cybozu Garoon provided by Cybozu, Inc. contains multiple vulnerabilities listed below.
* [CyVDB-2909] Operation restriction bypass in multiple applications (CWE-285) - CVE-2022-30602
* [CyVDB-3042] Information disclosure in multiple applications (CWE-200) - CVE-2022-29512
<s>* [CyVDB-3111] Improper input validation in multiple applications (CWE-20) - CVE-2022-29926</s>
* [CyVDB-3143] Browsing restriction bypass vulnerability in Bulletin (CWE-284) - CVE-2022-30943
CVE-2022-30602
Shuichi Uruma reported this vulnerability to Cybozu, Inc. and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN.
CVE-2022-30943
Yuji Tounai reported this vulnerability to Cybozu, Inc. and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN.
CVE-2022-29512
Cybozu, Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
[Updated on 2022 July 6]
The developer identified that [CyVDB-3111] was not a vulnerability after the further investigation.
Therefore the JVN advisory was updated by crossing out the description regarding [CyVDB-3111].JVNDB-2022-000051http://jvn.jp/en/jp/JVN14077132/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-30602https://www.cve.org/CVERecord?id=CVE-2022-29512https://www.cve.org/CVERecord?id=CVE-2022-29926https://www.cve.org/CVERecord?id=CVE-2022-30943https://nvd.nist.gov/vuln/detail/CVE-2022-30602https://nvd.nist.gov/vuln/detail/CVE-2022-29512https://nvd.nist.gov/vuln/detail/CVE-2022-29926https://nvd.nist.gov/vuln/detail/CVE-2022-30943https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:cybozu:garoon2024-06-17T16:49+09:002022-07-04T14:17+09:002024-06-17T16:49+09:00LiteCart vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000050.html
LiteCart contains a cross-site scripting vulnerability (CWE-79).
Satoshi Horikoshi reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000050http://jvn.jp/en/jp/JVN32625020/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-27168https://nvd.nist.gov/vuln/detail/CVE-2022-27168https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:litecart:litecart2024-06-17T10:39+09:002022-07-04T14:12+09:002024-06-17T10:39+09:00HOME SPOT CUBE2 vulnerable to OS command injection
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000049.html
HOME SPOT CUBE2 provided by KDDI CORPORATION contains an OS command injection vulnerability (CWE-78) due to improper processing of data received from DHCP server.
Alice Rose reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000049http://jvn.jp/en/jp/JVN41017328/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-33948https://nvd.nist.gov/vuln/detail/CVE-2022-33948https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/h:kddi:home_spot_cube_22024-06-17T10:45+09:002022-06-29T13:42+09:002024-06-17T10:45+09:00L2Blocker Sensor setup screen vulnerable to authentication bypass
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000048.html
L2Blocker provided by SOFTCREATE CORP. contains a vulnerability (CWE-288) in which the login authentication is bypassed by using alternative paths or channels for Sensor.
Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000048https://jvn.jp/en/jp/JVN51464799/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-33202https://nvd.nist.gov/vuln/detail/CVE-2022-33202https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:softcreate:l2blocker2024-06-18T10:45+09:002022-06-24T14:21+09:002024-06-18T10:45+09:00web2py vulnerable to open redirect
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000047.html
web2py contains an open redirect vulnerability (CWE-601).
Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000047https://jvn.jp/en/jp/JVN02158640/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-33146https://nvd.nist.gov/vuln/detail/CVE-2022-33146https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:web2py:web2py2024-06-18T10:48+09:002022-06-23T14:21+09:002024-06-18T10:48+09:00Gitlab vulnerable to server-side request forgery
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000046.html
Gitlab contains a server-side request forgery vulnerability (CWE-918) through the Project Import feature.
Kanta Nishitani of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to the developer and coordinated.
After coordination was completed, this case was reported to IPA, and JPCERT/CC coordinated with the developer for the publication under Information Security Early Warning Partnership.JVNDB-2022-000046http://jvn.jp/en/jp/JVN93667442/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-0136https://nvd.nist.gov/vuln/detail/CVE-2022-0136https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:gitlab:gitlabcpe:/a:gitlab:gitlabcpe:/a:gitlab:gitlab2024-06-20T15:39+09:002022-06-17T12:26+09:002024-06-20T15:39+09:00Growi vulnerable to weak password requirements
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001953.html
GROWI provided by WESEEK, Inc. contains a weak password requirements vulnerability (CWE-521, CVE-2022-1236).
418sec first reported this vulnerability to JPCERT/CC, then JPCERT/CC contacted WSEEK, Inc. as a coordinator. After the coordination between 418sec and WESEEK, Inc. was completed, this case was published to notify the users of the solution through JVN.JVNDB-2022-001953http://jvn.jp/en/vu/JVNVU96438711/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-1236https://nvd.nist.gov/vuln/detail/CVE-2022-1236https://huntr.dev/bounties/c7df088f-e355-45e6-9267-e41030dc6a32/?token=7f784544ffb530a9e6bef04557518633e763810d60f107095451c58b34645b81ad18529d3ea12f3b61ba547c99a0d87b2324e52da6efc4b01ec175416c479099bf5de3d16b8f07f0758556c278d058872597936f0e4fea7acb2bd2bchttps://cwe.mitre.org/data/definitions/521.htmlcpe:/a:weseek:growi2022-06-15T17:47+09:002022-06-15T17:47+09:002022-06-15T17:47+09:00FreeBSD vulnerable to denial-of-service (DoS)
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000045.html
FreeBSD contains a denial-of-service (DoS) vulnerability (CWE-400) due to improper handling of TSopt on TCP connections.JVNDB-2022-000045http://jvn.jp/en/jp/JVN20930118/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-32264https://nvd.nist.gov/vuln/detail/CVE-2022-32264https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:freebsd:freebsd2024-06-13T16:31+09:002022-06-15T12:28+09:002024-06-13T16:31+09:00Cisco Catalyst 2940 Series Switches vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000044.html
Cisco Catalyst 2940 Series Switches provided by Cisco Systems, Inc., with firmware versions prior to 12.2(50)SY, improperly processes user input and generates error pages, leading to a cross-site scripting vulnerability (CWE-79).
The vulnerability has been addressed on 12.2(50)SY released in 2011 (Cisco bug id: CSCek36997), and Cisco Catalyst 2940 Series Switches has been End-of-Support since 2015.
Imaoka Ryo of Cyber Security Research Team reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000044http://jvn.jp/en/jp/JVN94363766/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-31734https://nvd.nist.gov/vuln/detail/CVE-2022-31734https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/h:cisco:catalyst_29402024-06-18T10:51+09:002022-06-14T13:46+09:002024-06-18T10:51+09:00SHIRASAGI vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000043.html
SHIRASAGI provided by SHIRASAGI Project contains a cross-site scripting vulnerability (CWE-79).
hibiki moriyama of STNet, Incorporated reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000043http://jvn.jp/en/jp/JVN32962443/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-29485https://nvd.nist.gov/vuln/detail/CVE-2022-29485https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:ss-proj:shirasagicpe:/a:ss-proj:shirasagi2024-06-18T11:13+09:002022-06-09T13:31+09:002024-06-18T11:13+09:00Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001948.html
Trend Micro Incorporated has released security updates for Apex One and Apex One as a Service.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2022-001948http://jvn.jp/en/vu/JVNVU90675050/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-30700https://www.cve.org/CVERecord?id=CVE-2022-30701https://nvd.nist.gov/vuln/detail/CVE-2022-30700https://nvd.nist.gov/vuln/detail/CVE-2022-30701https://cwe.mitre.org/data/definitions/732.htmlhttps://cwe.mitre.org/data/definitions/427.htmlcpe:/a:trendmicro:apex_one2024-06-18T16:30+09:002022-06-03T12:17+09:002024-06-18T16:30+09:00T&D Data Server and THERMO RECORDER DATA SERVER contain a directory traversal vulnerability.
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000042.html
T&D Data Server and THERMO RECORDER DATA SERVER provided by T&D Corporation contain a directory traversal vulnerability (CWE-22).
Shun Asai of FiveDrive, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000042https://jvn.jp/en/jp/JVN28659051/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-29509https://nvd.nist.gov/vuln/detail/CVE-2022-29509https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:tandd:t%26d_servercpe:/o:tandd:thermo_recorder_data_server_firmware2024-06-18T10:34+09:002022-06-01T16:12+09:002024-06-18T10:34+09:00WordPress Plugin "Modern Events Calendar Lite" vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000041.html
WordPress Plugin "Modern Events Calendar Lite" provided by Webnus contains a stored cross-site scripting vulnerability (CWE-79).
Tsutomu Aramaki of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000041http://jvn.jp/en/jp/JVN04155116/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-30533https://nvd.nist.gov/vuln/detail/CVE-2022-30533https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:webnus:modern_events_calendar_lite2024-06-18T10:42+09:002022-06-01T13:39+09:002024-06-18T10:42+09:00RevoWorks incomplete filtering of MS Office v4 macros
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000039.html
RevoWorks SCVX, RevoWorks Browser and RevoWorks Desktop provided by J's Communication Co., Ltd. enables users to execute web browsers, accessing drives, folders, files and registries in a sandboxed environment. Users can download files from the internet to the sandboxed environment, sanitizing through "File Sanitization Library" or "File Sanitization Option", and import to the local environment.
"File Sanitization Library" and "File Sanitization Option" are implemented with some third-party component, but the component's filtering functionality is incomplete, fails to detect nor remove Microsoft Excel 4.0 (XLM) Macros (CWE-791).
The developer reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and the developer coordinated under the Information Security Early Warning Partnership.JVNDB-2022-000039http://jvn.jp/en/jp/JVN27256219/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-27176https://nvd.nist.gov/vuln/detail/CVE-2022-27176https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:jscom:revoworks_browsercpe:/a:jscom:revoworks_desktopcpe:/a:jscom:revoworks_scvx2024-06-18T16:31+09:002022-05-27T16:09+09:002024-06-18T16:31+09:00Mobaoku-Auction & Flea Market App for iOS vulnerable to improper server certificate verification
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000040.html
Mobaoku-Auction & Flea Market App for iOS provided by DeNA Co., Ltd. is vulnerable to improper server certificate verification (CWE-295).
Okazawa Yoshihiro reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000040http://jvn.jp/en/jp/JVN13878856/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-29482https://nvd.nist.gov/vuln/detail/CVE-2022-29482https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:dena:mobaoku-auction_%26_flea_market2024-06-18T11:06+09:002022-05-27T15:48+09:002024-06-18T11:06+09:00Multiple vulnerabilities in Fuji Electric V-SFT
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001929.html
Multiple vulnerabilities listed below exist in the simulator module contained in the graphic editor "V-SFT" provided by FUJI ELECTRIC CO., LTD.
* Out-of-bounds Write (CWE-787) - CVE-2022-30538
* Out-of-bounds Read (CWE-125) - CVE-2022-30546
* Heap-based Buffer Overflow (CWE-122) - CVE-2022-26302
* Use After Free (CWE-416) - CVE-2022-29522
* Access of Uninitialized Pointer (CWE-824) - CVE-2022-29522
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.JVNDB-2022-001929http://jvn.jp/en/vu/JVNVU99188133/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-30538https://www.cve.org/CVERecord?id=CVE-2022-30546https://www.cve.org/CVERecord?id=CVE-2022-26302https://www.cve.org/CVERecord?id=CVE-2022-29522https://www.cve.org/CVERecord?id=CVE-2022-29925https://nvd.nist.gov/vuln/detail/CVE-2022-30538https://nvd.nist.gov/vuln/detail/CVE-2022-30546https://nvd.nist.gov/vuln/detail/CVE-2022-26302https://nvd.nist.gov/vuln/detail/CVE-2022-29522https://nvd.nist.gov/vuln/detail/CVE-2022-29925https://cwe.mitre.org/data/definitions/122.htmlhttps://cwe.mitre.org/data/definitions/125.htmlhttps://cwe.mitre.org/data/definitions/416.htmlhttps://cwe.mitre.org/data/definitions/787.htmlhttps://cwe.mitre.org/data/definitions/824.htmlcpe:/a:fujielectric:v-sft2024-06-18T13:44+09:002022-05-27T15:39+09:002024-06-18T13:44+09:00Multiple vulnerabilities in Fuji Electric V-SFT, V-Server and V-Server Lite
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001931.html
Multiple vulnerabilities listed below exist in the simulator module contained in the graphic editor "V-SFT" and the remote monitoring software "V-Server" and "V-Server Lite" provided by FUJI ELECTRIC CO., LTD.
* Out-of-bounds Read in V-SFT (CWE-125) - CVE-2022-29506
* Out-of-bounds Read in V-Server and V-Server Lite (CWE-125) - CVE-2022-30549
* Out-of-bounds Write in V-Server and V-Server Lite (CWE-787) - CVE-2022-29524
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
JVNDB-2022-001931http://jvn.jp/en/vu/JVNVU93134398/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-29506https://www.cve.org/CVERecord?id=CVE-2022-30549https://www.cve.org/CVERecord?id=CVE-2022-29524https://nvd.nist.gov/vuln/detail/CVE-2022-29506https://nvd.nist.gov/vuln/detail/CVE-2022-30549https://nvd.nist.gov/vuln/detail/CVE-2022-29524https://cwe.mitre.org/data/definitions/125.htmlhttps://cwe.mitre.org/data/definitions/787.htmlcpe:/a:fujielectric:v-servercpe:/a:fujielectric:v-sft2024-06-18T16:28+09:002022-05-27T15:37+09:002024-06-18T16:28+09:00Multiple vulnerabilities in CONTEC SolarView Compact
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001923.html
SolarView Compact provided by CONTEC CO., LTD. is PV Measurement System. SolarView Compact contains multiple vulnerabilities listed below.
OS command injection (CWE-78) - CVE-2022-29303
Improper validation of input values on the send test mail console of the product's web server may result in OS command injection.
Directory traversal (CWE-23) - CVE-2022-29298
Improper validation of a URL on the download page of the product's web server may allow a remote attacker to view and obtain an arbitrary file.
Information disclosure (CWE-200) - CVE-2022-29302
The hidden page which enables to edit the product's web server contents exists in the product's web server, and a remote attacker to read and/or alter an arbitrary file on the web server via the hidden page.
OS command injection (CWE-78) - CVE-2022-40881
Improper validation of input values on Check Network Communication Page of the product's web server may result in an arbitrary OS command execution.
OS command injection (CWE-78) - CVE-2023-23333
Improper validation of input values on the download page of the product's web server may result in an arbitrary OS command execution.
CVE-2022-29298
Jongheon Yan of S2W Inc reported CONTEC CO., LTD. that the fix for the vulnerability was insufficient in Ver.6.5. CONTEC CO., LTD. and JPCERT/CC updated respective advisories.JVNDB-2022-001923https://jvn.jp/en/vu/JVNVU92327282/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-29303https://www.cve.org/CVERecord?id=CVE-2022-29298https://www.cve.org/CVERecord?id=CVE-2022-29302https://www.cve.org/CVERecord?id=CVE-2022-40881https://www.cve.org/CVERecord?id=CVE-2023-23333https://nvd.nist.gov/vuln/detail/CVE-2022-29303https://nvd.nist.gov/vuln/detail/CVE-2022-29298https://nvd.nist.gov/vuln/detail/CVE-2022-29302https://nvd.nist.gov/vuln/detail/CVE-2022-40881https://nvd.nist.gov/vuln/detail/CVE-2023-23333https://www.cisa.gov/known-exploited-vulnerabilities-cataloghttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://cwe.mitre.org/data/definitions/23.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/o:contec:sv-cpt-mc310f_firmwarecpe:/o:contec:sv-cpt-mc310f_firmwarecpe:/o:contec:sv-cpt-mc310_firmwarecpe:/o:contec:sv-cpt-mc310_firmware2024-06-20T11:34+09:002022-05-27T15:28+09:002024-06-20T11:34+09:00Trend Micro Password Manager vulnerable to privilege escalation
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001809.html
Trend Micro Incorporated has released a security update for Trend Micro Password Manager.
Trend Micro Incorporated reported the vulnerability to JPCERT/CC to notify users of the solutions through JVN.
JVNDB-2022-001809http://jvn.jp/en/vu/JVNVU92641706/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-30523https://nvd.nist.gov/vuln/detail/CVE-2022-30523https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:trendmicro:password_manager2024-06-18T17:52+09:002022-05-24T15:27+09:002024-06-18T17:52+09:00WordPress plugin "WP Statistics" vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000038.html
WordPress plugin "WP Statistics" provided by VeronaLabs contains a cross-site scripting vulnerability (CWE-79).
Shogo Kumamaru of LAC CyberLink Co., Ltd reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000038http://jvn.jp/en/jp/JVN15241647/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-27231https://nvd.nist.gov/vuln/detail/CVE-2022-27231https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:veronalabs:wp_statistics2024-06-18T15:41+09:002022-05-24T15:00+09:002024-06-18T15:41+09:00Spring Security OAuth (spring-security-oauth2) vulnerable to denial-of-service (DoS)
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000037.html
Spring Security OAuth (spring-security-oauth2) provided by VMware, Inc. contains a denial-of-service vulnerability due to uncontrolled resource consumption (CWE-400).
Note that Spring Security OAuth (spring-security-oauth2) is no longer supported, therefore Spring Security has been developed as the alternative, and the similar vulnerability known as CVE-2021-22119 was identified but has been addressed.
Macchinetta/TERASOLUNA Framework Development Team:NTT DATA Corporation, NTT COMWARE, and NTT reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000037https://jvn.jp/en/jp/JVN15317878/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-22969https://nvd.nist.gov/vuln/detail/cve-2022-22969https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:vmware:spring_security_oauth2024-06-20T12:09+09:002022-05-20T17:04+09:002024-06-20T12:09+09:00Multiple vulnerabilities in Rakuten Casa
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000036.html
Rakuten Casa provided by Rakuten Mobile, Inc. contains multiple vulnerabilities listed below.
* Use of Hard-coded Credentials (CWE-798) - CVE-2022-29525
* Improper Access Control (CWE-284) - CVE-2022-28704
* Improper Access Control (CWE-284) - CVE-2022-26834
CVE-2022-29525
Narumi Hirai of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2022-28704
Hiroki Oshiro and Tagawa, Masaki reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2022-26834
Tagawa, Masaki reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000036http://jvn.jp/en/jp/JVN46892984/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-29525https://www.cve.org/CVERecord?id=CVE-2022-28704https://www.cve.org/CVERecord?id=CVE-2022-26834https://nvd.nist.gov/vuln/detail/CVE-2022-26834https://nvd.nist.gov/vuln/detail/CVE-2022-28704https://nvd.nist.gov/vuln/detail/CVE-2022-29525https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:rakuten:casa2024-06-18T12:09+09:002022-05-19T15:13+09:002024-06-18T12:09+09:00Multiple vulnerabilities in Cybozu Garoon
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000035.html
Cybozu Garoon provided by Cybozu, Inc. contains multiple vulnerabilities listed below.
* [CyVDB-1584][CyVDB-2670] Operation restriction bypass vulnerability in Bulletin (CWE-285) - CVE-2022-28718
* [CyVDB-1865][CyVDB-2692] Operation restriction bypass vulnerability in Workflow (CWE-285) - CVE-2022-27661
* [CyVDB-2660] Improper input validation vulnerability in Space (CWE-20) - CVE-2022-29892
* [CyVDB-2667] Cross-site scripting vulnerability in Scheduler (CWE-79) - CVE-2022-29513
* [CyVDB-2685] Browse restriction bypass vulnerability in Bulletin (CWE-284) - CVE-2022-29471
* [CyVDB-2689] Operation restriction bypass vulnerability in Portal (CWE-285) - CVE-2022-26051
* [CyVDB-2718] Improper input validation vulnerability in Scheduler (CWE-20) - CVE-2022-28692
* [CyVDB-2839] Improper input validation vulnerability in Space (CWE-20) - CVE-2022-27803
* [CyVDB-2841] Browse restriction bypass and operation restriction bypass vulnerability in Cabinet (CWE-285) - CVE-2022-26368
* [CyVDB-2889] Cross-site scripting vulnerability in Organization's Information (CWE-79) - CVE-2022-27627
* [CyVDB-2897] Operation restriction bypass vulnerability in Link (CWE-285) - CVE-2022-26054
* [CyVDB-2906] Improper input validation vulnerability in Link (CWE-20) - CVE-2022-27807
* [CyVDB-2932] Address information disclosure vulnerability (CWE-200) - CVE-2022-29467
* [CyVDB-2940] Improper authentication vulnerability in Scheduler (CWE-287) - CVE-2022-28713
* [CyVDB-3001] Operation restriction bypass vulnerability in Space (CWE-285) - CVE-2022-29484
* [CyVDB-2911] Browse restriction bypass vulnerability in Cabinet (CWE-284) - CVE-2022-31472
CVE-2022-27627
Masato Kinugawa reported this vulnerability to Cybozu, Inc. and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN.
CVE-2022-26054, CVE-2022-26368, CVE-2022-31472
Yuji Tounai reported these vulnerabilities to Cybozu, Inc. and Cybozu, Inc. reported them to JPCERT/CC to notify users of the solutions through JVN.
CVE-2022-26051, CVE-2022-27661, CVE-2022-27803, CVE-2022-27807, CVE-2022-28692, CVE-2022-28713, CVE-2022-28718, CVE-2022-29467, CVE-2022-29471, CVE-2022-29484, CVE-2022-29513, CVE-2022-29892
Cybozu, Inc. reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.JVNDB-2022-000035http://jvn.jp/en/jp/JVN73897863/index.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26051https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26054https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26368https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27627https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27661https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27803https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27807https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28692https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28713https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28718https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29467https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29471https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29484https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29513https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29892https://www.cve.org/CVERecord?id=CVE-2022-31472https://nvd.nist.gov/vuln/detail/CVE-2022-26051https://nvd.nist.gov/vuln/detail/CVE-2022-26054https://nvd.nist.gov/vuln/detail/CVE-2022-26368https://nvd.nist.gov/vuln/detail/CVE-2022-27627https://nvd.nist.gov/vuln/detail/CVE-2022-27661https://nvd.nist.gov/vuln/detail/CVE-2022-27803https://nvd.nist.gov/vuln/detail/CVE-2022-27807https://nvd.nist.gov/vuln/detail/CVE-2022-28692https://nvd.nist.gov/vuln/detail/CVE-2022-28713https://nvd.nist.gov/vuln/detail/CVE-2022-28718https://nvd.nist.gov/vuln/detail/CVE-2022-29467https://nvd.nist.gov/vuln/detail/CVE-2022-29471https://nvd.nist.gov/vuln/detail/CVE-2022-29484https://nvd.nist.gov/vuln/detail/CVE-2022-29513https://nvd.nist.gov/vuln/detail/CVE-2022-29892https://nvd.nist.gov/vuln/detail/CVE-2022-31472https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlhttps://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:cybozu:garooncpe:/a:cybozu:garooncpe:/a:cybozu:garooncpe:/a:cybozu:garooncpe:/a:cybozu:garooncpe:/a:cybozu:garoon2024-06-17T16:34+09:002022-05-16T14:25+09:002024-06-17T16:34+09:00Strapi vulnerable to cross-site scripting
https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000033.html
Strapi contains a stored cross-site scripting vulnerability (CWE-79) in the file upload function.
Yuta Morioka of Information Science College reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.JVNDB-2022-000033http://jvn.jp/en/jp/JVN44550983/index.htmlhttps://www.cve.org/CVERecord?id=CVE-2022-29894https://nvd.nist.gov/vuln/detail/CVE-2022-29894https://www.ipa.go.jp/en/security/vulnerabilities/cwe.htmlcpe:/a:strapi:strapi2024-06-18T11:17+09:002022-05-13T16:45+09:002024-06-18T11:17+09:00