JVNDB RSS Feed - New Entry https://jvndb.jvn.jp/en/ JVN iPedia New Entry 2024-11-23T17:00:41+09:00 2024-11-23T17:00:41+09:00 Multiple vulnerabilities in Edgecross Basic Software for Windows https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-013260.html Edgecross Basic Software for Windows provided by Edgecross Consortium contains multiple vulnerabilities listed below. * Incorrect default permissions (CWE-276) - CVE-2024-4229 * External control of file name or path (CWE-73) - CVE-2024-4230 Edgecross Consortium reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2024-013260 https://jvn.jp/en/vu/JVNVU92857077/index.html https://www.cve.org/CVERecord?id=CVE-2024-4229 https://www.cve.org/CVERecord?id=CVE-2024-4230 https://cwe.mitre.org/data/definitions/276.html https://cwe.mitre.org/data/definitions/73.html cpe:/a:misc:edgecross_ecp-bs1-w cpe:/a:misc:edgecross_ecp-bs1-w-d 2024-11-22T10:59+09:00 2024-11-22T10:59+09:00 2024-11-22T10:59+09:00 "Kura Sushi Official App Produced by EPARK" for Android uses a hard-coded cryptographic key https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000120.html "Kura Sushi Official App Produced by EPARK" for Android provided by EPARK, Inc. uses a hard-coded cryptographic key (CWE-321). Nishimura Reiji of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000120 https://jvn.jp/en/jp/JVN16114985/index.html https://www.cve.org/CVERecord?id=CVE-2024-52614 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html 2024-11-20T13:56+09:00 2024-11-20T13:56+09:00 2024-11-20T13:56+09:00 Multiple vulnerabilities in Rakuten Turbo 5G https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-012941.html Rakuten Turbo 5G provided by Rakuten Mobile, Inc. contains multiple vulnerabilities listed below. * Missing authentication for critical function (CWE-306) - CVE-2024-47865 * OS command injection (CWE-78) - CVE-2024-48895 * Exposure of sensitive system information to an unauthorized control sphere (CWE-497) - CVE-2024-52033 Samy Younsi of NeroTeam Security Labs reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-012941 https://jvn.jp/en/vu/JVNVU90667116/index.html https://www.cve.org/CVERecord?id=CVE-2024-47865 https://www.cve.org/CVERecord?id=CVE-2024-48895 https://www.cve.org/CVERecord?id=CVE-2024-52033 https://cwe.mitre.org/data/definitions/306.html https://cwe.mitre.org/data/definitions/497.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:rakuten:rakuten_turbo_5g 2024-11-19T10:41+09:00 2024-11-19T10:41+09:00 2024-11-19T10:41+09:00 Multiple vulnerabilities in FitNesse https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000119.html FitNesse provided by unclebob contains multiple vulnerabilities listed below. <ul><li>Cross-site scripting (CWE-79) - CVE-2024-39610</li> <li>Path traversal (CWE-22) - CVE-2024-42499</li></ul> Takeshi Kaneko of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000119 https://jvn.jp/en/jp/JVN36791327/index.html https://www.cve.org/CVERecord?id=CVE-2024-39610 https://www.cve.org/CVERecord?id=CVE-2024-42499 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:fitnesse:fitnesse 2024-11-20T11:18+09:00 2024-11-15T13:37+09:00 2024-11-20T11:18+09:00 Multiple vulnerabilities in SoftBank Mesh Wi-Fi router RP562B https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-012461.html Mesh Wi-Fi router RP562B provided by SoftBank Corp. contains multiple vulnerabilities listed below. * Active debug code (CWE-489) - CVE-2024-29075 * OS command injection (CWE-78) - CVE-2024-45827 * Exposure of sensitive system information to an unauthorized control sphere (CWE-497) - CVE-2024-47799 Samy Younsi of NeroTeam Security Labs reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-012461 https://jvn.jp/en/vu/JVNVU90676195/ https://www.cve.org/CVERecord?id=CVE-2024-29075 https://www.cve.org/CVERecord?id=CVE-2024-45827 https://www.cve.org/CVERecord?id=CVE-2024-47799 https://cwe.mitre.org/data/definitions/489.html https://cwe.mitre.org/data/definitions/497.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:softbank:mesh_wi-fi_router 2024-11-13T14:26+09:00 2024-11-13T14:26+09:00 2024-11-13T14:26+09:00 WordPress Plugin "VK All in One Expansion Unit" vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000118.html "Custom Alert Content" of WordPress Plugin "VK All in One Expansion Unit" provided by Vektor,Inc. contains a stored cross-site scripting vulnerability (CWE-79). Umeda Yuugo of Tokyo Denki University reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000118 https://jvn.jp/en/jp/JVN05136799/index.html https://www.cve.org/CVERecord?id=CVE-2024-52268 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:vektor-inc:vk_all_in_one_expansion_unit 2024-11-13T13:50+09:00 2024-11-13T13:50+09:00 2024-11-13T13:50+09:00 Trend Micro Deep Security 20 Agent for Windows vulnerable to improper access control https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-012017.html Trend Micro Incorporated has released a security update for Deep Security 20 Agent (for Windows) to fix a improper access control vulnerability (CVE-2024-48903). Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN. JVNDB-2024-012017 https://jvn.jp/en/vu/JVNVU96058081/index.html https://www.cve.org/CVERecord?id=CVE-2024-48903 cpe:/a:trendmicro:deep_security_agent 2024-11-06T11:00+09:00 2024-11-06T11:00+09:00 2024-11-06T11:00+09:00 Incorrect authorization vulnerability in OMRON Sysmac Studio https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-011833.html Sysmac Studio provided by OMRON Corporation contains an incorrect authorization vulnerability (CWE-863, CVE-2024-49501). OMRON Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC coordinated with OMRON Corporation for the JVN advisory publication. JVNDB-2024-011833 https://jvn.jp/en/vu/JVNVU95685374/index.html https://www.cve.org/CVERecord?id=CVE-2024-49501 https://cwe.mitre.org/data/definitions/863.html cpe:/a:omron:sysmac-se2 2024-11-05T15:29+09:00 2024-11-05T15:29+09:00 2024-11-05T15:29+09:00 Command injection vulnerability in Trend Micro Cloud Edge https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-011747.html Trend Micro Incorporated has released a security update for Cloud Edge to fix a command injection vulnerability (CVE-2024-48904). Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN. JVNDB-2024-011747 https://jvn.jp/en/vu/JVNVU94153896/index.html https://www.cve.org/CVERecord?id=CVE-2024-48904 cpe:/a:trendmicro:cloud_edge 2024-11-01T14:28+09:00 2024-11-01T14:28+09:00 2024-11-01T14:28+09:00 REST-APIs unintentionally enabled in Century Systems FutureNet NXR series routers https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-011744.html FutureNet NXR series routers provided by Century Systems Co., Ltd. have REST-APIs, which are configured as disabled in the initial (factory default) configuration. But, REST-APIs are unexpectedly enabled when the affected product is powered up, provided either http-server (GUI) or Web authentication is enabled (CWE-684). The factory default configuration makes http-server (GUI) enabled, which means REST-APIs are also enabled. The username and the password for REST-APIs are configured in the factory default configuration. Century Systems Co., Ltd. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2024-011744 https://jvn.jp/en/vu/JVNVU95001899/index.html https://www.cve.org/CVERecord?id=CVE-2024-50357 https://cwe.mitre.org/data/definitions/684.html cpe:/o:centurysys:futurenet_nxr-g050 cpe:/o:centurysys:futurenet_nxr-g060 cpe:/o:centurysys:futurenet_nxr-g110 2024-11-01T13:49+09:00 2024-11-01T13:49+09:00 2024-11-01T13:49+09:00 Stack-based buffer overflow vulnerability in multiple Ricoh laser printers and MFPs which implement Web Image Monitor https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000117.html Web Image Monitor provided by Ricoh Company, Ltd. is an web server included and runs in Ricoh laser printers and MFPs (multifunction printers). Web Image Monitor contains a stack-based buffer overflow vulnerability (CWE-121) due to inappropriate parsing process of HTTP request. Zhihong Tian, Hui Lu, Guocheng Wu, and Xingchi Chen of the Cyberspace Advanced Technology Institute of Guangzhou University reported this vulnerability to Ricoh Company, Ltd. directly and coordinated. After the coordination, Ricoh Company, Ltd. reported this case to IPA under Information Security Early Warning Partnership, and JPCERT/CC coordinated with Ricoh Company, Ltd. for JVN publication. JVNDB-2024-000117 https://jvn.jp/en/jp/JVN87770340/index.html https://www.cve.org/CVERecord?id=CVE-2024-47939 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ricoh:web_image_monitor 2024-10-31T16:44+09:00 2024-10-31T16:44+09:00 2024-10-31T16:44+09:00 Hikvision network camera security enhancement to prevent cleartext transmission of Dynamic DNS credentials https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000116.html Multiple network cameras provided by Hangzhou Hikvision Digital Technology Co., Ltd. support two Dynamic DNS services, DynDNS and NO-IP.The user can select which to use on the GUI configuration page. Both the services provide their APIs accessible via HTTP and HTTPS, but old firmware versions of Hikvision devices only support HTTP.This means the credential information is transmitted in unencrypted form. As a security enhancement, the new firmware versions are provided, which change the behavior to communicate with the APIs via HTTPS only. JVNDB-2024-000116 https://jvn.jp/en/jp/JVN11779839/index.html 2024-10-30T15:07+09:00 2024-10-30T15:07+09:00 2024-10-30T15:07+09:00 Multiple vulnerabilities in Sharp and Toshiba Tec MFPs https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-011256.html MFPs (multifunction printers) provided by Sharp and Toshiba Tec Corporation contain multiple vulnerabilites listed below. <ul> <li>Out-of-bounds Read (CWE-125) <ul> <li>CVE-2024-42420</li> <li>Out-of-bounds read vulnerabilities coming from improper processing of keyword search input and improper processing of&nbsp;SOAP messages</li> </ul> </li> <li>Out-of-bounds Read (CWE-125) <ul> <li>CVE-2024-43424</li> <li>Out-of-bounds read vulnerability coming from improper processing of HTTP request headers</li> </ul> </li> <li>Out-of-bounds Read&nbsp;(CWE-125) <ul> <li>CVE-2024-45829</li> <li>Out-of-bounds read vulnerability in the web page providing data downloading, where query parameters in HTTP requests are improperly processed</li> </ul> </li> <li>Path traversal&nbsp;(CWE-22) <ul> <li>CVE-2024-45842</li> <li>Improper processing of URI data in HTTP PUT requests leads to path traversal vulnerability, unintended internal files may be retrieved</li> </ul> </li> <li>Improper access restriction on some configuration related&nbsp;APIs (CWE-749) <ul> <li>CVE-2024-47005</li> <li>Some configuration related APIs are expected to be called by administrative users only, but insufficiently restricted</li> </ul> </li> <li>Authentication Bypass Using an Alternate Path&nbsp;(CWE-288) <ul> <li>CVE-2024-47406</li> <li>Improper processing of HTTP authentication requests may lead to authentication bypass</li> </ul> </li> <li>Improper processing of query parameters in HTTP requests (CWE-644) <ul> <li>CVE-2024-47549</li> <li>Improper processing of query parameters of HTTP requests may allow contamination of unintended data to HTTP response headers</li> </ul> </li> <li>Reflected Cross-site Scripting (CWE-79) <ul> <li>CVE-2024-47801</li> <li>Reflected cross-site scripting vulnerability coming from improper processing of query parameters in HTTP requests</li> </ul> </li> <li>Stored Cross-site Scripting (CWE-79) <ul> <li>CVE-2024-48870</li> <li>Stored cross-site scripting vulnerability coming from improper input data validation in URI data registration</li> </ul> </li> </ul> Sharp Corporation reported these vulnerabilities to JPCERT/CC to notify users of its solution through JVN. JVNDB-2024-011256 https://jvn.jp/en/vu/JVNVU95063136/index.html https://www.cve.org/CVERecord?id=CVE-2024-42420 https://www.cve.org/CVERecord?id=CVE-2024-43424 https://www.cve.org/CVERecord?id=CVE-2024-45829 https://www.cve.org/CVERecord?id=CVE-2024-45842 https://www.cve.org/CVERecord?id=CVE-2024-47005 https://www.cve.org/CVERecord?id=CVE-2024-47406 https://www.cve.org/CVERecord?id=CVE-2024-47549 https://www.cve.org/CVERecord?id=CVE-2024-47801 https://www.cve.org/CVERecord?id=CVE-2024-48870 https://cwe.mitre.org/data/definitions/125.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/288.html https://cwe.mitre.org/data/definitions/644.html https://cwe.mitre.org/data/definitions/749.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:sharp:multiple_product cpe:/a:toshibatec:multiple_product 2024-10-28T17:33+09:00 2024-10-28T17:33+09:00 2024-10-28T17:33+09:00 Chatwork Desktop Application (Windows) uses a potentially dangerous function https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000115.html Chatwork Desktop Application (Windows) provided by kubell Co., Ltd. contains an issue with use of potentially dangerous function (CWE-676), which allows a user to access an external website via a link in the application. RyotaK of Flatt Security Inc. directly reported this vulnerability to the developer and coordinated. After the coordination was completed, the developer reported this case to IPA under Information Security Early Warning Partnership to notify the users of the solution through JVN, and JPCERT/CC coordinated with the developer for JVN advisory publication. JVNDB-2024-000115 https://jvn.jp/en/jp/JVN78335885/index.html https://www.cve.org/CVERecord?id=CVE-2024-50307 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:kubell_chatwork_desktop_application_for_windows 2024-10-28T14:29+09:00 2024-10-28T14:29+09:00 2024-10-28T14:29+09:00 Multiple vulnerabilities in baserCMS https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000114.html baserCMS provided by baserCMS Users Community contains multiple vulnerabilities listed below.<ul><li>Stored cross-site scripting vulnerability due to inappropriate Slug handling on Article Edit (CWE-79) - CVE-2024-46996</li><li>Stored cross-site scripting vulnerability on Edit Email Form Settings (CWE-79) - CVE-2024-46998</li><li>Reflected cross-site scripting vulnerability due to inadequate error page generation process (CWE-81) - CVE-2024-46995</li><li>Stored cross-site scripting vulnerability due to inappropriate input data handling on Article Edit and Content List (CWE-79) - CVE-2024-46994</li></ul>CVE-2024-46996 Ayato Shitomi of Fore-Z co.ltd and Rikuto Tauchi reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-46998 Ayato Shitomi of Fore-Z co.ltd reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-46995 Yusuke Uchida reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-46994 Kyohei Ota of LEON TECHNOLOGY,Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000114 https://jvn.jp/en/jp/JVN00876083/index.html https://www.cve.org/CVERecord?id=CVE-2024-46996 https://www.cve.org/CVERecord?id=CVE-2024-46998 https://www.cve.org/CVERecord?id=CVE-2024-46995 https://www.cve.org/CVERecord?id=CVE-2024-46994 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:basercms:basercms cpe:/a:basercms:basercms 2024-10-25T15:07+09:00 2024-10-25T15:07+09:00 2024-10-25T15:07+09:00 Multiple SQL injection vulnerabilities in Trend Micro Deep Discovery Inspector https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-010802.html Trend Micro Incorporated has released a security update for Trend Micro Deep Discovery Inspector. Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2024-010802 http://jvn.jp/en/vu/JVNVU93072012/index.html https://www.cve.org/CVERecord?id=CVE-2024-46902 https://www.cve.org/CVERecord?id=CVE-2024-46903 cpe:/a:trendmicro:deep_discovery_inspector 2024-10-22T13:02+09:00 2024-10-22T13:02+09:00 2024-10-22T13:02+09:00 Multiple vulnerabilities in AIPHONE IX SYSTEM, IXG SYSTEM, and System Support Software https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000106.html AIPHONE IX SYSTEM is an IP Network Audio-Video Intercom and IXG SYSTEM is an IP-based Residential System. IX SYSTEM, IXG SYSTEM, and System Support Software contain multiple vulnerabilities listed below. <ul> <li><b>OS command injection (CWE-78)</b> - CVE-2024-31408</li> <li><b>Insufficiently protected credentials (CWE-522)</b> - CVE-2024-39290</li> <li><b>Use of hard-coded cryptographic key (CWE-321)</b> - CVE-2024-45837</li> <li><b>Improper access control (CWE-522)</b> - CVE-2024-47142</li> </ul> Vera Mens of Claroty Research - Team82 reported these vulnerabilities to AIPHONE CO., LTD. and coordinated. After the coordination was completed, AIPHONE CO., LTD. reported this case to IPA to notify users of the solution through JVN. JPCERT/CC coordinated with the developer for the publication. JVNDB-2024-000106 https://jvn.jp/en/jp/JVN41397971/index.html https://www.cve.org/CVERecord?id=CVE-2024-31408 https://www.cve.org/CVERecord?id=CVE-2024-39290 https://www.cve.org/CVERecord?id=CVE-2024-45837 https://www.cve.org/CVERecord?id=CVE-2024-47142 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:aiphone:ix-supporttool cpe:/a:aiphone:ixg-supporttool cpe:/o:aiphone:ix-bau_firmware cpe:/o:aiphone:ix-ba_firmware cpe:/o:aiphone:ix-bbt_firmware cpe:/o:aiphone:ix-bb_firmware cpe:/o:aiphone:ix-bu_firmware cpe:/o:aiphone:ix-dau_firmware cpe:/o:aiphone:ix-da_firmware cpe:/o:aiphone:ix-dbt_firmware cpe:/o:aiphone:ix-db_firmware cpe:/o:aiphone:ix-du_firmware cpe:/o:aiphone:ix-dvf-2ra_firmware cpe:/o:aiphone:ix-dvf-l_firmware cpe:/o:aiphone:ix-dvf-p_firmware cpe:/o:aiphone:ix-dvf-ra_firmware cpe:/o:aiphone:ix-dvf_firmware cpe:/o:aiphone:ix-dvm_firmware cpe:/o:aiphone:ix-dvt_firmware cpe:/o:aiphone:ix-dv_firmware cpe:/o:aiphone:ix-eat_firmware cpe:/o:aiphone:ix-eau_firmware cpe:/o:aiphone:ix-ea_firmware cpe:/o:aiphone:ix-fa_firmware cpe:/o:aiphone:ix-mv7-bt_firmware cpe:/o:aiphone:ix-mv7-b_firmware cpe:/o:aiphone:ix-mv7-hbt_firmware cpe:/o:aiphone:ix-mv7-hb_firmware cpe:/o:aiphone:ix-mv7-hw-jp_firmware cpe:/o:aiphone:ix-mv7-hwt_firmware cpe:/o:aiphone:ix-mv7-hw_firmware cpe:/o:aiphone:ix-mv7-wt_firmware cpe:/o:aiphone:ix-mv7-w_firmware cpe:/o:aiphone:ix-mv_firmware cpe:/o:aiphone:ix-rs-bt_firmware cpe:/o:aiphone:ix-rs-b_firmware cpe:/o:aiphone:ix-rs-wt_firmware cpe:/o:aiphone:ix-rs-w_firmware cpe:/o:aiphone:ix-spmic_firmware cpe:/o:aiphone:ix-ss-2g-n_firmware cpe:/o:aiphone:ix-ss-2gt_firmware cpe:/o:aiphone:ix-ss-2g_firmware cpe:/o:aiphone:ix-ssa-2ra_firmware cpe:/o:aiphone:ix-ssa-ra_firmware cpe:/o:aiphone:ix-ssa_firmware cpe:/o:aiphone:ixg-2c7-l_firmware cpe:/o:aiphone:ixg-2c7_firmware cpe:/o:aiphone:ixg-dm7-10k_firmware cpe:/o:aiphone:ixg-dm7-hida_firmware cpe:/o:aiphone:ixg-dm7-hid_firmware cpe:/o:aiphone:ixg-dm7_firmware cpe:/o:aiphone:ixg-mk_firmware cpe:/o:aiphone:ixgw-gw_firmware cpe:/o:aiphone:ixgw-lc_firmware cpe:/o:aiphone:ixgw-tgw_firmware cpe:/o:aiphone:ixw-ma_firmware 2024-11-21T11:37+09:00 2024-10-21T11:58+09:00 2024-11-21T11:37+09:00 N-LINE vulnerable to HTML injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000113.html N-LINE provided by NEUMANN CO.LTD. is an online learning management system for driving schools. N-LINE processes inputs with insufficient check (CWE-94), and malicious inputs from an student's device may badly impact the instructor's screen. Ayato Shitomi of Fore-Z co.ltd reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000113 https://jvn.jp/en/jp/JVN57285747/index.html https://www.cve.org/CVERecord?id=CVE-2024-47158 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:neumann_n-line 2024-10-25T16:48+09:00 2024-10-18T14:48+09:00 2024-10-25T16:48+09:00 MUSASI version 3 performing authentication on client-side https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000112.html MUSASI provided by NEUMANN CO.LTD. is an e-learning system for driving schools. MUSASI version 3 performs authentication within the client-side code (CWE-603), and the client in pre-authentication state retrieves the credential information from the server just when a user ID is input. This behavior may be exploited to fetch other users' credential information. JVNDB-2024-000112 https://jvn.jp/en/jp/JVN31982676/index.html https://www.cve.org/CVERecord?id=CVE-2024-45785 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:neumann_musasi 2024-10-25T16:55+09:00 2024-10-18T14:40+09:00 2024-10-25T16:55+09:00 SHIRASAGI vulnerable to path traversal https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000111.html SHIRASAGI provided by SHIRASAGI Project processes URLs in HTTP requests improperly, resulting in a path traversal vulnerability (CWE-22). Shogo Kumamaru of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000111 https://jvn.jp/en/jp/JVN58721679/index.html https://www.cve.org/CVERecord?id=CVE-2024-46898 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ss-proj:shirasagi 2024-10-23T17:35+09:00 2024-10-16T14:12+09:00 2024-10-23T17:35+09:00 Multiple vulnerabilities in Exment https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000110.html Exment provided by Kajitori Co.,Ltd contains multiple vulnerabilities listed below. <ul><li>Incorrect Permission Assignment for Critical Resource (CWE-732) - CVE-2024-46897</li> <li>Stored Cross-site Scripting (CWE-79) - CVE-2024-47793</li></ul> CVE-2024-46897 masataka sato of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-47793 Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000110 https://jvn.jp/en/jp/JVN74538317/index.html https://www.cve.org/CVERecord?id=CVE-2024-46897 https://www.cve.org/CVERecord?id=CVE-2024-47793 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:exceedone:exment 2024-10-11T14:13+09:00 2024-10-11T14:13+09:00 2024-10-11T14:13+09:00 baserCMS plugin "BurgerEditor" vulnerable to directory listing https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000109.html baserCMS plugin "BurgerEditor" provided by D-ZERO CO.,LTD. contains a directory listing vulnerability (CWE-548, CVE-2024-44807). If accessing a URL of the web site using the plugin that has a specific string added to the end, a list of uploaded files may be obtained. In addition, the uploaded file itself may be obtained through the list information. Koh You Liang of SOMPO Holdings and Orel Gispan of Sompo Digital Lab Tel Aviv reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000109 https://jvn.jp/en/jp/JVN54676967/index.html https://www.cve.org/CVERecord?id=CVE-2024-44807 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:d-zero_burger_editor 2024-11-06T14:45+09:00 2024-10-10T14:57+09:00 2024-11-06T14:45+09:00 Multiple vulnerabilities in JTEKT ELECTRONICS Kostac PLC Programming Software https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-009667.html Kostac PLC Programming Software provided by JTEKT ELECTRONICS CORPORATION contains multiple vulnerabilities listed below. * Out-of-bounds write (CWE-787) - CVE-2024-47134 * Stack-based buffer overflow (CWE-121) - CVE-2024-47135 * Out-of-bounds read (CWE-125) - CVE-2024-47136 Michael Heinzl reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-009667 https://jvn.jp/en/vu/JVNVU92808077/index.html https://www.cve.org/CVERecord?id=CVE-2024-47134 https://www.cve.org/CVERecord?id=CVE-2024-47135 https://www.cve.org/CVERecord?id=CVE-2024-47136 https://cwe.mitre.org/data/definitions/121.html https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/787.html cpe:/a:jtekt:kostac_plc 2024-10-03T13:42+09:00 2024-10-03T13:42+09:00 2024-10-03T13:42+09:00 Apache Tomcat improper handling of TLS handshake process data https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000108.html Apache Tomcat provided by The Apache Software Foundation improperly handles TLS handshake process data, which may lead to a denial-of-service (DoS) condition (CWE-770, CVE-2024-38286). The reporter, Ozaki of North Grid Corporation, reported this issue directly to and coordinated with the developer. After the coordination, the reporter also reported the case to IPA, and JPCERT/CC coordinated with the developer to publish the advisory on JVN. JVNDB-2024-000108 https://jvn.jp/en/jp/JVN72148744/index.html https://www.cve.org/CVERecord?id=CVE-2024-38286 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:apache:tomcat 2024-10-01T17:51+09:00 2024-10-01T17:51+09:00 2024-10-01T17:51+09:00 Vulnerability in Cosminexus https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-009498.html Vulnerability has been found in Cosminexus. JVNDB-2024-009498 https://www.cve.org/CVERecord?id=CVE-2024-24549 cpe:/a:hitachi:hitachi_application_server_r cpe:/a:hitachi:ucosminexus_application_server cpe:/a:hitachi:ucosminexus_developer cpe:/a:hitachi:ucosminexus_primary_server_base cpe:/a:hitachi:ucosminexus_service_architect cpe:/a:hitachi:ucosminexus_service_platform 2024-10-01T16:01+09:00 2024-10-01T16:01+09:00 2024-10-01T16:01+09:00 Insecure initial password configuration issue in SEIKO EPSON Web Config https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-009481.html Web Config is software that allows users to check the status and change the settings of SEIKO EPSON products, e.g., printers and scanners, via a web browser. In the initial setting no administrative password is set, and when a user connects the device and configures Web Config settings for the first time, the user is requested to set the password. Therefore, when a product is connected to network without the Web Config settings configured, arbitrary password may be set and the device may be operated with an administrative privilege by an attacker (CWE-1188). George Puckett reported this vulnerability to CERT/CC. Requested by CERT/CC, JPCERT/CC coordinated with the developer. JVNDB-2024-009481 https://jvn.jp/en/vu/JVNVU95133448/index.html https://www.cve.org/CVERecord?id= CVE-2024-47295 https://cwe.mitre.org/data/definitions/1188.html cpe:/a:epson:web_config 2024-11-12T10:25+09:00 2024-10-01T14:14+09:00 2024-11-12T10:25+09:00 RevoWorks Cloud vulnerable to unintended process execution https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000107.html RevoWorks Cloud provided by J's Communication Co., Ltd. is software to build a sandbox environment isolated from a client's local environment. In the sandbox environment, the product provides the function enabling execution of web browsers and detection and blocking of unauthorized processes. However, a defect in this function was found which fails to detect unauthorized processes (CWE-863). J's Communication Co., Ltd. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and J's Communication Co., Ltd. coordinated under the Information Security Early Warning Partnership. JVNDB-2024-000107 https://jvn.jp/en/jp/JVN39280069/index.html https://www.cve.org/CVERecord?id=CVE-2024-47560 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:jscom:revoworks_cloudclient 2024-09-30T15:17+09:00 2024-09-30T15:17+09:00 2024-09-30T15:17+09:00 File Permissions Vulnerability in Hitachi Ops Center Common Services https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003932.html File permissions vulnerability exists in Hitachi Ops Center Common Services. * <a href="https://www.cve.org/CVERecord?id=CVE-2024-2819"target="blank">CVE-2024-2819: File permission vulnerability in Hitachi Ops Center Common Services (Display new window)</a> JVNDB-2024-003932 https://www.cve.org/CVERecord?id=CVE-2024-2819 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:ops_center_common_services 2024-09-30T14:15+09:00 2024-09-30T14:15+09:00 2024-09-30T14:15+09:00 Multiple vulnerabilities in Smart-tab https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000105.html Smart-tab provided by TECHNO SUPPORT COMPANY is a multi-functional guest room tablet system for hotels and other accommodation facilities. Smart-tab contains multiple vulnerabilities listed below. * Active debug code (CWE-489) - CVE-2024-41999 * Plaintext storage of a password (CWE-256) - CVE-2024-42496 Shuto Imai of LAC Co., Ltd. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000105 https://jvn.jp/en/jp/JVN42445661/index.html https://www.cve.org/CVERecord?id=CVE-2024-41999 https://www.cve.org/CVERecord?id=CVE-2024-42496 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:techno_support_company_smart_tab 2024-09-30T14:14+09:00 2024-09-30T14:14+09:00 2024-09-30T14:14+09:00 SNMP service is enabled by default in Sharp NEC Display Solutions projectors https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-009396.html Multiple projectors provided by Sharp NEC Display Solutions, Ltd. are configured with SNMP service enabled by default, therefore can be accessed by specifying SNMP community name "public" (CWE-1242 ,CVE-2024-7011). SNMP service configuration (enable/disable) cannot be changed on the management page of the projectors either. This vulnerability was directly reported to Sharp NEC Display Solutions, Ltd. by the reporter. Sharp NEC Display Solutions, Ltd. reported the case to JPCERT/CC to notify users of the solution through JVN. Reporter: JP Hofmeyr of Southern Metropolitan Cemeteries Trust JVNDB-2024-009396 https://jvn.jp/en/vu/JVNVU91077448/index.html https://www.cve.org/CVERecord?id=CVE-2024-7011 https://cwe.mitre.org/data/definitions/1242.html cpe:/a:sharp-nec-displays:multiple_product 2024-09-30T12:46+09:00 2024-09-30T12:46+09:00 2024-09-30T12:46+09:00 MF Teacher Performance Management System vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000104.html MF Teacher Performance Management System provided by Media Fusion Co.,Ltd. contains a cross-site scripting vulnerability (CWE-79). Akira Sumiyoshi, Takuto Matsuhashi, Kei Watanabe, Akio Yamaguchi, Syunji Yazaki and Hideaki Tsuchiya of UEC-CSIRT, The University of Electro-Communications reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000104 https://jvn.jp/en/jp/JVN21176842/index.html https://www.cve.org/CVERecord?id=CVE-2024-41930 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:media_fusion_mf_teacher_performance_management_system 2024-10-10T11:14+09:00 2024-09-27T15:00+09:00 2024-10-10T11:14+09:00 The installer of e-Tax software(common program) vulnerable to privilege escalation https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000103.html The installer of e-Tax software(common program) provided by National Tax Agency contains a vulnerability which allows uploading a malicious DLL to be executed with higher privileges than that of an general user by altering registry (CWE-268). Takashi Yoshikawa of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000103 https://jvn.jp/en/jp/JVN57749899/index.html https://www.cve.org/CVERecord?id=CVE-2024-47045 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:nta:e-tax 2024-09-24T16:12+09:00 2024-09-24T16:12+09:00 2024-09-24T16:12+09:00 Multiple NTT EAST Home GateWay/Hikari Denwa routers fail to restrict access permissions https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000102.html Multiple Home GateWay/Hikari Denwa routers provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION fail to restrict access permissions (CWE-451). Keishi Awata of logicalmixed reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000102 https://jvn.jp/en/jp/JVN78356367/index.html https://www.cve.org/CVERecord?id=CVE-2024-47044 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/h:ntt_east:pr-500mi cpe:/h:ntt_east:rs-500mi cpe:/h:ntt_east:rt-500mi cpe:/o:ntt_east:pr-400mi_firmware cpe:/o:ntt_east:pr-600mi cpe:/o:ntt_east:rt-400mi_firmware cpe:/o:ntt_east:rv-440mi_firmware cpe:/o:ntt_east:rx-600mi 2024-10-18T11:02+09:00 2024-09-24T16:00+09:00 2024-10-18T11:02+09:00 Multiple vulnerabilities in PLANEX COMMUNICATIONS network devices https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000101.html Multiple network devices (network cameras and a router) provided by PLANEX COMMUNICATIONS INC. contain multiple vulnerabilities listed below.<ul><li>Cross-site request forgery (CWE-352) - CVE-2024-45372</li><li>Cross-site scripting vulnerability in the web management page (CWE-79) - CVE-2024-45836</li></ul> CVE-2024-45372 Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. CVE-2024-45836 Ryota Honda, Akihito Takeuchi, Daichi Uezono, Junnosuke Kushibiki, Ryu Kuki, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-000101 https://jvn.jp/en/jp/JVN81966868/index.html https://www.cve.org/CVERecord?id=CVE-2024-45372 https://www.cve.org/CVERecord?id=CVE-2024-45836 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:planex:cs-qr10 cpe:/o:planex:cs-qr20 cpe:/o:planex:cs-qr22 cpe:/o:planex:cs-qr220 cpe:/o:planex:cs-qr300 cpe:/o:planex:mzk-dp300n 2024-09-24T15:26+09:00 2024-09-24T15:26+09:00 2024-09-24T15:26+09:00 Multiple vulnerabilities in TAKENAKA ENGINEERING digital video recorders https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-008391.html Multiple digital video recorders provided by TAKENAKA ENGINEERING CO., LTD. contain multiple vulnerabilities listed below. <ul> <li>Improper authentication (CWE-287) - CVE-2024-41929</li> <li>OS command injection (CWE-78) - CVE-2024-43778</li> <li>Hidden functionality (CWE-912) - CVE-2024-47001</li> </ul> Yoshiki Mori, Ushimaru Hayato, Yuki Umemura and Masaki Kubo of Cybersecurity Research Institute, National Institute of Information and Communications Technology reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-008391 https://jvn.jp/en/vu/JVNVU90142679/index.html https://www.cve.org/CVERecord?id=CVE-2024-41929 https://www.cve.org/CVERecord?id=CVE-2024-43778 https://www.cve.org/CVERecord?id=CVE-2024-47001 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/912.html cpe:/o:misc:takenaka_engineering_ahd04t-a cpe:/o:misc:takenaka_engineering_ahd08t-a cpe:/o:misc:takenaka_engineering_ahd16t-a cpe:/o:misc:takenaka_engineering_hdvr-1600 cpe:/o:misc:takenaka_engineering_hdvr-400 cpe:/o:misc:takenaka_engineering_hdvr-800 cpe:/o:misc:takenaka_engineering_nvr04t-a cpe:/o:misc:takenaka_engineering_nvr08t-a cpe:/o:misc:takenaka_engineering_nvr16t-a 2024-09-19T14:07+09:00 2024-09-19T14:07+09:00 2024-09-19T14:07+09:00 Multiple vulnerabilities in WordPress plugin "Welcart e-Commerce" https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000100.html WordPress plugin "Welcart e-Commerce" provided by Welcart Inc. contains multiple vulnerabilities listed below. <ul><li>SQL injection (CWE-89) - CVE-2024-42404</li><li>Cross-site scripting (CWE-79) - CVE-2024-45366</li></ul>Shogo Kumamaru of LAC CyberLink Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000100 https://jvn.jp/en/jp/JVN19766555/index.html https://www.cve.org/CVERecord?id=CVE-2024-42404 https://www.cve.org/CVERecord?id=CVE-2024-45366 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:welcart:welcart_e-commerce 2024-09-18T14:34+09:00 2024-09-18T14:34+09:00 2024-09-18T14:34+09:00 Assimp vulnerable to heap-based buffer overflow https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000099.html PlyLoader.cpp of Assimp provided by Open Asset Import Library contains a heap-based buffer overflow vulnerability (CWE-122). Yuhei Kawakoya of NTT Security Holdings reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000099 https://jvn.jp/en/jp/JVN42386607/index.html https://www.cve.org/CVERecord?id=CVE-2024-45679 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:open_asset_import_library_assimp 2024-09-18T14:20+09:00 2024-09-18T14:20+09:00 2024-09-18T14:20+09:00 Multiple Alps System Integration products and the OEM products vulnerable to cross-site request forgery https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000095.html Multiple Alps System Integration products and the OEM products contain a cross-site request forgery vulnerability (CWE-352). Yoshiaki komeyama of KOBELCO SYSTEMS CORPORATION reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000095 https://jvn.jp/en/jp/JVN05579230/index.html https://www.cve.org/CVERecord?id=CVE-2024-45504 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hammock:assetview_f cpe:/a:misc:alps_system_integration_intersafe_cats cpe:/a:misc:alps_system_integration_intersafe_gatewayconnection cpe:/a:misc:alps_system_integration_intersafe_logdirector cpe:/a:misc:alps_system_integration_intersafe_lognavigator cpe:/a:misc:alps_system_integration_intersafe_mobilesecurity cpe:/a:misc:alps_system_integration_intersafe_webfilter cpe:/a:misc:axseed_sppm_bizbrower cpe:/a:misc:axseed_sppm_secure_filtering cpe:/a:misc:jmas_kaito_secure_browser cpe:/a:misc:mjs_mjs_web_filtering cpe:/a:motex:lanscope_endpoint_manager_web_filtering cpe:/a:qualitysoft:url_filtering cpe:/a:trendmicro:interscan_webmanager 2024-09-09T16:40+09:00 2024-09-09T16:40+09:00 2024-09-09T16:40+09:00 Pgpool-II vulnerable to information disclosure https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000096.html Pgpool-II is a cluster management tool. Pgpool-II contains an information disclosure vulnerability (CWE-213) in its query cache function. PgPool Global Development Group reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and PgPool Global Development Group coordinated under the Information Security Early Warning Partnership. JVNDB-2024-000096 https://jvn.jp/en/jp/JVN67456481/index.html https://www.cve.org/CVERecord?id=CVE-2024-45624 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:pgpool:pgpool-ii 2024-09-09T14:58+09:00 2024-09-09T14:58+09:00 2024-09-09T14:58+09:00 "@cosme" App fails to restrict custom URL schemes properly https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000094.html "@cosme" App provided by istyle Inc. provides the function to access a requested URL using Custom URL Scheme. The App does not restrict access to the function properly (CWE-939) which may be exploited to direct the App to access any sites. Pantuhong Sorasiri of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000094 https://jvn.jp/en/jp/JVN81570776/index.html https://www.cve.org/CVERecord?id=CVE-2024-45203 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:istyle_Inc_%40cosme_cosmetic_review_%26_ranking_for_android cpe:/a:misc:istyle_Inc_%40cosme_cosmetic_review_%26_ranking_for_ios 2024-09-09T14:20+09:00 2024-09-09T14:20+09:00 2024-09-09T14:20+09:00 WordPress Plugin "Forminator" vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000097.html WordPress Plugin "Forminator" provided by WPMU DEV assists building web forms. When accessing the page including the web form created with Forminator, some information from the URL may be embedded to the web form. This feature processes the embedded information improperly, leading to cross-site scripting vulnerability (CWE-79). Yoshimitsu Kato of Asterisk Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000097 https://jvn.jp/en/jp/JVN65724976/index.html https://www.cve.org/CVERecord?id=CVE-2024-45625 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html 2024-09-09T13:51+09:00 2024-09-09T13:51+09:00 2024-09-09T13:51+09:00 Multiple products from KINGSOFT JAPAN vulnerable to path traversal https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000098.html KINGSOFT JAPAN, INC. provides Kingsoft Office Software&#39;s WPS Office and its related products localized for Japan.<br /> WPS Office and its related products provided by KINGSOFT JAPAN, INC. contain a path traversal vulnerability (CWE-22, CVE-2024-7262, CVE-2024-7263)) due to inadequate file path validation by promecefpluginhost.exe.<br /> Note that, a report has been published describing that &quot;WPS Office&nbsp;provided by Kingsoft Office Software is affected to this vulnerability and exploitation is observed&quot;.<br /> KINGSOFT JAPAN, INC. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and KINGSOFT JAPAN, INC. coordinated under the Information Security Early Warning Partnership. JVNDB-2024-000098 https://jvn.jp/en/jp/JVN32529796/index.html https://www.cve.org/CVERecord?id=CVE-2024-7262 https://www.cve.org/CVERecord?id=CVE-2024-7263 https://www.welivesecurity.com/en/eset-research/analysis-of-two-arbitrary-code-execution-vulnerabilities-affecting-wps-office/ https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:kingsoft:pdf_pro cpe:/a:kingsoft:wps_cloud cpe:/a:kingsoft:wps_cloud_pro cpe:/a:kingsoft:wps_office2_for_Windows 2024-09-06T15:07+09:00 2024-09-06T15:07+09:00 2024-09-06T15:07+09:00 Secure Boot bypass Vulnerability in PRIMERGY https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000090.html PRIMERGY is an IA server provided by Fsas Technologies Inc. PRIMERGY contains a vulnerability where Secure Boot function is bypassed. This is due to a vulnerability called "PKFail" (CVE-2024-8105), which was publicly disclosed by Binarly. Fsas Technologies Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Fsas Technologies Inc. coordinated under the Information Security Early Warning Partnership. JVNDB-2024-000090 https://jvn.jp/en/jp/JVN49873988/index.html https://www.cve.org/CVERecord?id=CVE-2024-8105 https://kb.cert.org/vuls/id/455367 https://www.binarly.io/blog/pkfail-untrusted-platform-keys-undermine-secure-boot-on-uefi-ecosystem https://22222483.fs1.hubspotusercontent-na1.net/hubfs/22222483/Reports/PKfail%20-%20Binarly%20Research%20Report%20July%2025%202024.pdf https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:fsas_technologies_primergy_gx2460_m1 cpe:/a:misc:fsas_technologies_primergy_gx2570_m6 2024-09-06T14:39+09:00 2024-09-06T14:39+09:00 2024-09-06T14:39+09:00 WordPress Plugin "Advanced Custom Fields" vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000093.html The field labels in WordPress Plugin "Advanced Custom Fields" provided by WP Engine contains a cross-site scripting vulnerability (CWE-79). Ryo Sotoyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000093 https://jvn.jp/en/jp/JVN67963942/index.html https://www.cve.org/CVERecord?id=CVE-2024-45429 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:advancedcustomfields:advanced_custom_fields 2024-09-04T13:01+09:00 2024-09-04T13:01+09:00 2024-09-04T13:01+09:00 Panasonic Control FPWIN Pro7 vulnerable to stack-based buffer overflow https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-007002.html Control FPWIN Pro7 provided by Panasonic contains a stack-based buffer overflow vulnerability (CWE-121, CVE-2024-7013). Michael Heinzl reported this vulnerability to the developer and coordinated. After the coordination was completed, Panasonic reported the case to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2024-007002 https://jvn.jp/en/vu/JVNVU99905584/index.html https://www.cve.org/CVERecord?id=CVE-2024-7013 https://cwe.mitre.org/data/definitions/121.html cpe:/a:panasonic:fpwin_pro 2024-09-02T14:57+09:00 2024-09-02T14:57+09:00 2024-09-02T14:57+09:00 IPCOM vulnerable to information disclosure https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000091.html SSL Accelerator/SSL-VPN Function of IPCOM provided by Fsas Technologies Inc. contains an information disclosure vulnerability due to observable timing discrepancy (CWE-208). Fsas Technologies Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Fsas Technologies Inc. coordinated under the Information Security Early Warning Partnership. JVNDB-2024-000091 https://jvn.jp/en/jp/JVN29238389/index.html https://www.cve.org/CVERecord?id=CVE-2024-39921 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:fsas_technologies_ipcom cpe:/a:misc:fsas_technologies_ipcom 2024-08-30T14:56+09:00 2024-08-30T14:56+09:00 2024-08-30T14:56+09:00 Multiple vulnerabilities in WordPress plugin "Carousel Slider" https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000092.html WordPress plugin "Carousel Slider" provided by Sayful Islam contains 2 CSRF vulnerabilities listed below. * Cross-site request forgery on Carousel image selection feature (CWE-352) - CVE-2024-45269 * Cross-site request forgery on Hero image selection feature (CWE-352) - CVE-2024-45270 RyotaK of Flatt Security Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000092 https://jvn.jp/en/jp/JVN25264194/index.html https://www.cve.org/CVERecord?id=CVE-2024-45269 https://www.cve.org/CVERecord?id=CVE-2024-45270 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html 2024-08-30T13:58+09:00 2024-08-30T13:58+09:00 2024-08-30T13:58+09:00 WindLDR and WindO/I-NV4 store sensitive information in cleartext https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000089.html PLC programming software "WindLDR" and Operator Interfaces' Touchscreen Programming Software "WindO/I-NV4" provided by IDEC Corporation store sensitive information in cleartext form (CWE-312). Yuki Meguro of Toinx Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000089 https://jvn.jp/en/jp/JVN08342147/index.html https://www.cve.org/CVERecord?id=CVE-2024-41716 https://www.cisa.gov/news-events/ics-advisories/icsa-24-263-03 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:idec:windldr cpe:/a:idec:windoi 2024-09-24T17:14+09:00 2024-08-29T15:08+09:00 2024-09-24T17:14+09:00 xfpt vulnerable to stack-based buffer overflow https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-006787.html xfpt fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability (CWE-121). Yuhei Kawakoya of NTT Security Holdings Corporation reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-006787 https://jvn.jp/en/vu/JVNVU96498690/index.html https://www.cve.org/CVERecord?id=CVE-2024-43700 https://cwe.mitre.org/data/definitions/121.html cpe:/a:misc:philip_hazel_xfpt 2024-08-29T14:07+09:00 2024-08-29T14:07+09:00 2024-08-29T14:07+09:00 Multiple vulnerabilities in ELECOM wireless LAN routers and access points https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000088.html Multiple wireless LAN routers and access points provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below. * Cross-site scripting vulnerability due to an improper processing of input values in easysetup.cgi and menu.cgi (CWE-79) - CVE-2024-34577, CVE-2024-42412 * Missing authentication in Telnet function (CWE-306) - CVE-2024-39300 * Stack-based buffer overflow due to an improper processing of input values in common.cgi (CWE-121) - CVE-2024-43689 CVE-2024-34577 Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-39300 SASABE Tetsuro reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-42412, CVE-2024-43689 RyotaK of Flatt Security Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000088 https://jvn.jp/en/jp/JVN24885537/index.html https://www.cve.org/CVERecord?id=CVE-2024-34577 https://www.cve.org/CVERecord?id=CVE-2024-39300 https://www.cve.org/CVERecord?id=CVE-2024-42412 https://www.cve.org/CVERecord?id=CVE-2024-43689 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:elecom:wab-i1750-ps cpe:/a:elecom:wab-s1167-ps cpe:/o:elecom:wrc-x3000gs2-b_firmware cpe:/o:elecom:wrc-x3000gs2-w_firmware cpe:/o:elecom:wrc-x3000gs2a-b_firmware 2024-08-27T14:40+09:00 2024-08-27T14:40+09:00 2024-08-27T14:40+09:00 Authentication Bypass Vulnerability in Hitachi Ops Center Common Services https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-006646.html Authentication bypass vulnerability exists in Hitachi Ops Center Common Services. JVNDB-2024-006646 https://www.cve.org/CVERecord?id=CVE-2024-7125 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:ops_center_common_services 2024-08-27T12:01+09:00 2024-08-27T12:01+09:00 2024-08-27T12:01+09:00 Unquoted Service Path in Hitachi Device Manager https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-006367.html Hitachi Device Manager contain the following vulnerabilities: <a href=" https://www.cve.org/CVERecord?id=CVE-2024-5963"target="blank"> CVE-2024-5963: An unquoted executable path exists in Hitachi Device Manager (Display new window)</a> JVNDB-2024-006367 https://www.cve.org/CVERecord?id=CVE-2024-5963 https://cwe.mitre.org/data/definitions/428.html cpe:/a:hitachi:device_manager 2024-08-26T16:27+09:00 2024-08-26T16:27+09:00 2024-08-26T16:27+09:00 BUFFALO wireless LAN routers and wireless LAN repeaters vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000087.html Wireless LAN routers and wireless LAN repeaters provided by BUFFALO INC. contain an OS command injection vulnerability (CWE-78). Yoshiki Mori and Masaki Kubo of National Institute of Information and Communications Technology, Cybersecurity Research Laboratory reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000087 https://jvn.jp/en/jp/JVN12824024/index.html https://www.cve.org/CVERecord?id=CVE-2024-44072 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/h:buffalo_inc:whr-1166dhp cpe:/h:buffalo_inc:whr-300hp2 cpe:/h:buffalo_inc:whr-600d cpe:/h:buffalo_inc:wmr-300 cpe:/h:buffalo_inc:wsr-600dhp cpe:/o:buffalo_inc:wex-1166dhp cpe:/o:buffalo_inc:wex-1166dhp2 cpe:/o:buffalo_inc:wex-1166dhps cpe:/o:buffalo_inc:wex-300hps%2Fn cpe:/o:buffalo_inc:wex-300hptx%2Fn cpe:/o:buffalo_inc:wex-733dhp cpe:/o:buffalo_inc:wex-733dhp2 cpe:/o:buffalo_inc:wex-733dhps cpe:/o:buffalo_inc:wex-733dhptx cpe:/o:buffalo_inc:whr-1166dhp2 cpe:/o:buffalo_inc:whr-1166dhp3 cpe:/o:buffalo_inc:whr-1166dhp4 cpe:/o:buffalo_inc:wsr-1166dhp3 2024-08-23T14:17+09:00 2024-08-23T14:17+09:00 2024-08-23T14:17+09:00 Multiple Safie products vulnerable to improper server certificate verification https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000086.html Multiple Safie products are vulnerable to improper server certificate verification (CWE-295). The product can be operated via port 11029/TCP and Bluetooth, and its communications are AES encrypted. The product user can obtain the encryption key from the cloud server based on the device-specific information. The user who has obtained the device-specific information can directly operate the device (even if it is not owned by the user). Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000086 https://jvn.jp/en/jp/JVN83440451/index.html https://www.cve.org/CVERecord?id=CVE-2024-39771 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:safie_qbic_cloud_cc-2l cpe:/a:misc:safie_safie_one 2024-08-29T12:23+09:00 2024-08-22T13:51+09:00 2024-08-29T12:23+09:00 Installer of Trend Micro Security 2020 (Consumer) may insecurely load Dynamic Link Libraries https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-007305.html Installers of Trend Micro Security 2020 (Consumer) family may insecurely load Dynamic Link Libraries. Multiple products provided by Trend Micro Incorporated contain the DLL search path issue, which may lead to insecurely loading Dynamic Link Libraries (CWE-427). Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2020-007305 https://jvn.jp/en/vu/JVNVU98423028/index.html https://jvn.jp/en/ta/JVNTA91240916/index.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15602 https://nvd.nist.gov/vuln/detail/CVE-2020-15602 https://cwe.mitre.org/data/definitions/426.html https://cwe.mitre.org/data/definitions/427.html cpe:/a:trendmicro:antivirus%2B cpe:/a:trendmicro:internet_security_2020 cpe:/a:trendmicro:maximum_security_2020 cpe:/a:trendmicro:premium_security_2020 2024-08-22T11:33+09:00 2024-08-22T11:33+09:00 2024-08-22T11:33+09:00 Packetbeat vulnerable to denial-of-service (DoS) https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-009536.html Packetbeat provided by Elastic contains a denial-of-service (DoS) vulnerability. Packetbeat provided by Elastic is a network packet analyzer. Packetbeat contains a flaw in processing the PostgreSQL handler (CWE-129) . JVNDB-2017-009536 https://jvn.jp/en/vu/JVNVU94371484/index.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11480 https://nvd.nist.gov/vuln/detail/CVE-2017-11480 https://cwe.mitre.org/data/definitions/129.html cpe:/a:elasticsearch:packetbeat 2024-08-21T17:54+09:00 2024-08-21T17:54+09:00 2024-08-21T17:54+09:00 Multiple vulnerabilities in LogonTracer https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-009127.html LogonTracer provided by JPCERT Coordination Center is a tool to investigate malicious Windows logon by visualizing and analyzing Windows event log. LogonTracer contains multiple vulnerabilities listed below. * Cross-site Scripting (CWE-79) - CVE-2018-16165 CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Base Score: 6.1 CVSS v2 AV:N/AC:M/Au:N/C:N/I:P/A:N Base Score: 4.3 * XXE (XML External Entity) Injection (CWE-611) - CVE-2018-16166 CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:L Base Score: 6.1 CVSS v2 AV:N/AC:L/Au:N/C:P/I:N/A:N Base Score: 5.0 * OS Command Injection (CWE-78) - CVE-2018-16167 CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Base Score: 10.0 CVSS v2 AV:N/AC:L/Au:N/C:P/I:P/A:P Base Score: 7.5 * Code Injection (CWE-94) - CVE-2018-16168 CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Base Score: 10.0 CVSS v2 AV:N/AC:L/Au:N/C:P/I:P/A:P Base Score: 7.5 Shoji Baba of Kobe Digital Labo, Inc. reported these vulnerabilities to JPCERT/CC, and JPCERT/CC fixed those vulnerabilities and released the updated version of software. JVNDB-2018-009127 https://jvn.jp/en/vu/JVNVU98026636/index.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16165 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16166 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16168 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16167 https://nvd.nist.gov/vuln/detail/CVE-2018-16165 https://nvd.nist.gov/vuln/detail/CVE-2018-16166 https://nvd.nist.gov/vuln/detail/CVE-2018-16167 https://nvd.nist.gov/vuln/detail/CVE-2018-16168 https://cwe.mitre.org/data/definitions/611.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:jpcert:logontracer 2024-08-21T17:37+09:00 2024-08-21T17:37+09:00 2024-08-21T17:37+09:00 A vulnerability in TOYOTA MOTOR's DCU (Display Control Unit) https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-002957.html TOYOTA MOTOR's DCU contains a vulnerability which is triggered by BlueBorne vulnerability. TOYOTA MOTER CORPORATION reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2020-002957 https://jvn.jp/en/vu/JVNVU99396686/index.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5551 https://nvd.nist.gov/vuln/detail/CVE-2020-5551 https://www.kb.cert.org/vuls/id/240311/ https://keenlab.tencent.com/en/2020/03/30/Tencent-Keen-Security-Lab-Experimental-Security-Assessment-on-Lexus-Cars/ https://cwe.mitre.org/data/definitions/276.html cpe:/h:toyota:display_control_unit 2024-08-20T18:12+09:00 2024-08-20T18:12+09:00 2024-08-20T18:12+09:00 Trend Micro Security (Consumer) Driver vulnerable to Out-of-bounds Read https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-007306.html Trend Micro Security (Consumer) Driver is vulnerable to Out-of-bounds Read. Multiple products provided by Trend Micro Incorporated contain Out-of-bounds Read vulnerability (CWE-125). Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2020-007306 https://jvn.jp/en/vu/JVNVU94105662/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15603 https://nvd.nist.gov/vuln/detail/CVE-2020-15603 https://cwe.mitre.org/data/definitions/125.html cpe:/a:trendmicro:antivirus%2B cpe:/a:trendmicro:internet_security_2020 cpe:/a:trendmicro:maximum_security_2020 cpe:/a:trendmicro:premium_security_2020 2024-08-20T17:52+09:00 2024-08-20T17:52+09:00 2024-08-20T17:52+09:00 "Rakuten Ichiba App" fails to restrict custom URL schemes properly https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000085.html "Rakuten Ichiba App" provided by Rakuten Group, Inc. provides the function to access a requested URL using Custom URL Scheme. The App does not restrict access to the function properly (CWE-939) which may be exploited to direct the App to access any sites. Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000085 https://jvn.jp/en/jp/JVN56648919/index.html https://www.cve.org/CVERecord?id=CVE-2024-41918 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:rakuten_group_rakuten_ichiba_shopping_app_for_android cpe:/a:misc:rakuten_group_rakuten_ichiba_shopping_app_for_ios 2024-08-20T16:56+09:00 2024-08-20T16:56+09:00 2024-08-20T16:56+09:00 EL Injection Vulnerability in Hitachi Tuning Manager https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-005167.html An EL Injection Vulnerability exists in Hitachi Tuning Manager. <a href="https://www.cve.org/CVERecord?id=CVE-2024-5828"target="blank">CVE-2024-5828:EL Injection Vulnerability in Hitachi Tuning Manager (Display new window)</a> JVNDB-2024-005167 https://www.cve.org/CVERecord?id=CVE-2024-5828 https://cwe.mitre.org/data/definitions/917.html cpe:/a:hitachi:tuning_manager 2024-08-15T09:38+09:00 2024-08-15T09:38+09:00 2024-08-15T09:38+09:00 WAON service app for Android fails to verify SSL server certificates https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000124.html WAON service app for Android provided by AEON CO., LTD. fails to verify SSL server certificates. Gaku Taniguchi of RiskFinder,inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2016-000124 https://jvn.jp/en/jp/JVN68364327/index.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4832 https://nvd.nist.gov/vuln/detail/CVE-2016-4832 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:aeon:waon 2024-08-15T09:36+09:00 2024-08-15T09:36+09:00 2024-08-15T09:36+09:00 Firmware update for RICOH JavaTM Platform resets the TLS configuration https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000083.html JavaTM Platform provided by Ricoh Company, Ltd. is the execution environment for firmware extensions of Ricoh MFPs and printers, providing TLS (Transport Layer Security) communication mechanism. When the firmware for JavaTM Platform is updated from Ver.12.89 or earlier versions to a newer version, the TLS configuration is reset to "TLS 1.0: enabled" and "TLS 1.1: enabled" (CWE-1188). Ricoh Company, Ltd. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Ricoh Company, Ltd. coordinated under the Information Security Early Warning Partnership. JVNDB-2024-000083 https://jvn.jp/en/jp/JVN78728294/index.html https://www.cve.org/CVERecord?id=CVE-2024-41995 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ricoh:javatm_platform 2024-08-06T15:13+09:00 2024-08-06T15:13+09:00 2024-08-06T15:13+09:00 Cybozu Office vulnerable to bypass browsing restrictions in Custom App https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000079.html Cybozu Office provided by Cybozu, Inc. contains a vulnerability which allows to bypass browsing restrictions in Custom App (CWE-201). Cybozu, Inc. reported this vulnerability to JPCERT/CC to notify users of the solution through JVN. JVNDB-2024-000079 https://jvn.jp/en/jp/JVN29845579/index.html https://www.cve.org/CVERecord?id=CVE-2024-39817 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:cybozu:office 2024-08-06T14:59+09:00 2024-08-06T14:59+09:00 2024-08-06T14:59+09:00 Pimax Play and PiTool accept WebSocket connections from unintended endpoints https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000082.html Pimax Play and PiTool provided by Pimax accept WebSocket connections from unintended endpoints (CWE-923). Rei Yano reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000082 https://jvn.jp/en/jp/JVN50850706/index.html https://www.cve.org/CVERecord?id=CVE-2024-41889 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:pimax_pimax_play cpe:/a:misc:pimax_pitool 2024-08-05T13:58+09:00 2024-08-05T13:58+09:00 2024-08-05T13:58+09:00 Multiple vulnerabilities in ZEXELON ZWX-2000CSW2-HN https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000084.html ZWX-2000CSW2-HN provided by ZEXELON CO., LTD. is a high-speed coaxial modem with wireless LAN functions. ZWX-2000CSW2-HN contains multiple vulnerabilities listed below. <ul> <li>Use of hard-coded credentials (CWE-798) - CVE-2024-39838</li> <li>Incorrect permission assignment for critical resource (CWE-732) - CVE-2024-41720</li> </ul> Hiroki Sato of Tokyo Institute of Technology reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000084 https://jvn.jp/en/jp/JVN70666401/index.html https://www.cve.org/CVERecord?id=CVE-2024-39838 https://www.cve.org/CVERecord?id=CVE-2024-41720 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:zexelon_zwx-2000csw2-hn 2024-08-05T13:46+09:00 2024-08-05T13:46+09:00 2024-08-05T13:46+09:00 FFRI AMC vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000077.html FFRI AMC provided by FFRI Security, Inc. is a management console for the endpoint security product FFRI yarai and ActSecure X. FFRI AMC contains an OS command injection vulnerability (CWE-78). It is exploitable when the notification program setting is enabled, the executable file path is configured with a batch file (.bat) or command file (.cmd), and the file is written in a certain style. FFRI Security, Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and FFRI Security, Inc. coordinated under the Information Security Early Warning Partnership. JVNDB-2024-000077 https://jvn.jp/en/jp/JVN26734798/index.html https://www.cve.org/CVERecord?id=CVE-2024-40895 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ffri:ffri_amc cpe:/a:nec:ffri_amc cpe:/a:skygroup:edr_plus_pack 2024-07-30T16:40+09:00 2024-07-30T16:40+09:00 2024-07-30T16:40+09:00 Multiple vulnerabilities in ELECOM wireless LAN routers https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000078.html Multiple wireless LAN routers provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below. Unrestricted Upload of File with Dangerous Type (CWE-434) CVE-2024-34021 OS Command Injection (CWE-78) CVE-2024-39607 Cross-Site Request Forgery (CWE-352) CVE-2024-40883 CVE-2024-34021 Toyama Taku, and Daichi Arai of NEC Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-39607, CVE-2024-40883 Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000078 https://jvn.jp/en/jp/JVN06672778/ https://www.cve.org/CVERecord?id=CVE-2024-34021 https://www.cve.org/CVERecord?id=CVE-2024-39607 https://www.cve.org/CVERecord?id=CVE-2024-40883 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:elecom:wrc-2533gs2-b_firmware cpe:/o:elecom:wrc-2533gs2-w_firmware cpe:/o:elecom:wrc-2533gs2v-b_firmware cpe:/o:elecom:wrc-x1500GS-B cpe:/o:elecom:wrc-x1500GSA-B cpe:/o:elecom:wrc-x3000gs2-b_firmware cpe:/o:elecom:wrc-x3000gs2-w_firmware cpe:/o:elecom:wrc-x3000gs2a-b_firmware cpe:/o:elecom:wrc-x6000xs-g_firmware cpe:/o:elecom:wrc-x6000xst-g_firmware 2024-09-24T17:04+09:00 2024-07-30T15:34+09:00 2024-09-24T17:04+09:00 EC-CUBE plugin (for EC-CUBE 4 series) "EC-CUBE Web API Plugin" vulnerable to stored cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000081.html EC-CUBE plugin (for EC-CUBE 4 series) "EC-CUBE Web API Plugin" provided by EC-CUBE CO.,LTD. contains a stored cross-site scripting vulnerability (CWE-79) in OAuth Management feature. EC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership. JVNDB-2024-000081 https://jvn.jp/en/jp/JVN26225832/index.html https://www.cve.org/CVERecord?id=CVE-2024-41141 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ec-cube:ec-cube_web_api 2024-07-30T14:06+09:00 2024-07-30T14:06+09:00 2024-07-30T14:06+09:00 EC-CUBE 4 Series improper input validation when installing plugins https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000080.html EC-CUBE 4 series provided by EC-CUBE CO.,LTD improperly validates inputs when installing plugins (CWE-349). EC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership. JVNDB-2024-000080 https://jvn.jp/en/jp/JVN48324254/index.html https://www.cve.org/CVERecord?id=CVE-2024-41924 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ec-cube:ec-cube 2024-07-30T13:56+09:00 2024-07-30T13:56+09:00 2024-07-30T13:56+09:00 Multiple vulnerabilities in FutureNet NXR series, VXR series and WXR series https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-004595.html FutureNet NXR series, VXR series and WXR series provided by Century Systems Co., Ltd. contain multiple vulnerabilities listed below. * Initialization of a Resource with an Insecure Default (CWE-1188) CVE-2024-31070 * Active Debug Code (CWE-489) CVE-2024-36475 * OS Command Injection (CWE-78) CVE-2024-36491 * Buffer Overflow (CWE-120) CVE-2020-10188 The product uses previous versions of netkit-telnet which contains a known vulnerability. CVE-2024-31070, CVE-2024-36475 Katsuhiko Sato(a.k.a. goroh_kun) of 00One, Inc. reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. CVE-2024-36491, CVE-2020-10188 Century Systems Co., Ltd. reported these vulnerabilities to JPCERT/CC to notify users of its solution through JVN. JVNDB-2024-004595 https://jvn.jp/en/vu/JVNVU96424864/index.html https://www.cve.org/CVERecord?id=CVE-2024-31070 https://www.cve.org/CVERecord?id=CVE-2024-36475 https://www.cve.org/CVERecord?id=CVE-2024-36491 https://www.cve.org/CVERecord?id=CVE-2020-10188 https://cwe.mitre.org/data/definitions/1188.html https://cwe.mitre.org/data/definitions/120.html https://cwe.mitre.org/data/definitions/489.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:centurysys:futurenet_nxr-120/c cpe:/o:centurysys:futurenet_nxr-1200 cpe:/o:centurysys:futurenet_nxr-125/cx cpe:/o:centurysys:futurenet_nxr-130/c cpe:/o:centurysys:futurenet_nxr-1300 cpe:/o:centurysys:futurenet_nxr-155/c cpe:/o:centurysys:futurenet_nxr-160/lw cpe:/o:centurysys:futurenet_nxr-230/c cpe:/o:centurysys:futurenet_nxr-350/c cpe:/o:centurysys:futurenet_nxr-530 cpe:/o:centurysys:futurenet_nxr-610x cpe:/o:centurysys:futurenet_nxr-650 cpe:/o:centurysys:futurenet_nxr-g050 cpe:/o:centurysys:futurenet_nxr-g060 cpe:/o:centurysys:futurenet_nxr-g100 cpe:/o:centurysys:futurenet_nxr-g110 cpe:/o:centurysys:futurenet_nxr-g120 cpe:/o:centurysys:futurenet_nxr-g180/l-ca cpe:/o:centurysys:futurenet_nxr-g200 cpe:/o:centurysys:futurenet_vxr/x64 cpe:/o:centurysys:futurenet_vxr/x86 cpe:/o:centurysys:futurenet_wxr-250 2024-07-29T17:51+09:00 2024-07-29T17:51+09:00 2024-07-29T17:51+09:00 SDoP contains a stack-based buffer overflow vulnerability. https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000076.html SDoP fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability (CWE-121). Yuhei Kawakoya of NTT Security Holdings reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000076 https://jvn.jp/en/jp/JVN16420523/ https://www.cve.org/CVERecord?id=CVE-2024-41881 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:philip_hazel_sdop 2024-07-29T17:24+09:00 2024-07-29T17:24+09:00 2024-07-29T17:24+09:00 Multiple vulnerabilities in SKYSEA Client View https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000074.html SKYSEA Client View provided by Sky Co.,LTD. is an Enterprise IT Asset Management Tool. SKYSEA Client View contains multiple vulnerabilities listed below. <ul> <li>Improper access control in the specific process (CWE-266) - CVE-2024-41139</li> <li>Origin validation error in shared memory data exchanges (CWE-346) - CVE-2024-41143</li> <li>Path traversal (CWE-22) - CVE-2024-41726</li> </ul> Ruslan Sayfiev, and Denis Faiustov of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to Sky Co.,LTD. and coordinated. Sky Co.,LTD. and JPCERT/CC published respective advisories in order to notify users of the solutions through JVN. JVNDB-2024-000074 https://jvn.jp/en/jp/JVN84326763/index.html https://www.cve.org/CVERecord?id=CVE-2024-41139 https://www.cve.org/CVERecord?id=CVE-2024-41143 https://www.cve.org/CVERecord?id=CVE-2024-41726 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:skygroup:skysea_client_view cpe:/a:skygroup:skysea_client_view cpe:/a:skygroup:skysea_client_view 2024-07-31T14:12+09:00 2024-07-29T15:28+09:00 2024-07-31T14:12+09:00 Multiple products from Check Point Software Technologies vulnerable to information disclosure https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-004623.html Multiple products from Check Point Software Technologies contain an information disclosure vulnerability (CWE-200,<a href="https://www.cve.org/CVERecord?id=CVE-2024-24919"target="blank">CVE-2024-24919</a>). JPCERT/CC coordinated with Check Point Software Technologies to publish this advisory in order to notify users of this vulnerability. JVNDB-2024-004623 https://jvn.jp/en/vu/JVNVU98330908/index.html https://www.cve.org/CVERecord?id=CVE-2024-24919 https://nvd.nist.gov/vuln/detail/CVE-2024-24919 https://www.jpcert.or.jp/newsflash/2024053001.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:checkpoint:cloudguard_network_security cpe:/a:checkpoint:quantum_scalable_chassis cpe:/a:checkpoint:quantum_security_gateways cpe:/o:checkpoint:quantum_maestro cpe:/o:checkpoint:quantum_spark_firmware 2024-10-24T16:37+09:00 2024-07-29T10:23+09:00 2024-10-24T16:37+09:00 ORC vulnerable to stack-based buffer overflow https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000075.html ORC provided by GStreamer is typically used when developing GStreamer plugins. Stack-based buffer overflow vulnerability (CWE-121) exists in orcparse.c of ORC. Yuhei Kawakoya of NTT Security Holdings reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000075 https://jvn.jp/en/jp/JVN02030803/index.html https://www.cve.org/CVERecord?id=CVE-2024-40897 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:gstreamer_project:orc 2024-07-26T13:55+09:00 2024-07-26T13:55+09:00 2024-07-26T13:55+09:00 Assimp vulnerable to heap-based buffer overflow https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000073.html Assimp provided by Open Asset Import Library contains a heap-based buffer overflow vulnerability (CWE-122). Yuhei Kawakoya of NTT Security Holdings reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000073 https://jvn.jp/en/jp/JVN87710540/index.html https://www.cve.org/CVERecord?id=CVE-2024-40724 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:open_asset_import_library_assimp 2024-07-18T13:44+09:00 2024-07-18T13:44+09:00 2024-07-18T13:44+09:00 Cybozu Garoon vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000072.html Cybozu Garoon provided by Cybozu, Inc. contains a cross-site scripting vulnerability in PDF preview (CWE-79). Masato Kinugawa reported this vulnerability to Cybozu, Inc. and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN. JVNDB-2024-000072 https://jvn.jp/en/jp/JVN74825766/index.html https://www.cve.org/CVERecord?id=CVE-2024-39457 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:cybozu:garoon 2024-07-16T16:14+09:00 2024-07-16T16:14+09:00 2024-07-16T16:14+09:00 FUJITSU Network Edgiot GW1500 vulnerable to path traversal https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000071.html FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS) provided by Fujitsu Limited contains a path traversal vulnerability (CWE-22). Eddy HUYNH & Jonathan PAUC from LCIE - BUREAU VERITAS CPS reported this vulnerability to Fujitsu Limited and coordinated. After the coordination was completed, Fujitsu Limited reported the case to JPCERT/CC to notify users of the solution through JVN. JVNDB-2024-000071 https://jvn.jp/en/jp/JVN25583987/index.html https://www.cve.org/CVERecord?id=CVE-2024-40617 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:fujitsu:fujitsu_network_edgiot_gw1500_%28m2m-gw_for_fenics%29 2024-07-16T14:41+09:00 2024-07-16T14:41+09:00 2024-07-16T14:41+09:00 Out-of-bounds write vulnerability in Ricoh MFPs and printers https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000070.html MFPs (multifunction printers) and printers provided by Ricoh Company, Ltd. contain an out-of-bounds write vulnerability (CWE-787). Ricoh Company, Ltd. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Ricoh Company, Ltd. coordinated under the Information Security Early Warning Partnership. JVNDB-2024-000070 https://jvn.jp/en/jp/JVN14294633/index.html https://www.cve.org/CVERecord?id=CVE-2024-39927 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ricoh:multiple_product 2024-07-10T14:16+09:00 2024-07-10T14:16+09:00 2024-07-10T14:16+09:00 Multiple vulnerabilities in multiple Webmin products https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000059.html Multiple Webmin products contain multiple vulnerabilities listed below. * sysinfo.cgi is vulnerable to cross-site scripting (CWE-79) CVE-2024-36450 * session_login.cgi is vulnerable to cross-site scripting (CWE-79) CVE-2024-36453 * ajaxterm module is vulnerable to improper handling of insufficient permissions or privileges (CWE-280) CVE-2024-36451 * ajaxterm module is vulnerable to cross-site request forgery (CWE-352) CVE-2024-36452 CVE-2024-36450, CVE-2024-36451, CVE-2024-36452 Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-36453 hibiki moriyama of STNet, Incorporated reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000059 https://jvn.jp/en/jp/JVN81442045/index.html https://www.cve.org/CVERecord?id=CVE-2024-36450 https://www.cve.org/CVERecord?id=CVE-2024-36451 https://www.cve.org/CVERecord?id=CVE-2024-36452 https://www.cve.org/CVERecord?id=CVE-2024-36453 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:webmin:usermin cpe:/a:webmin:webmin cpe:/a:webmin:webmin 2024-07-09T14:27+09:00 2024-07-09T14:27+09:00 2024-07-09T14:27+09:00 Cleartext transmission issue in TONE store App to TONE store https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000069.html TONE store App provided by DREAM TRAIN INTERNET INC. contains a cleartext transmission issue to TONE store website (CWE-419). Kodai Karakawa reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000069 https://jvn.jp/en/jp/JVN28515217/index.html https://www.cve.org/CVERecord?id=CVE-2024-39886 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:dream_train_internet_tone_store_application 2024-07-08T13:43+09:00 2024-07-08T13:43+09:00 2024-07-08T13:43+09:00 JP1/Extensible SNMP Agent fails to restrict access permissions https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000068.html JP1/Extensible SNMP Agent provided by Hitachi fails to restrict access permissions (CWE-276). Yutaka Kokubu, Shun Suzaki, and Kazuki Hirota of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000068 https://jvn.jp/en/jp/JVN94347255/index.html https://www.cve.org/CVERecord?id=CVE-2024-4679 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:job_management_partner1_extensible_snmp_agent cpe:/a:hitachi:jp1_extensible_snmp_agent 2024-07-03T14:57+09:00 2024-07-03T14:57+09:00 2024-07-03T14:57+09:00 Multiple TP-Link products vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003831.html Multiple products provided by TP-LINK contains an OS command injection vulnerability (CWE-78) related to the backup/restore function. Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-003831 https://jvn.jp/en/vu/JVNVU99784493/index.html https://www.cve.org/CVERecord?id=CVE-2024-38471 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:tp-link:archer_air_r5_firmware cpe:/o:tp-link:archer_ax3000_firmware cpe:/o:tp-link:archer_ax5400_firmware cpe:/o:tp-link:archer_axe5400_firmware cpe:/o:tp-link:archer_axe75 2024-06-28T17:38+09:00 2024-06-28T17:38+09:00 2024-06-28T17:38+09:00 "Piccoma" App uses a hard-coded API key for an external service https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000067.html "Piccoma" App for Android and "Piccoma" App for iOS provided by Kakao piccoma Corp. use a hard-coded API key for an external service (CWE-798). Yoshihito Sakai of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000067 https://jvn.jp/en/jp/JVN01073312/index.html https://www.cve.org/CVERecord?id=CVE-2024-38480 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:kakao_piccoma_corp_comic_app_to_enjoy_popular_manga_for_Android cpe:/a:misc:kakao_piccoma_corp_comic_app_to_enjoy_popular_manga_for_ios 2024-06-28T13:18+09:00 2024-06-28T13:18+09:00 2024-06-28T13:18+09:00 WordPress plugins "WP Tweet Walls" and "Sola Testimonials" vulnerable to cross-site request forgery https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000066.html WordPress plugins "WP Tweet Walls" and "Sola Testimonials" provided by Sola Plugins contain a cross-site request forgery vulnerability (CWE-352). These vulnerabilities are reported by the following reporters, and JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-38344: Yuya Asato of GMO Cybersecurity by Ierae, Inc. CVE-2024-38345: Yuta Takanashi JVNDB-2024-000066 https://jvn.jp/en/jp/JVN34977158/index.html https://www.cve.org/CVERecord?id=CVE-2024-38344 https://www.cve.org/CVERecord?id=CVE-2024-38345 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:solaplugins:super_testimonials cpe:/a:solaplugins:wp_tweet_walls 2024-06-26T14:25+09:00 2024-06-26T14:25+09:00 2024-06-26T14:25+09:00 LINE client for iOS vulnerable to universal cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003699.html The in-app browser of LINE client for iOS provided by LY Corporation contains a universal cross-site scripting vulnerability (CWE-79, CVE-2024-5739). LY Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2024-003699 https://jvn.jp/en/vu/JVNVU91384468/index.html https://www.cve.org/CVERecord?id=CVE-2024-5739 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:linecorp:line 2024-06-24T11:05+09:00 2024-06-24T11:05+09:00 2024-06-24T11:05+09:00 Multiple vulnerabilities in multiple Trend Micro products https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003645.html Trend Micro Incorporated has released security updates for multiple Trend Micro products. Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2024-003645 https://jvn.jp/en/vu/JVNVU99027428/index.html https://www.cve.org/CVERecord?id=CVE-2024-36302 https://www.cve.org/CVERecord?id=CVE-2024-36303 https://www.cve.org/CVERecord?id=CVE-2024-36304 https://www.cve.org/CVERecord?id=CVE-2024-36305 https://www.cve.org/CVERecord?id=CVE-2024-36306 https://www.cve.org/CVERecord?id=CVE-2024-36307 https://www.cve.org/CVERecord?id=CVE-2024-37289 https://www.cve.org/CVERecord?id=CVE-2024-36358 https://www.cve.org/CVERecord?id=CVE-2024-36359 cpe:/a:trendmicro:apex_one cpe:/a:trendmicro:apex_one_as_a_service cpe:/a:trendmicro:deep_security_agent cpe:/a:trendmicro:interscan_web_security_virtual_appliance 2024-06-20T14:59+09:00 2024-06-20T14:59+09:00 2024-06-20T14:59+09:00 "ZOZOTOWN" App for Android fails to restrict custom URL schemes properly https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000065.html "ZOZOTOWN" App for Android provided by ZOZO, Inc. provides the function to access a URL requested via Custom URL Scheme. The App does not restrict access to the function properly (CWE-939) which may be exploited to direct the App to access any sites. JVNDB-2024-000065 https://jvn.jp/en/jp/JVN37818611/index.html https://www.cve.org/CVERecord?id=CVE-2024-35298 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:zozo_android_app_zozotown 2024-06-19T16:04+09:00 2024-06-19T16:04+09:00 2024-06-19T16:04+09:00 WordPress plugin "SiteGuard WP Plugin" may leak the customized path to the login page https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000064.html WordPress plugin "SiteGuard WP Plugin" provided by EG Secure Solutions Inc. provides a functionality to customize the path to the login page wp-login.php. The plugin implements a measure to avoid redirection from other URLs, but missed to implement a measure to avoid redirection from wp-register.php (CWE-201). Yuuta Watanabe of STNet, Incorporated reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000064 https://jvn.jp/en/jp/JVN60331535/index.html https://www.cve.org/CVERecord?id=CVE-2024-37881 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:eg-secure_siteguard_wp_plugin 2024-06-19T14:25+09:00 2024-06-19T14:25+09:00 2024-06-19T14:25+09:00 Multiple vulnerabilities in Ricoh Streamline NX PC Client https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000061.html Ricoh Streamline NX PC Client provided by RICOH COMPANY, LTD. contains multiple vulnerabilities listed below. * [ricoh-2024-000004] Improper restriction of communication channel to intended endpoints (CWE-923) - CVE-2024-36252 * [ricoh-2024-000005] Use of hard-coded credentials (CWE-798) - CVE-2024-36480 * [ricoh-2024-000006] Use of potentially dangerous function (CWE-676) - CVE-2024-37124 * [ricoh-2024-000007] Use of potentially dangerous function (CWE-676) - CVE-2024-37387 CVE-2024-36252 Cai, Qi Qi of Siemens China Cybersecurity Testing Center - Shadowless Lab reported this vulnerability to RICOH COMPANY, LTD. and coordinated. After the coordination was completed, RICOH COMPANY, LTD. reported the case to IPA to notify users of the solution through JVN. CVE-2024-36480, CVE-2024-37124, CVE-2024-37387 Abian Blome of Siemens Energy reported these vulnerabilities to RICOH COMPANY, LTD. and coordinated. After the coordination was completed, RICOH COMPANY, LTD. reported the case to IPA to notify users of the solution through JVN. JVNDB-2024-000061 https://jvn.jp/en/jp/JVN00442488/index.html https://www.cve.org/CVERecord?id=CVE-2024-36252 https://www.cve.org/CVERecord?id=CVE-2024-36480 https://www.cve.org/CVERecord?id=CVE-2024-37124 https://www.cve.org/CVERecord?id=CVE-2024-37387 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ricoh:streamline_nx_pc_client 2024-06-18T14:56+09:00 2024-06-18T14:56+09:00 2024-06-18T14:56+09:00 Multiple vulnerabilities in ID Link Manager and FUJITSU Software TIME CREATOR https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000063.html ID Link Manager and FUJITSU Software TIME CREATOR provided by Fsas Technologies Inc. contain multiple vulnerabilities listed below. * Path Traversal (CWE-36) (CVE-2024-33620) * Missing Authentication (CWE-306) (CVE-2024-33622) * Information disclosure (CWE-204) (CVE-2024-34024) Christian Demko of WithSecure KK reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer Fsas Technologies Inc. JVNDB-2024-000063 https://jvn.jp/en/jp/JVN65171386/index.html https://www.cve.org/CVERecord?id=CVE-2024-33620 https://www.cve.org/CVERecord?id=CVE-2024-33622 https://www.cve.org/CVERecord?id=CVE-2024-34024 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:fsas_technologies_fujitsu_business_application_id_link_manager2 cpe:/a:misc:fsas_technologies_fujitsu_software_id_link_manager cpe:/a:misc:fsas_technologies_fujitsu_software_time_creator_id_link_manager 2024-06-18T13:43+09:00 2024-06-18T13:43+09:00 2024-06-18T13:43+09:00 Multiple vulnerabilities in Toshiba Tec and Oki Electric Industry MFPs https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003539.html MFPs (multifunction printers) provided by Toshiba Tec Corporation and Oki Electric Industry Co., Ltd. contain multiple vulnerabilities listed below. <ul> <li><b>Improper Restriction of Recursive Entity References in DTDs (&#39;XML Entity Expansion&#39;) (<a href="https://cwe.mitre.org/data/definitions/776">CWE-776</a>) </b>- CVE-2024-27141, CVE-2024-27142</li> <li><b>Execution with Unnecessary Privileges (<a href="https://cwe.mitre.org/data/definitions/250">CWE-250</a>) </b>- CVE-2024-27143, CVE-2024-27146, CVE-2024-27147, CVE-2024-3498</li> <li><b>Incorrect Default Permissions (<a href="https://cwe.mitre.org/data/definitions/276">CWE-276</a>) </b>- CVE-2024-27148, CVE-2024-27149, CVE-2024-27150, CVE-2024-27151, CVE-2024-27152, CVE-2024-27153, CVE-2024-27155, CVE-2024-27167, CVE-2024-27171</li> <li><b>Path Traversal (<a href="https://cwe.mitre.org/data/definitions/22">CWE-22</a>) </b>- CVE-2024-27144, CVE-2024-27145, CVE-2024-27173, CVE-2024-27174, CVE-2024-27176, CVE-2024-27177, CVE-2024-27178</li> <li><b>Insertion of Sensitive Information into Log File (<a href="https://cwe.mitre.org/data/definitions/532">CWE-532</a>) </b>- CVE-2024-27154, CVE-2024-27156, CVE-2024-27157</li> <li><b>Plaintext Storage of a Password (<a href="https://cwe.mitre.org/data/definitions/256">CWE-256</a>) </b>- CVE-2024-27166</li> <li><b>Debug Messages Revealing Unnecessary Information (<a href="https://cwe.mitre.org/data/definitions/1295">CWE-1295</a>) </b>- CVE-2024-27179</li> <li><b>Use of Default Credentials (<a href="https://cwe.mitre.org/data/definitions/1392">CWE-1392</a>) </b>- CVE-2024-27158</li> <li><b>Use of Hard-coded Credentials (<a href="https://cwe.mitre.org/data/definitions/798">CWE-798</a>) </b>- CVE-2024-27159, CVE-2024-27160, CVE-2024-27161, CVE-2024-27168, CVE-2024-27170</li> <li><b>Use of Hard-coded Password (<a href="https://cwe.mitre.org/data/definitions/259">CWE-259</a>) </b>- CVE-2024-27164</li> <li><b>Cross-site Scripting (<a href="http://cwe.mitre.org/data/definitions/79">CWE-79</a>) </b>- CVE-2024-27162</li> <li><b>Cleartext Transmission of Sensitive Information (<a href="https://cwe.mitre.org/data/definitions/319">CWE-319</a>) </b>- CVE-2024-27163</li> <li><b>Least Privilege Violation (<a href="https://cwe.mitre.org/data/definitions/272">CWE-272</a>) </b>- CVE-2024-27165</li> <li><b>Missing Authentication for Critical Function (<a href="https://cwe.mitre.org/data/definitions/306">CWE-306</a>) </b>- CVE-2024-27169</li> <li><b>OS Command Injection (<a href="https://cwe.mitre.org/data/definitions/78">CWE-78</a>) </b>- CVE-2024-27172</li> <li><b>External Control of File Name or Path (<a href="https://cwe.mitre.org/data/definitions/73">CWE-73</a>) </b>- CVE-2024-27175</li> <li><b>Time-of-check Time-of-use (TOCTOU) Race Condition (<a href="https://cwe.mitre.org/data/definitions/367">CWE-367</a>) </b>- CVE-2024-27180</li> <li><b>Authentication Bypass Using an Alternate Path or Channel (<a href="https://cwe.mitre.org/data/definitions/288">CWE-288</a></b>) - CVE-2024-3496</li> <li><b>Relative Path Traversal (<a href="https://cwe.mitre.org/data/definitions/23">CWE-23</a>) </b>- CVE-2024-3497</li> </ul> Toshiba Tec Corporation reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2024-003539 https://jvn.jp/en/vu/JVNVU97136265/index.html https://www.cve.org/CVERecord?id=CVE-2024-27141 https://www.cve.org/CVERecord?id=CVE-2024-27142 https://www.cve.org/CVERecord?id=CVE-2024-27143 https://www.cve.org/CVERecord?id=CVE-2024-27146 https://www.cve.org/CVERecord?id=CVE-2024-27147 https://www.cve.org/CVERecord?id=CVE-2024-3498 https://www.cve.org/CVERecord?id=CVE-2024-27148 https://www.cve.org/CVERecord?id=CVE-2024-27149 https://www.cve.org/CVERecord?id=CVE-2024-27150 https://www.cve.org/CVERecord?id=CVE-2024-27151 https://www.cve.org/CVERecord?id=CVE-2024-27152 https://www.cve.org/CVERecord?id=CVE-2024-27153 https://www.cve.org/CVERecord?id=CVE-2024-27155 https://www.cve.org/CVERecord?id=CVE-2024-27167 https://www.cve.org/CVERecord?id=CVE-2024-27171 https://www.cve.org/CVERecord?id=CVE-2024-27144 https://www.cve.org/CVERecord?id=CVE-2024-27145 https://www.cve.org/CVERecord?id=CVE-2024-27173 https://www.cve.org/CVERecord?id=CVE-2024-27174 https://www.cve.org/CVERecord?id=CVE-2024-27176 https://www.cve.org/CVERecord?id=CVE-2024-27177 https://www.cve.org/CVERecord?id=CVE-2024-27178 https://www.cve.org/CVERecord?id=CVE-2024-27154 https://www.cve.org/CVERecord?id=CVE-2024-27156 https://www.cve.org/CVERecord?id=CVE-2024-27157 https://www.cve.org/CVERecord?id=CVE-2024-27166 https://www.cve.org/CVERecord?id=CVE-2024-27179 https://www.cve.org/CVERecord?id=CVE-2024-27158 https://www.cve.org/CVERecord?id=CVE-2024-27159 https://www.cve.org/CVERecord?id=CVE-2024-27160 https://www.cve.org/CVERecord?id=CVE-2024-27161 https://www.cve.org/CVERecord?id=CVE-2024-27168 https://www.cve.org/CVERecord?id=CVE-2024-27170 https://www.cve.org/CVERecord?id=CVE-2024-27164 https://www.cve.org/CVERecord?id=CVE-2024-27162 https://www.cve.org/CVERecord?id=CVE-2024-27163 https://www.cve.org/CVERecord?id=CVE-2024-27165 https://www.cve.org/CVERecord?id=CVE-2024-27169 https://www.cve.org/CVERecord?id=CVE-2024-27172 https://www.cve.org/CVERecord?id=CVE-2024-27175 https://www.cve.org/CVERecord?id=CVE-2024-27180 https://www.cve.org/CVERecord?id=CVE-2024-3496 https://www.cve.org/CVERecord?id=CVE-2024-3497 https://cwe.mitre.org/data/definitions/1295 https://cwe.mitre.org/data/definitions/1392.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/23.html https://cwe.mitre.org/data/definitions/250.html https://cwe.mitre.org/data/definitions/256.html https://cwe.mitre.org/data/definitions/259.html https://cwe.mitre.org/data/definitions/272.html https://cwe.mitre.org/data/definitions/276.html https://cwe.mitre.org/data/definitions/288.html https://cwe.mitre.org/data/definitions/306.html https://cwe.mitre.org/data/definitions/319.html https://cwe.mitre.org/data/definitions/367.html https://cwe.mitre.org/data/definitions/532.html https://cwe.mitre.org/data/definitions/73.html http://cwe.mitre.org/data/definitions/776.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/798.html cpe:/a:misc:oki_electric_industry_multiple_product cpe:/a:toshibatec:multiple_product 2024-06-17T15:21+09:00 2024-06-17T15:21+09:00 2024-06-17T15:21+09:00 Denial-of-service (DoS) vulnerability in IPCOM WAF function https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000062.html WAF function of IPCOM provided by Fsas Technologies Inc. contains a denial-of-service (DoS) vulnerability (CWE-908). Fsas Technologies Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Fsas Technologies Inc. coordinated under the Information Security Early Warning Partnership. JVNDB-2024-000062 https://jvn.jp/en/jp/JVN25594256/index.html https://www.cve.org/CVERecord?id=CVE-2024-36454 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:fsas_technologies_ipcom cpe:/a:misc:fsas_technologies_ipcom 2024-06-12T15:03+09:00 2024-06-12T15:03+09:00 2024-06-12T15:03+09:00 WordPress Plugin "Music Store - WordPress eCommerce" vulnerable to SQL injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000058.html WordPress Plugin "Music Store - WordPress eCommerce" provided by CodePeople contains an SQL injection vulnerability (CWE-89). Daiki Sato of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000058 https://jvn.jp/en/jp/JVN79213252/index.html https://www.cve.org/CVERecord?id=CVE-2024-36082 https://nvd.nist.gov/vuln/detail/CVE-2024-36082 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:codepeople:music_store 2024-06-10T17:08+09:00 2024-06-07T15:24+09:00 2024-06-10T17:08+09:00 Multiple vulnerabilities in "FreeFrom - the nostr client" App https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000060.html "FreeFrom - the nostr client" App provided by FreeFrom K.K. contains multiple vulnerabilities listed below. <ul><li>Improper verification of cryptographic signature (CWE-347) - CVE-2024-36277</li> <li>Reliance on obfuscation or encryption of security-relevant inputs without integrity checking (CWE-649) - CVE-2024-36279</li> <li>Reusing a nonce, key pair in encryption (CWE-323) - CVE-2024-36289</li></ul> The people listed below reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. Hayato Kimura of University of Hyogo Ryoma Ito of National Institute of Information and Communications Technology (NICT) Kazuhiko Minematsu of NEC Corporation/Yokohama National University Takanori Isobe of University of Hyogo JVNDB-2024-000060 https://jvn.jp/en/jp/JVN55045256/index.html https://www.cve.org/CVERecord?id=CVE-2024-36277 https://www.cve.org/CVERecord?id=CVE-2024-36279 https://www.cve.org/CVERecord?id=CVE-2024-36289 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:freefrom_android_app_freefrom-the_nostr_client cpe:/a:misc:freefrom_iOS_app_freefrom-the_nostr_client 2024-06-07T14:51+09:00 2024-06-07T14:51+09:00 2024-06-07T14:51+09:00 Multiple vulnerabilities in UNIVERSAL PASSPORT RX https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000057.html UNIVERSAL PASSPORT RX provided by Japan System Techniques Co., Ltd. contains multiple vulnerabilities listed below. <ul><li>Cross-site scripting (CWE-79) - CVE-2023-42427</li> <li>Dependency on vulnerable third-party component (CWE-1395)<br /> Known vulnerability in Primefaces library used in the product</li> <li>Cross-site scripting (CWE-79) - CVE-2023-51436</li></ul> CVE-2023-42427 Japan System Techniques Co., Ltd. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Japan System Techniques Co., Ltd. coordinated under the Information Security Early Warning Partnership. Known vulnerability in Primefaces library Morita Keiichi and Watanabe Kosuke of Tokyo Denki University reported to Japan System Techniques Co., Ltd. that this vulnerability still exists in the product and coordinated. Japan System Techniques Co., Ltd. and JPCERT/CC published respective advisories in order to notify users of this vulnerability. CVE-2023-51436 MATSUMOTO Yuuki of Tokyo University of Information Sciences reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000057 https://jvn.jp/en/jp/JVN43215077/index.html https://www.cve.org/CVERecord?id=CVE-2023-42427 https://www.cve.org/CVERecord?id=CVE-2023-51436 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:japan_system_techniques_universal_passport_rx cpe:/a:misc:japan_system_techniques_universal_passport_rx 2024-06-03T15:32+09:00 2024-06-03T15:32+09:00 2024-06-03T15:32+09:00 Seiko Solutions SkyBridge MB-A100/MB-A110 and SkyBridge BASIC MB-A130 vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003254.html SkyBridge MB-A100/MB-A110 and SkyBridge BASIC MB-A130 provided by Seiko Solutions Inc. contain a command injection vulnerability (CWE-77). Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-003254 https://jvn.jp/en/vu/JVNVU94872523/index.html https://www.cve.org/CVERecord?id=CVE-2024-32850 https://cwe.mitre.org/data/definitions/77.html cpe:/o:seiko-sol:skybridge_basic_mb-a130_firmware cpe:/o:seiko-sol:skybridge_mb-a100_firmware cpe:/o:seiko-sol:skybridge_mb-a110_firmware 2024-06-03T14:53+09:00 2024-06-03T14:53+09:00 2024-06-03T14:53+09:00 Multiple vulnerabilities in Sharp and Toshiba Tec MFPs https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003253.html Sharp and Toshiba Tec MFPs (multifunction printers) contain multiple vulnerabilities listed below. * Stack-based Buffer Overflow (CWE-121) - CVE-2024-28038 * Incorrect Permission Assignment for Critical Resource (CWE-732) - CVE-2024-28955 * Cleartext Storage of Sensitive Information (CWE-312) - CVE-2024-29146 * Plaintext Storage of a Password (CWE-256) - CVE-2024-29978 * Storing Passwords in a Recoverable Format (CWE-257) - CVE-2024-32151 * Path Traversal (CWE-22) - CVE-2024-33605 * Improper Access Control (CWE-284) - CVE-2024-33610, CVE-2024-33616 * Access to Critical Private Variable via Public Method (CWE-767) - CVE-2024-34162 * Use of Hard-coded Credentials (CWE-798) - CVE-2024-35244, CVE-2024-36248 * Cross-site Scripting (CWE-79) - CVE-2024-36249 * Out-of-bounds Read (CWE-125) - CVE-2024-36251, CVE-2024-36254 As for the vulnerabilities listed below, Pierre Barre reported them to JPCERT/CC, and JPCERT/CC coordinated with Sharp Corporation. CVE-2024-28038, CVE-2024-28955, CVE-2024-29146, CVE-2024-29978, CVE-2024-32151, CVE-2024-33605, CVE-2024-33610, CVE-2024-33616, CVE-2024-34162, CVE-2024-35244, CVE-2024-36248, CVE-2024-36251, CVE-2024-36254 As for the vulnerabilities listed below, Sharp Corporation received reports and coordinated with the reporters directly, and after the coordination was completed, Sharp reported them to JPCERT/CC to notify the users of the solutions through JVN. CVE-2024-33610, CVE-2024-36249, CVE-2024-36251, CVE-2024-36254 JVNDB-2024-003253 https://jvn.jp/en/vu/JVNVU93051062/index.html https://www.cve.org/CVERecord?id=CVE-2024-28038 https://www.cve.org/CVERecord?id=CVE-2024-28955 https://www.cve.org/CVERecord?id=CVE-2024-29146 https://www.cve.org/CVERecord?id=CVE-2024-29978 https://www.cve.org/CVERecord?id=CVE-2024-32151 https://www.cve.org/CVERecord?id=CVE-2024-33605 https://www.cve.org/CVERecord?id=CVE-2024-33610 https://www.cve.org/CVERecord?id=CVE-2024-33616 https://www.cve.org/CVERecord?id=CVE-2024-34162 https://www.cve.org/CVERecord?id=CVE-2024-35244 https://www.cve.org/CVERecord?id=CVE-2024-36248 https://www.cve.org/CVERecord?id=CVE-2024-36249 https://www.cve.org/CVERecord?id=CVE-2024-36251 https://www.cve.org/CVERecord?id=CVE-2024-36254 https://cwe.mitre.org/data/definitions/121.html https://cwe.mitre.org/data/definitions/125.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/256.html https://cwe.mitre.org/data/definitions/257.html https://cwe.mitre.org/data/definitions/284.html https://cwe.mitre.org/data/definitions/312.html https://cwe.mitre.org/data/definitions/732.html https://cwe.mitre.org/data/definitions/767.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/798.html cpe:/a:sharp:multiple_product cpe:/a:toshibatec:multiple_product 2024-06-03T14:36+09:00 2024-06-03T14:36+09:00 2024-06-03T14:36+09:00 awkblog vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000056.html awkblog provided by Keisuke Nakayama contains an OS command injection vulnerability (CWE-78). Keigo YAMAZAKI of LAC Co., Ltd. / Nuligen Security Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000056 https://jvn.jp/en/jp/JVN80506242/index.html https://www.cve.org/CVERecord?id=CVE-2024-36360 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:keisuke_nakayama_awkblog 2024-05-30T14:39+09:00 2024-05-30T14:39+09:00 2024-05-30T14:39+09:00 Redmine DMSF Plugin vulnerable to path traversal https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000055.html Redmine DMSF Plugin provided by Kontron contains a path traversal vulnerability (CWE-22). Tsukuba Secure Network Research Co. Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000055 https://jvn.jp/en/jp/JVN22182715/index.html https://www.cve.org/CVERecord?id=CVE-2024-36267 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:kontron_redmine_dmsf_plugin 2024-05-29T14:13+09:00 2024-05-29T14:13+09:00 2024-05-29T14:13+09:00 EC-Orange vulnerable to authorization bypass https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000054.html EC-Orange provided by S-cubism Inc. is an e-commerce website building system package based on an open source software EC-CUBE. EC-Orange contains an authorization bypass vulnerability (CWE-639). This is the same issue as JVN#51770585 (EC-CUBE vulnerable to authorization bypass). This vulnerability was reported on July 2015. The coordination with the developer was resumed on December 2023, and this JVN publication was agreed upon. JVNDB-2024-000054 https://jvn.jp/en/jp/JVN15637138/index.html https://jvn.jp/en/jp/JVN51770585/index.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0808 https://nvd.nist.gov/vuln/detail/CVE-2014-0808 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:scubism_ec-orange 2024-05-29T14:06+09:00 2024-05-29T14:06+09:00 2024-05-29T14:06+09:00 ELECOM wireless LAN routers vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003249.html Wireless LAN routers provided by ELECOM CO.,LTD. contain an OS command injection vulnerability (CWE-78). Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-003249 https://jvn.jp/en/vu/JVNVU97214223/index.html https://www.cve.org/CVERecord?id=CVE-2024-36103 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:elecom:wrc-x5400gs-b cpe:/o:elecom:wrc-x5400gsa-b 2024-05-29T12:33+09:00 2024-05-29T12:33+09:00 2024-05-29T12:33+09:00 Multiple vulnerabilities in Unifier and Unifier Cast https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000053.html Unifier and Unifier Cast provided by Yokogawa Rental & Lease Corporation contains multiple vulnerabilities listed below. <ul> <li><b>Incorrect Default Permissions configured by Cast Launcher (<a href="https://cwe.mitre.org/data/definitions/276.html">CWE-276</a>)</b> - CVE-2024-23847 </li> <li><b>Missing Authorization for coejobhook Command Execution (<a href="https://cwe.mitre.org/data/definitions/862.html">CWE-862</a>)</b> - CVE-2024-36246 </li> </ul> CVE-2024-23847 Yokogawa Rental & Lease Corporation reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Yokogawa Rental & Lease Corporation coordinated under the Information Security Early Warning Partnership. CVE-2024-36246 Taisei Ogura of MOTEX Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000053 https://jvn.jp/en/jp/JVN17680667/index.html https://www.cve.org/CVERecord?id=CVE-2024-23847 https://www.cve.org/CVERecord?id=CVE-2024-36246 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:yrl:yokogawa_renta_unifier cpe:/a:yrl:yokogawa_renta_unifier_cast 2024-05-28T14:47+09:00 2024-05-28T14:47+09:00 2024-05-28T14:47+09:00 Multiple vulnerabilities in UTAU https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000052.html UTAU provided by ameya/ayame contains multiple vulnerabilities listed below. <ul> <li><b>OS command injection (<a href="https://cwe.mitre.org/data/definitions/78.html">CWE-78</a>)</b> - CVE-2024-28886 </li> <li><b>Path Traversal (<a href="https://cwe.mitre.org/data/definitions/22.html">CWE-22</a>)</b> - CVE-2024-32944 </li> </ul> Yu Ishibashi reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000052 https://jvn.jp/en/jp/JVN71404925/index.html https://www.cve.org/CVERecord?id=CVE-2024-28886 https://www.cve.org/CVERecord?id=CVE-2024-32944 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:ameya_ayame_utau 2024-05-28T14:23+09:00 2024-05-28T14:23+09:00 2024-05-28T14:23+09:00 OMRON NJ/NX series vulnerable to insufficient verification of data authenticity https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003242.html Machine Automation Controller NJ/NX series provided by OMRON Corporation contain an issue with insufficient verification of data authenticity (CWE-345). OMRON Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2024-003242 https://jvn.jp/en/vu/JVNVU92504444/index.html https://www.cve.org/CVERecord?id=CVE-2024-33687 https://nvd.nist.gov/vuln/detail/CVE-2024-33687 https://cwe.mitre.org/data/definitions/345.html cpe:/a:omron:machine_automation_controller_nj_series cpe:/a:omron:machine_automation_controller_nx_series 2024-07-26T16:27+09:00 2024-05-28T12:28+09:00 2024-07-26T16:27+09:00 Splunk Config Explorer vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000051.html Splunk Config Explorer provided by Chris Younger contains a reflected cross-site scripting vulnerability (CWE-79). Taihei Shimamine of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000051 https://jvn.jp/en/jp/JVN56781258/index.html https://www.cve.org/CVERecord?id=CVE-2024-35291 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:chris_younger_splunk_config_explorer 2024-05-24T13:50+09:00 2024-05-24T13:50+09:00 2024-05-24T13:50+09:00 WordPress Plugin "WP Booking" vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000050.html WordPress Plugin "WP Booking" provided by aviplugins.com contains a stored cross-site scripting vulnerability (CWE-79). Daiki Sato of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000050 https://jvn.jp/en/jp/JVN35838128/index.html https://www.cve.org/CVERecord?id=CVE-2024-35297 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:aviplugins.com_wp_booking 2024-05-24T13:41+09:00 2024-05-24T13:41+09:00 2024-05-24T13:41+09:00 Android App "TP-Link Tether" and "TP-Link Tapo" vulnerable to improper server certificate verification https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000046.html Android App "TP-Link Tether" and "TP-Link Tapo" provided by TP-LINK GLOBAL INC. are vulnerable to improper server certificate verification (CWE-295). Kenichiro Ito of TDU Cryptography Lab. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000046 https://jvn.jp/en/jp/JVN29471697/index.html https://www.cve.org/CVERecord?id=CVE-2024-31340 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:tp-link_global_inc_tether cpe:/o:misc:tp-link_global_inc_tapo 2024-05-21T13:33+09:00 2024-05-21T13:33+09:00 2024-05-21T13:33+09:00 Panasonic KW Watcher vulnerable to memory buffer error https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003188.html KW Watcher provided by Panasonic contains a vulnerability due to improper restriction of operations within the bounds of a memory buffer (CWE-119, CVE-2024-4162). Michael Heinzl reported this vulnerability to Panasonic and coordinated. After the coordination was completed, Panasonic reported the case to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2024-003188 https://jvn.jp/en/vu/JVNVU95120091/index.html https://www.cve.org/CVERecord?id=CVE-2024-4162 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:panasonic:kw_watcher 2024-05-17T15:46+09:00 2024-05-17T15:46+09:00 2024-05-17T15:46+09:00 Ruijie BCR810W/BCR860 vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-021762.html Network router BCR810W/BCR860 provided by Ruijie Networks Co., Ltd. contains an OS command injection vulnerability (CVE-2023-3608, CWE-78). Note that this vulnerability can only be exploited when the BCOS port of the product is connected to the Internet. JPCERT/CC has confirmed attacks attempt to exploit this vulnerability. JVNDB-2023-021762 https://jvn.jp/en/vu/JVNVU92249385/index.html https://www.cve.org/CVERecord?id=CVE-2023-3608 https://nvd.nist.gov/vuln/detail/CVE-2023-3608 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:ruijie:rg-bcr810w_firmware cpe:/o:ruijie:rg-bcr860_firmware 2024-05-17T13:54+09:00 2024-05-17T13:54+09:00 2024-05-17T13:54+09:00 WordPress Plugin "Download Plugins and Themes from Dashboard" vulnerable to path traversal https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000049.html WordPress Plugin "Download Plugins and Themes from Dashboard" provided by WPFactory LLC contains a path traversal vulnerability (CWE-22). Gen Sato of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to WPFactory LLC and coordinated. After the coordination was completed, this case was reported to IPA under Information Security Early Warning Partnership, and JPCERT/CC coordinated with the developer for publishing of this advisory. JVNDB-2024-000049 https://jvn.jp/en/jp/JVN85380030/index.html https://www.cve.org/CVERecord?id=CVE-2024-35162 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:wpfactory_download_plugins_and_themes_from_dashboard 2024-05-17T13:33+09:00 2024-05-17T13:33+09:00 2024-05-17T13:33+09:00 Multiple vulnerabilities in Field Logic DataCube https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003187.html DataCube provided by Field Logic Inc. contains multiple vulnerabilities listed below. * Direct Request ('Forced Browsing') (CWE-425) - CVE-2024-25830 * Reflected cross-site scripting (CWE-79) - CVE-2024-25831 * Unrestricted upload of file with dangerous type (CWE-434) - CVE-2024-25832 * SQL injection (CWE-89) - CVE-2024-25833 CVE-2024-25830, CVE-2024-25831, CVE-2024-25832, CVE-2024-25833 Thomas J. Knudsen and Samy Younsi of NeroTeam Security Labs reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. CVE-2024-25832 CV3TR4CK reported this vulnerability to JPCERT/CC during the coordination based on the above report. JVNDB-2024-003187 https://jvn.jp/en/vu/JVNVU95350607/index.html https://www.cve.org/CVERecord?id=CVE-2024-25830 https://www.cve.org/CVERecord?id=CVE-2024-25831 https://www.cve.org/CVERecord?id=CVE-2024-25832 https://www.cve.org/CVERecord?id=CVE-2024-25833 https://neroteam.com/blog/f-logic-datacube3-vulnerability-report https://cwe.mitre.org/data/definitions/425.html https://cwe.mitre.org/data/definitions/434.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:f-logic:datacube3_firmware cpe:/o:f-logic:datacube4_firmware 2024-05-17T12:05+09:00 2024-05-17T12:05+09:00 2024-05-17T12:05+09:00 Central Dogma vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-002342.html Central Dogma provided by LY Corporation contains a cross-site scripting vulnerability (CWE-79, CVE-2024-1143) because RelayState data is not properly treated when Central Dogma processes SAML messages. LY Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2024-002342 https://jvn.jp/en/vu/JVNVU99669446/index.html https://www.cve.org/CVERecord?id=CVE-2024-1143 https://nvd.nist.gov/vuln/detail/CVE-2024-1143 https://docs.oasis-open.org/security/saml/v2.0/errata05/os/saml-v2.0-errata05-os.html#__RefHeading__8196_1983180497 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:linecorp:central_dogma 2024-05-13T17:27+09:00 2024-05-13T17:27+09:00 2024-05-13T17:27+09:00 Multiple vulnerabilities in Cybozu Garoon https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000047.html Cybozu Garoon provided by Cybozu, Inc. contains multiple vulnerabilities listed below. * [CyVDB-3167] Improper handling of data in Mail (CWE-231) - CVE-2024-31397 * [CyVDB-3221] Improper restriction on the output of some API (CWE-201) - CVE-2024-31398 * [CyVDB-3238] Excessive resource consumption in Mail (CWE-1050) - CVE-2024-31399 * [CyVDB-3439] Cross-site scripting vulnerability in Scheduler (CWE-79) - CVE-2024-31401 * [CyVDB-3441] Improper restriction on some operation in Shared To-Dos (CWE-863) - CVE-2024-31402 * [CyVDB-3402] Information disclosure in Mail (CWE-201) - CVE-2024-31400 * [CyVDB-3151] Improper restriction on browsing and operation in Memo (CWE-863) - CVE-2024-31403 * [CyVDB-3471] Browse restriction bypass in Scheduler (CWE-201) - CVE-2024-31404 CVE-2024-31401 @bttthuan reported this vulnerability to Cybozu, Inc. and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN. CVE-2024-31403 Yuji Tounai reported this vulnerability to Cybozu, Inc. and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN. CVE-2024-31397, CVE-2024-31398, CVE-2024-31399, CVE-2024-31400, CVE-2024-31402, CVE-2024-31404 Cybozu, Inc. reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2024-000047 https://jvn.jp/en/jp/JVN28869536/index.html https://www.cve.org/CVERecord?id=CVE-2024-31397 https://www.cve.org/CVERecord?id=CVE-2024-31398 https://www.cve.org/CVERecord?id=CVE-2024-31399 https://www.cve.org/CVERecord?id=CVE-2024-31400 https://www.cve.org/CVERecord?id=CVE-2024-31401 https://www.cve.org/CVERecord?id=CVE-2024-31402 https://www.cve.org/CVERecord?id=CVE-2024-31403 https://www.cve.org/CVERecord?id=CVE-2024-31404 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:cybozu:garoon 2024-05-13T15:19+09:00 2024-05-13T15:19+09:00 2024-05-13T15:19+09:00 "OfferBox" App uses a hard-coded secret key https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000045.html "OfferBox" App provided by i-plug inc. uses a hard-coded secret key for JWT (CWE-321). Yuta Yamate of Rakuten Group, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000045 https://jvn.jp/en/jp/JVN83405304/index.html https://www.cve.org/CVERecord?id=CVE-2024-32988 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:i-plug_inc_offerbox 2024-05-10T15:11+09:00 2024-05-10T15:11+09:00 2024-05-10T15:11+09:00 Hidden Functionality vulnerability in DT900 https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003181.html DT900 contains a Hidden Functionality vulnerability(CWE-912). Specified versions allow an attacker to access the system setting. reported by Mr. Gianluca Altomani and Mr. Manuel Romei. for NEC-PSIRT JVNDB-2024-003181 https://www.cve.org/CVERecord?id=CVE-2024-3016 https://cwe.mitre.org/data/definitions/912.html cpe:/o:nec:dt900 2024-05-10T13:59+09:00 2024-05-10T13:59+09:00 2024-05-10T13:59+09:00 Phormer vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000048.html Phormer contains a cross-site scripting vulnerability (CWE-79). Daiki Fukumori of Cyber Defense Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000048 https://jvn.jp/en/jp/JVN61054671/index.html https://www.cve.org/CVERecord?id=CVE-2024-34749 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:aidin_phormer 2024-05-10T13:48+09:00 2024-05-10T13:48+09:00 2024-05-10T13:48+09:00 Multiple vulnerabilities in MosP kintai kanri https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000043.html MosP kintai kanri provided by esMind, LLC contains multiple vulnerabilities listed below. <ul><li>Path Traversal (CWE-22) - CVE-2024-28880</li><li>Incorrect Permission Assignment for Critical Resource (CWE-732) - CVE-2024-29078</li></ul> Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000043 https://jvn.jp/en/jp/JVN97751842/index.html https://www.cve.org/CVERecord?id=CVE-2024-28880 https://www.cve.org/CVERecord?id=CVE-2024-29078 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:e-s-mind_mosp_kintai_kanri 2024-05-09T14:10+09:00 2024-05-09T14:10+09:00 2024-05-09T14:10+09:00 WordPress Plugin "Heateor Social Login WordPress" vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000044.html WordPress Plugin "Heateor Social Login WordPress" provided by Heateor contains a stored cross-site scripting vulnerability (CWE-79). Daiki Sato of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000044 https://jvn.jp/en/jp/JVN87694318/index.html https://www.cve.org/CVERecord?id=CVE-2024-32674 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:heateor:social_login 2024-05-08T13:43+09:00 2024-05-08T13:43+09:00 2024-05-08T13:43+09:00 Trend Micro Maximum Security vulnerable to improper link resolution (CVE-2024-32849) https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003178.html Trend Micro Incorporated has released a security update for Trend Micro Maximum Security, fixing an improper link resolution vulnerability(CWE-59, CVE-2024-32849). Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN. JVNDB-2024-003178 https://jvn.jp/en/vu/JVNVU97614828/index.html https://www.cve.org/CVERecord?id=CVE-2024-32849 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:trendmicro:maximum_security 2024-05-08T10:19+09:00 2024-05-08T10:19+09:00 2024-05-08T10:19+09:00 NETGEAR routers vulnerable to buffer overflow https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003119.html Multiple routers provided by NETGEAR Inc. contain a buffer overflow vulnerability (CWE-121, CVE-2023-27368). Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-003119 https://jvn.jp/en/vu/JVNVU91883072/index.html https://www.cve.org/CVERecord?id=CVE-2023-27368 https://claroty.com/team82/disclosure-dashboard/cve-2023-27368 https://cwe.mitre.org/data/definitions/121.html cpe:/o:netgear:rax35_firmware cpe:/o:netgear:rax38_firmware cpe:/o:netgear:rax40_firmware 2024-04-25T11:21+09:00 2024-04-25T11:21+09:00 2024-04-25T11:21+09:00 Multiple vulnerabilities in RoamWiFi R10 https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000042.html RoamWiFi R10 provided by RoamWiFi Technology Co., Ltd. contains multiple vulnerabilities listed below. * Active debug code (CWE-489) - CVE-2024-31406 * Insertion of sensitive information into log file (CWE-532) - CVE-2024-32051 Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000042 https://jvn.jp/en/jp/JVN62737544/index.html https://www.cve.org/CVERecord?id=CVE-2024-31406 https://www.cve.org/CVERecord?id=CVE-2024-32051 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:misc:roamwifi_technology_roamwifi_r10 2024-04-24T13:44+09:00 2024-04-24T13:44+09:00 2024-04-24T13:44+09:00 Multiple vulnerabilities in OMRON Sysmac Studio/CX-One and CX-Programmer https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003116.html OMRON Sysmac Studio/CX-One and CX-Programmer contain multiple vulnerabilities listed below. * Out-of-bounds read (CWE-125) - CVE-2024-31412 * Free of pointer not at start of buffer (CWE-761) - CVE-2024-31413 Michael Heinzl reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-003116 https://jvn.jp/en/vu/JVNVU98274902/index.html https://www.cve.org/CVERecord?id=CVE-2024-31412 https://www.cve.org/CVERecord?id=CVE-2024-31413 https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/761.html cpe:/a:omron:cx-one cpe:/a:omron:cx-programmer cpe:/a:omron:sysmac_studio 2024-04-24T10:13+09:00 2024-04-24T10:13+09:00 2024-04-24T10:13+09:00 TvRock vulnerable to cross-site request forgery https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000901.html TvRock <http://1st.geocities.jp/tvrock_web/> provided by TvRock (according to the original report submitted by the reporter) is a tool to set a timer recording for a TV program. TvRock contains a cross-site request forgery vulnerability (CWE-352). During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied. 1. The developer of the product is unreachable 2. Existence of vulnerability has been verified 3. Not disclosing this case may result in the risk that product users will have no means to know of the existence of the vulnerability in the product 4. There are no particular reasons that would make disclosure inappropriate JVNDB-2024-000901 https://jvn.jp/en/jp/JVN24683352/index.html https://www.cve.org/CVERecord?id=CVE-2024-23597 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:tvrock_tvrock 2024-04-23T18:22+09:00 2024-04-23T18:22+09:00 2024-04-23T18:22+09:00 TvRock vulnerable to denial-of-service (DoS) https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000903.html TvRock <http://1st.geocities.jp/tvrock_web/> provided by TvRock (according to the original report submitted by the reporter) is a tool to set a timer recording for a TV program. TvRock contains a denial-of-service (DoS) vulnerability (CWE-400). During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied. 1. The developer of the product is unreachable 2. Existence of vulnerability has been verified 3. Not disclosing this case may result in the risk that product users will have no means to know of the existence of the vulnerability in the product 4. There are no particular reasons that would make disclosure inappropriate JVNDB-2024-000903 https://jvn.jp/en/jp/JVN40079147/index.html https://www.cve.org/CVERecord?id=CVE-2024-24978 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:tvrock_tvrock 2024-04-23T18:21+09:00 2024-04-23T18:21+09:00 2024-04-23T18:21+09:00 Armeria-saml improperly handles SAML messages https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003108.html Armeria-saml provided by LY Corporation contains an issue in handling SAML messages (CWE-304, CVE-2024-1735). LY Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2024-003108 https://jvn.jp/en/vu/JVNVU91216202/index.html https://www.cve.org/CVERecord?id=CVE-2024-1735 https://cwe.mitre.org/data/definitions/304.html cpe:/a:linecorp:armeria-saml 2024-04-22T17:28+09:00 2024-04-22T17:28+09:00 2024-04-22T17:28+09:00 LINE client for iOS vulnerable to improper server certificate verification https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-014491.html The financial module within LINE client for iOS lacks server certificate verification in log transmission (CWE-295, CVE-2023-5554). LINE Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2023-014491 https://jvn.jp/en/vu/JVNVU91696361/index.html https://www.cve.org/CVERecord?id=CVE-2023-5554 https://nvd.nist.gov/vuln/detail/CVE-2023-5554 https://cwe.mitre.org/data/definitions/295.html cpe:/a:linecorp:line 2024-04-22T15:27+09:00 2024-04-22T15:27+09:00 2024-04-22T15:27+09:00 Multiple vulnerabilities in WordPress Plugin "Forminator" https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000041.html WordPress Plugin "Forminator" provided by WPMU DEV contains multiple vulnerabilities listed below. * Unrestricted upload of file with dangerous type (CWE-434) * SQL injection (CWE-89) * Cross-site scripting (CWE-79) hibiki moriyama of STNet, Incorporated reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000041 https://jvn.jp/en/jp/JVN50132400/index.html https://www.cve.org/CVERecord?id=CVE-2024-28890 https://www.cve.org/CVERecord?id=CVE-2024-31077 https://www.cve.org/CVERecord?id=CVE-2024-31857 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:wpmudev:forminator 2024-04-18T13:53+09:00 2024-04-18T13:53+09:00 2024-04-18T13:53+09:00 Proscend Communications M330-W and M330-W5 vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2022-017175.html M330-W and M330-W5 provided by Proscend Communications Inc. are LTE Industrial Cellular Routers. M330-W and M330-W5 contain an OS command injection vulnerability (CWE-78). CYNEX Analysis Team of National Institute of Information and Communications Technology reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-017175 https://jvn.jp/en/jp/JVN23835228/index.html https://www.cve.org/CVERecord?id=CVE-2022-36779 https://nvd.nist.gov/vuln/detail/CVE-2022-36779 https://www.gov.il/en/departments/faq/cve_advisories https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:proscend:m330-w5_firmware cpe:/o:proscend:m330-w_firmware 2024-04-16T14:30+09:00 2024-04-16T14:30+09:00 2024-04-16T14:30+09:00 Multiple vulnerabilities in BUFFALO wireless LAN routers https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000040.html Multiple wireless LAN routers provided by BUFFALO INC. contain multiple vulnerabilities listed below. * Plaintext storage of a password (CWE-256) * OS Command Injection (CWE-78) Satoru Nagaoka of Cyber Defense Institute, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000040 https://jvn.jp/en/jp/JVN58236836/index.html https://www.cve.org/CVERecord?id=CVE-2024-23486 https://www.cve.org/CVERecord?id=CVE-2024-26023 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:buffalo_inc:wcr-1166ds_firmware cpe:/o:buffalo_inc:wsr-1166dhp2_firmware cpe:/o:buffalo_inc:wsr-1166dhp_firmware cpe:/o:buffalo_inc:wsr-2533dhp2_firmware cpe:/o:buffalo_inc:wsr-2533dhpl_firmware cpe:/o:buffalo_inc:wsr-2533dhp_firmware cpe:/o:buffalo_inc:wsr-a2533dhp2_firmware 2024-04-15T16:29+09:00 2024-04-15T16:29+09:00 2024-04-15T16:29+09:00 Multiple vulnerabilities in a-blog cms https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000039.html a-blog cms provided by appleple inc. contains multiple vulnerabilities listed below. * Stored cross-site scripting vulnerability in Entry editing pages (CWE-79) - CVE-2024-30419 * Server-side request forgery (CWE-918) - CVE-2024-30420 * Directory traversal (CWE-22) - CVE-2024-31394 * Stored cross-site scripting vulnerability in Schedule labeling pages (CWE-79) - CVE-2024-31395 * Code injection (CWE-94) - CVE-2024-31396 Rikuto Tauchi of sangi reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000039 https://jvn.jp/en/jp/JVN70977403/index.html https://www.cve.org/CVERecord?id=CVE-2024-30419 https://www.cve.org/CVERecord?id=CVE-2024-30420 https://www.cve.org/CVERecord?id=CVE-2024-31394 https://www.cve.org/CVERecord?id=CVE-2024-31395 https://www.cve.org/CVERecord?id=CVE-2024-31396 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:appleple:a-blog_cms 2024-04-10T13:55+09:00 2024-04-10T13:55+09:00 2024-04-10T13:55+09:00 Multiple vulnerabilities in WordPress Plugin "Ninja Forms" https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000038.html WordPress Plugin "Ninja Forms" provided by Saturday Drive contains multiple vulnerabilities listed below. * Cross-site request forgery (CWE-352) - CVE-2024-25572 * Stored cross-site scripting in submit processing (CWE-79) - CVE-2024-26019 * Stored cross-site scripting in custom fields for labels (CWE-79) - CVE-2024-29220 CVE-2024-25572 Kohei Agena reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-26019, CVE-2024-29220 Ryotaro Imamura of SB Technology Corp. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000038 https://jvn.jp/en/jp/JVN50361500/index.html https://www.cve.org/CVERecord?id=CVE-2024-25572 https://www.cve.org/CVERecord?id=CVE-2024-26019 https://www.cve.org/CVERecord?id=CVE-2024-29220 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ninjaforms:ninja_forms 2024-04-08T13:44+09:00 2024-04-08T13:44+09:00 2024-04-08T13:44+09:00 Multiple vulnerabilities in Cente middleware https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003068.html Some products in Cente middleware TCP/IP Network Series developed by DMG MORI Digital Co., LTD. and provided by NEXT Co., Ltd. contain multiple vulnerabilities listed below. * Out-of-bounds Read caused by improper checking of the option length values in IPv6 NDP packets (CWE-125) * Out-of-bounds Read caused by improper checking of the option length values in IPv6 headers (CWE-125) * Generation of Predictable Identifiers (CWE-340) DMG MORI Digital Co., LTD. reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2024-003068 https://jvn.jp/en/vu/JVNVU94016877/index.html https://jvn.jp/en/vu/JVNVU96959731/index.html https://www.cve.org/CVERecord?id=CVE-2024-28957 https://www.cve.org/CVERecord?id=CVE-2024-23911 https://www.cve.org/CVERecord?id=CVE-2024-28894 https://www.cisa.gov/news-events/ics-advisories/icsa-24-263-02 https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/340.html cpe:/a:misc:next_cente_ipv6 cpe:/a:misc:next_cente_tcp%2Fipv4 2024-09-24T15:00+09:00 2024-04-05T15:36+09:00 2024-09-24T15:00+09:00 Multiple vulnerabilities in NEC Aterm series https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000037.html Aterm series provided by NEC Corporation contains multiple vulnerabilities listed below. <ul> <li>Incorrect Permission Assignment for Critical Resource (CWE-732) - CVE-2024-28005</li> <li>Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) - CVE-2024-28006</li> <li>Incorrect Permission Assignment for Critical Resource (CWE-732) - CVE-2024-28007</li> <li>Active Debug Code (CWE-489) - CVE-2024-28008</li> <li>Use of Weak Credentials (CWE-1391) - CVE-2024-28009, CVE-2024-28012</li> <li>Use of Hard-coded Credentials (CWE-798) - CVE-2024-28010</li> <li>Inclusion of Undocumented Features (CWE-1242) - CVE-2024-28011</li> <li>Insufficient Session Expiration (CWE-613) - CVE-2024-28013</li> <li>Buffer Overflow (CWE-120) - CVE-2024-28014</li> <li>OS Command Injection in the web management console (CWE-78) - CVE-2024-28015</li> <li>Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) - CVE-2024-28016</li> </ul> The following people reported the vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-28005, CVE-2024-28008 Ryo Kashiro, and Katsuhiko Sato, and Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University CVE-2024-28006, CVE-2024-28007, CVE-2024-28009, CVE-2024-28010, CVE-2024-28011, CVE-2024-28012 Ryo Kashiro, and Katsuhiko Sato CVE-2024-28013 Yudai Morii, Takaya Noma, Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University CVE-2024-28014, CVE-2024-28015, CVE-2024-28016 Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University JVNDB-2024-000037 https://jvn.jp/en/jp/JVN82074338/index.html https://www.cve.org/CVERecord?id=CVE-2024-28005 https://www.cve.org/CVERecord?id=CVE-2024-28006 https://www.cve.org/CVERecord?id=CVE-2024-28007 https://www.cve.org/CVERecord?id=CVE-2024-28008 https://www.cve.org/CVERecord?id=CVE-2024-28009 https://www.cve.org/CVERecord?id=CVE-2024-28010 https://www.cve.org/CVERecord?id=CVE-2024-28011 https://www.cve.org/CVERecord?id=CVE-2024-28012 https://www.cve.org/CVERecord?id=CVE-2024-28013 https://www.cve.org/CVERecord?id=CVE-2024-28014 https://www.cve.org/CVERecord?id=CVE-2024-28015 https://www.cve.org/CVERecord?id=CVE-2024-280016 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/h:nec:atermwm3400rn cpe:/h:nec:atermwm3450rn cpe:/h:nec:atermwm3600r cpe:/h:nec:atermwr8160n cpe:/o:nec:aterm_cr2500p cpe:/o:nec:aterm_mr01ln cpe:/o:nec:aterm_mr02ln cpe:/o:nec:aterm_w1200ex(-ms) cpe:/o:nec:aterm_w300p_firmware cpe:/o:nec:aterm_wf1200hp cpe:/o:nec:aterm_wf1200hp2 cpe:/o:nec:aterm_wf300hp2_firmware cpe:/o:nec:aterm_wf300hp_firmware cpe:/o:nec:aterm_wf800hp_firmware cpe:/o:nec:aterm_wg1200hp2_firmware cpe:/o:nec:aterm_wg1200hp3_firmware cpe:/o:nec:aterm_wg1200hp_firmware cpe:/o:nec:aterm_wg1200hs2_firmware cpe:/o:nec:aterm_wg1200hs3_firmware cpe:/o:nec:aterm_wg1200hs_firmware cpe:/o:nec:aterm_wg1400hp_firmware cpe:/o:nec:aterm_wg1800hp2_firmware cpe:/o:nec:aterm_wg1800hp3_firmware cpe:/o:nec:aterm_wg1800hp4_firmware cpe:/o:nec:aterm_wg1800hp_firmware cpe:/o:nec:aterm_wg1810hp(je) cpe:/o:nec:aterm_wg1810hp(mf) cpe:/o:nec:aterm_wg1900hp2_firmware cpe:/o:nec:aterm_wg1900hp_firmware cpe:/o:nec:aterm_wg2200hp_firmware cpe:/o:nec:aterm_wg300hp_firmware cpe:/o:nec:aterm_wg600hp_firmware cpe:/o:nec:aterm_wm3500r cpe:/o:nec:aterm_wm3800r cpe:/o:nec:aterm_wr1200h cpe:/o:nec:aterm_wr4100n cpe:/o:nec:aterm_wr4500n cpe:/o:nec:aterm_wr6600h cpe:/o:nec:aterm_wr6650s cpe:/o:nec:aterm_wr6670s cpe:/o:nec:aterm_wr7800h cpe:/o:nec:aterm_wr7850s cpe:/o:nec:aterm_wr7870s cpe:/o:nec:aterm_wr8100n cpe:/o:nec:aterm_wr8150n cpe:/o:nec:aterm_wr8165n_firmware cpe:/o:nec:aterm_wr8166n cpe:/o:nec:aterm_wr8170n_firmware cpe:/o:nec:aterm_wr8175n_firmware cpe:/o:nec:aterm_wr8200n cpe:/o:nec:aterm_wr8300n cpe:/o:nec:aterm_wr8370n_firmware cpe:/o:nec:aterm_wr8400n cpe:/o:nec:aterm_wr8500n cpe:/o:nec:aterm_wr8600n_firmware cpe:/o:nec:aterm_wr8700n_firmware cpe:/o:nec:aterm_wr8750n_firmware cpe:/o:nec:aterm_wr9300n_firmware cpe:/o:nec:aterm_wr9500n_firmware 2024-04-05T14:53+09:00 2024-04-05T14:53+09:00 2024-04-05T14:53+09:00 Multiple vulnerabilities in PLANEX COMMUNICATIONS wireless LAN router MZK-MF300N https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003067.html Wireless LAN router MZK-MF300N provided by PLANEX COMMUNICATIONS INC. contains multiple vulnerabilities listed below. * Active debug code (CWE-489) * Command Injection on certain port (CWE-77) Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-003067 https://jvn.jp/en/vu/JVNVU91975826/index.html https://www.cve.org/CVERecord?id=CVE-2024-30219 https://www.cve.org/CVERecord?id=CVE-2024-30220 https://cwe.mitre.org/data/definitions/489.html https://cwe.mitre.org/data/definitions/77.html cpe:/o:planex:mzk-mf300n 2024-04-05T14:17+09:00 2024-04-05T14:17+09:00 2024-04-05T14:17+09:00 FURUNO SYSTEMS Managed Switch ACERA 9010 running in non MS mode with the initial configuration has no password https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003051.html In the initial configuration of Managed Switch ACERA 9010 provided by FURUNO Systems Co., Ltd., the password is empty (CWE-258) and the remote access service is enabled. The products are affected only when running in non MS mode with the initial configuration. FURUNO SYSTEMS Co.,Ltd. reported this vulnerability to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2024-003051 https://jvn.jp/en/vu/JVNVU99285099/index.html https://www.cve.org/CVERecord?id=CVE-2024-28744 https://cwe.mitre.org/data/definitions/258.html cpe:/o:furunosystems:furuno_systems_acera_9010-08 cpe:/o:furunosystems:furuno_systems_acera_9010-24 2024-04-02T18:03+09:00 2024-04-02T18:03+09:00 2024-04-02T18:03+09:00 KEYENCE VT STUDIO may insecurely load Dynamic Link Libraries https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003050.html VT STUDIO provided by KEYENCE CORPORATION contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427, CVE-2024-28099). KEYENCE CORPORATION reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2024-003050 https://jvn.jp/en/vu/JVNVU92825069/index.html https://jvn.jp/en/ta/JVNTA91240916/index.html https://www.cve.org/CVERecord?id=CVE-2024-28099 https://cwe.mitre.org/data/definitions/427.html cpe:/a:keyence:keyence_vt_studio 2024-04-01T14:44+09:00 2024-04-01T14:44+09:00 2024-04-01T14:44+09:00 Multiple vulnerabilities in KEYENCE KV STUDIO, KV REPLAY VIEWER, and VT5-WX15/WX12 https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003049.html KV STUDIO, KV REPLAY VIEWER, and VT5-WX15/WX12 provided by KEYENCE CORPORATION contain multiple vulnerabilities listed below. * Out-of-bounds write (CWE-787) - CVE-2024-29218 * Out-of-bounds read (CWE-125) - CVE-2024-29219 Michael Heinzl reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-003049 https://jvn.jp/en/vu/JVNVU95439120/index.html https://www.cve.org/CVERecord?id=CVE-2024-29218 https://www.cve.org/CVERecord?id=CVE-2024-29219 https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/787.html cpe:/a:keyence:keyence_vt5-wx12 cpe:/a:keyence:keyence_vt5-wx15 cpe:/a:keyence:kv_replay_viewer cpe:/a:keyence:kv_studio 2024-09-25T13:51+09:00 2024-04-01T12:31+09:00 2024-09-25T13:51+09:00 "Yahoo! JAPAN" App vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000036.html "Yahoo! JAPAN" App provided by LY Corporation contains a cross-site scripting vulnerability (CWE-79). Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000036 https://jvn.jp/en/jp/JVN23528780/index.html https://www.cve.org/CVERecord?id=CVE-2024-28895 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:linecorp:yahoo%21_japan cpe:/a:linecorp:yahoo%21_japan 2024-03-29T13:28+09:00 2024-03-29T13:28+09:00 2024-03-29T13:28+09:00 SEEnergy SVR-116 vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003047.html Network video recorder SVR-116 provided by SEEnergy Corp. contains an OS command injection vulnerability (CWE-78). Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC to notify users its existence and the solutions through JVN. JVNDB-2024-003047 https://jvn.jp/en/vu/JVNVU93932313/index.html https://www.cve.org/CVERecord?id=CVE-2024-29167 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:misc:seenergy_svr-116_firmware 2024-03-28T11:38+09:00 2024-03-28T11:38+09:00 2024-03-28T11:38+09:00 Security information for Hitachi Disk Array Systems https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003026.html Log files of Hitachi Disk Array Systems have the CVE-2022-36407 Plaintext Storage of Passwords vulnerability. JVNDB-2024-003026 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36407 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/h:hitachi:unified_storage cpe:/h:hitachi:virtual_storage_platform 2024-03-27T15:52+09:00 2024-03-27T15:52+09:00 2024-03-27T15:52+09:00 Multiple vulnerabilities in WordPress Plugin "Survey Maker" https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000035.html WordPress Plugin "Survey Maker" provided by AYS Pro Plugins contains multiple vulnerabilities listed below. <ul><li>Stored cross-site scripting (CWE-79) - CVE-2023-34423</li> <li>Insufficient verification of data authenticity (CWE-345) - CVE-2023-35764</li></ul> Atsuya Yoda of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000035 https://jvn.jp/en/jp/JVN51098626/index.html https://www.cve.org/CVERecord?id=CVE-2023-34423 https://www.cve.org/CVERecord?id=CVE-2023-35764 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ays-pro:survey_maker cpe:/a:ays-pro:survey_maker 2024-03-27T14:48+09:00 2024-03-27T14:48+09:00 2024-03-27T14:48+09:00 SonicDICOM Media Viewer may insecurely load Dynamic Link Libraries https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000034.html SonicDICOM Media Viewer provided by Fujidenolo Solutions Co., Ltd. contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427). Taihei Shimamine of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to the developer and coordinated. After the coordination was completed, Taihei Shimamine reported the case to JPCERT/CC to notify users of the solution through JVN. JVNDB-2024-000034 https://jvn.jp/en/jp/JVN40367518/index.html https://jvn.jp/en/ta/JVNTA91240916/index.html https://www.cve.org/CVERecord?id=CVE-2024-29734 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:fujidenolo_solutions_sonicdicom_media_viewer 2024-03-27T14:31+09:00 2024-03-27T14:31+09:00 2024-03-27T14:31+09:00 Multiple vulnerabilities in ELECOM wireless LAN routers https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003025.html Multiple wireless LAN routers provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below. * OS Command Injection (CWE-78) - CVE-2024-25568 * OS Command Injection (CWE-78) - CVE-2024-26258 * Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) - CVE-2024-29225 Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-003025 https://jvn.jp/en/vu/JVNVU95381465/index.html https://www.cve.org/CVERecord?id=CVE-2024-25568 https://www.cve.org/CVERecord?id=CVE-2024-26258 https://www.cve.org/CVERecord?id=CVE-2024-29225 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:elecom:wmc-x1800gst-b cpe:/o:elecom:wrc-2533gst2_firmware cpe:/o:elecom:wrc-g01-w cpe:/o:elecom:wrc-x3200gst3-b 2024-08-28T17:16+09:00 2024-03-27T14:26+09:00 2024-08-28T17:16+09:00 Mini Thread vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000905.html Mini Thread &lt;http://www.flashcgi.net/&gt; provided by Flash CGI (according to the original report submitted by the reporter) is a CGI script for creating a bulletin board system (BBS). Mini Thread contains a cross-site scripting vulnerability (CWE-79). During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied. 1.The developer of the product is unreachable 2.Existence of vulnerability has been verified 3.Not disclosing this case may result in the risk that product users will have no means to know of the existence of the vulnerability in the product 4.There are no particular reasons that would make disclosure inappropriate JVNDB-2024-000905 https://jvn.jp/en/jp/JVN40523785/index.html https://www.cve.org/CVERecord?id=CVE-2024-28034 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:flash_cgi_mini_thread 2024-03-26T17:43+09:00 2024-03-26T17:43+09:00 2024-03-26T17:43+09:00 ffBull vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000906.html ffBull &lt;http://www.gem.hi-ho.ne.jp/fortunefield/cgi/ffbull.html&gt; (according to the original report submitted by the reporter) provided by Fortunefield is a bulletin board system (BBS). ffBull contains an OS command injection vulnerability (CWE-78). During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied. 1.The developer of the product is unreachable 2.Existence of vulnerability has been verified 3.Not disclosing this case may result in the risk that product users will have no means to know of the existence of the vulnerability in the product 4.There are no particular reasons that would make disclosure inappropriate JVNDB-2024-000906 https://jvn.jp/en/jp/JVN17176449/index.html https://www.cve.org/CVERecord?id=CVE-2024-28048 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:fortunefield_ffbull 2024-03-26T16:07+09:00 2024-03-26T16:07+09:00 2024-03-26T16:07+09:00 "EasyRange" may insecurely load executable files https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000900.html "EasyRange" &lt;http://sira.jp/soft/&gt; provided by sira.jp (according to the original report submitted by the reporter) is a tool to extract compressed files. "EasyRange" contains an issue with the executable file search path when displaying an extracted file on Explorer, which may lead to loading an executable file resides in the same folder where the extracted file is placed (CWE-427). During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied. 1. The developer of the product is unreachable 2. Existence of vulnerability has been verified 3. Not disclosing this case may result in the risk that product users will have no means to know 4. There are no particular reasons that would make disclosure inappropriate JVNDB-2024-000900 https://jvn.jp/en/jp/JVN13113728/index.html https://www.cve.org/CVERecord?id=CVE-2024-28131 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:sira.jp_easyrange 2024-03-26T15:50+09:00 2024-03-26T15:50+09:00 2024-03-26T15:50+09:00 0ch BBS Script (0ch) vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000907.html 0ch BBS Script (0ch) (according to the original report submitted by the reporter) &lt;http://0ch.mine.nu/&gt; provided by Zerochannel (according to the original report submitted by the reporter) is bulletin board software. 0ch BBS Script (0ch) contains a cross-site scripting vulnerability (CWE-79). During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied. 1.The developer of the product is unreachable 2.Existence of vulnerability has been verified 3.Not disclosing this case may result in the risk that product users will have no means to know of the existence of the vulnerability in the product 4.There are no particular reasons that would make disclosure inappropriate JVNDB-2024-000907 https://jvn.jp/en/jp/JVN46874970/index.html https://www.cve.org/CVERecord?id=CVE-2024-28126 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:zerochannel_zerochannelscript 2024-03-26T15:35+09:00 2024-03-26T15:35+09:00 2024-03-26T15:35+09:00 TvRock vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000902.html TvRock &lt;http://1st.geocities.jp/tvrock_web/&gt; provided by TvRock (according to the original report submitted by the reporter) is a tool to set a timer recording for a TV program. TvRock contains a cross-site scripting vulnerability (CWE-79). During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied. 1. The developer of the product is unreachable 2. Existence of vulnerability has been verified 3. Not disclosing this case may result in the risk that product users will have no means to know 4. There are no particular reasons that would make disclosure inappropriate JVNDB-2024-000902 https://jvn.jp/en/jp/JVN69107517/index.html https://www.cve.org/CVERecord?id=CVE-2024-26018 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:tvrock_tvrock 2024-03-26T14:27+09:00 2024-03-26T14:27+09:00 2024-03-26T14:27+09:00 WebProxy vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000904.html WebProxy &lt;http://www.ln-lab.net/&gt; provided by LunarNight Laboratory (according to the original report submitted by the reporter) is software to build a proxy server. WebProxy contains an OS command injection vulnerability (CWE-78). During the meeting of Committee for authorizing the disclosure of unresolved vulnerabilities held on December 20, 2023, it was judged that an advisory for this vulnerability shall be disclosed since all the criteria and conditions described below which are stated in Standards for Handling Vulnerability related Information of Software Products and Other and Information Security Early Warning Partnership Guideline have been satisfied. 1. The developer of the product is unreachable 2. Existence of vulnerability has been verified 3. Not disclosing this case may result in the risk that product users will have no means to know 4. There are no particular reasons that would make disclosure inappropriate JVNDB-2024-000904 https://jvn.jp/en/jp/JVN22376992/index.html https://www.cve.org/CVERecord?id=CVE-2024-28033 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ln-lab:webproxy 2024-03-26T14:19+09:00 2024-03-26T14:19+09:00 2024-03-26T14:19+09:00 BUFFALO LinkStation 200 series vulnerable to arbitrary code execution https://jvndb.jvn.jp/en/contents/2024/JVNDB-2023-025113.html LinkStation 200 series provided by BUFFALO INC. is a network attached storage (NAS). LinkStation 200 series contains an arbitrary code execution vulnerability (CWE-354, CVE-2023-51073) due to insufficient verification of data authenticity during firmware update. BUFFALO INC. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2023-025113 https://jvn.jp/en/vu/JVNVU90953541/index.html https://www.cve.org/CVERecord?id=CVE-2023-51073 https://nvd.nist.gov/vuln/detail/CVE-2023-51073 https://github.com/christopher-pace/CVE-2023-51073/ https://www.buffalotech.com https://cwe.mitre.org/data/definitions/354.html cpe:/o:buffalo_inc:ls210d_firmware cpe:/o:buffalo_inc:ls220db_firmware cpe:/o:buffalo_inc:ls220dr_firmware cpe:/o:buffalo_inc:ls220d_firmware 2024-03-25T18:16+09:00 2024-03-25T18:16+09:00 2024-03-25T18:16+09:00 Multiple vulnerabilities in home gateway HGW BL1500HM https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003016.html Home gateway HGW BL1500HM provided by KDDI CORPORATION contains multiple vulnerabilities listed below. * Use of weak credentials (CWE-1391) - CVE-2024-21865, CVE-2024-29071 * Command injection (CWE-77) - CVE-2024-28041 Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-003016 https://jvn.jp/en/vu/JVNVU93546510/index.html https://www.cve.org/CVERecord?id=CVE-2024-21865 https://www.cve.org/CVERecord?id=CVE-2024-28041 https://www.cve.org/CVERecord?id=CVE-2024-29071 https://cwe.mitre.org/data/definitions/1391.html https://cwe.mitre.org/data/definitions/77.html cpe:/o:kddi:hgw_bl1500hm_firmware 2024-03-25T17:28+09:00 2024-03-25T17:28+09:00 2024-03-25T17:28+09:00 WordPress Plugin "easy-popup-show" vulnerable to cross-site request forgery https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000033.html WordPress Plugin "easy-popup-show" provided by Ari Susanto contains a cross-site request forgery vulnerability (CWE-352). Daiki Kojima of Cryptography Laboratory, Department of Information and Communication Engineering, Tokyo Denki University reported this vulnerability to the developer and coordinated. After the coordination was completed, Daiki Kojima reported the case to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000033 https://jvn.jp/en/jp/JVN86206017/index.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29009 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:ari_susanto_easy-popup-show 2024-03-25T13:31+09:00 2024-03-25T13:31+09:00 2024-03-25T13:31+09:00 Sangoma Technologies CG/MG family driver cg6kwin2k.sys vulnerable to insufficient access control on its IOCTL https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003008.html CG/MG family driver cg6kwin2k.sys provided by Sangoma Technologies is vulnerable to insufficient access control on its IOCTL (CWE-782). Takahiro Haruyama of Broadcom Carbon Black reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-003008 https://jvn.jp/en/vu/JVNVU90671953/index.html https://jvn.jp/en/ta/JVNTA90371415/index.html https://www.cve.org/CVERecord?id=CVE-2024-29216 https://cwe.mitre.org/data/definitions/782.html cpe:/o:sangoma:cg6kwin2k.sys 2024-04-24T11:45+09:00 2024-03-22T13:50+09:00 2024-04-24T11:45+09:00 Multiple vulnerabilities in FitNesse https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000032.html FitNesse contains multiple vulnerabilities listed below.<ul><li>Multiple cross-site scripting (CWE-79) - CVE-2024-23604, CVE-2024-28128</li><li>Improper restriction of XML external entity references (CWE-611) -CVE-2024-28039</li><li>OS command injection (CWE-78) - CVE-2024-28125</li></ul>CVE-2024-23604, CVE-2024-28039, CVE-2024-28125 Kanta Nishitani of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-28128 Yutaka WATANABE of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000032 https://jvn.jp/en/jp/JVN94521208/index.html https://www.cve.org/CVERecord?id=CVE-2024-23604 https://www.cve.org/CVERecord?id=CVE-2024-28039 https://www.cve.org/CVERecord?id=CVE-2024-28125 https://www.cve.org/CVERecord?id=CVE-2024-28128 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:fitnesse:fitnesse cpe:/a:fitnesse:fitnesse 2024-03-19T11:02+09:00 2024-03-18T14:08+09:00 2024-03-19T11:02+09:00 "ABEMA" App for Android fails to restrict access permissions https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000031.html "ABEMA" App for Android provided by AbemaTV, Inc. fails to restrict access permissions (CWE-926) that allows another app installed on the user's device to access an arbitrary URL on "ABEMA" App via Intent. Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000031 https://jvn.jp/en/jp/JVN70640802/index.html https://www.cve.org/CVERecord?id=CVE-2024-28745 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:abematv_abema 2024-03-15T16:37+09:00 2024-03-15T16:37+09:00 2024-03-15T16:37+09:00 Information Exposure Vulnerability in Cosminexus Component Container https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-002961.html An information exposure vulnerability (CVE-2023-6814) exists in Cosminexus Component Container. Affected products and versions are listed below. Please upgrade your version to the appropriate version. These vulnerabilities exist in Cosminexus Component Container which is a component product of other Hitachi products. For details about the fixed version about Cosminexus products, contact your Hitachi support service representative. JVNDB-2024-002961 https://www.cve.org/CVERecord?id=CVE-2023-6814 https://nvd.nist.gov/vuln/detail/CVE-2023-6814 https://cwe.mitre.org/data/definitions/532.html cpe:/a:hitachi:cosminexus_component_container cpe:/a:hitachi:hitachi_application_server64 cpe:/a:hitachi:hitachi_application_server_r cpe:/a:hitachi:ucosminexus_application_server cpe:/a:hitachi:ucosminexus_application_server_enterprise cpe:/a:hitachi:ucosminexus_application_server_standard cpe:/a:hitachi:ucosminexus_application_server_standard-r cpe:/a:hitachi:ucosminexus_developer cpe:/a:hitachi:ucosminexus_developer_professional cpe:/a:hitachi:ucosminexus_developer_professional_for_plug-in cpe:/a:hitachi:ucosminexus_developer_standard cpe:/a:hitachi:ucosminexus_primary_server_base cpe:/a:hitachi:ucosminexus_primary_server_base64 cpe:/a:hitachi:ucosminexus_service_architect cpe:/a:hitachi:ucosminexus_service_platform cpe:/a:hitachi:ucosminexus_service_platform_64 2024-03-13T12:10+09:00 2024-03-13T12:10+09:00 2024-03-13T12:10+09:00 a-blog cms vulnerable to directory traversal https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000030.html a-blog cms provided by appleple Inc. is a content management system (CMS). a-blog cms contains a directory traversal vulnerability (CWE-22). Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000030 https://jvn.jp/en/jp/JVN48443978/index.html https://www.cve.org/CVERecord?id=CVE-2024-27279 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:appleple:a-blog_cms 2024-03-08T15:27+09:00 2024-03-08T15:27+09:00 2024-03-08T15:27+09:00 OMRON NJ/NX series vulnerable to path traversal https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-002942.html Machine Automation Controller NJ/NX series provided by OMRON Corporation contain a path traversal vulnerability (CWE-22, CVE-2024-27121). OMRON Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2024-002942 https://jvn.jp/en/vu/JVNVU95852116/index.html https://www.cve.org/CVERecord?id=CVE-2024-27121 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:omron:machine_automation_controller_nj_series cpe:/a:omron:machine_automation_controller_nx_series 2024-03-08T14:16+09:00 2024-03-08T14:16+09:00 2024-03-08T14:16+09:00 Multiple vulnerabilities in SKYSEA Client View https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000028.html SKYSEA Client View provided by Sky Co.,LTD. is an Enterprise IT Asset Management Tool. SKYSEA Client View contains multiple vulnerabilities listed below. * Improper access control in the specific folder (CWE-276) - CVE-2024-21805 * Improper access control in the resident process (CWE-749) - CVE-2024-24964 CVE-2024-21805 Ken Kitahara of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-24964 Ruslan Sayfiev, and Denis Faiustov of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to Sky Co.,LTD. and coordinated. Sky Co.,LTD. and JPCERT/CC published respective advisories in order to notify users of the solutions through JVN. JVNDB-2024-000028 https://jvn.jp/en/jp/JVN54451757/index.html https://www.cve.org/CVERecord?id=CVE-2024-21805 https://www.cve.org/CVERecord?id=CVE-2024-24964 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:skygroup:skysea_client_view 2024-07-29T18:13+09:00 2024-03-07T16:09+09:00 2024-07-29T18:13+09:00 FUJIFILM Business Innovation Corp. printers vulnerable to cross-site request forgery https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000027.html Multiple printers provided by FUJIFILM Business Innovation Corp. contain a cross-site request forgery vulnerability (CWE-352). Junnosuke Kushibiki, Ryu Kuki, Masataka Mizokuchi, Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000027 https://jvn.jp/en/jp/JVN34328023/index.html https://www.cve.org/CVERecord?id=CVE-2024-27974 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:fuji_xerox:multiple_product 2024-03-06T18:24+09:00 2024-03-06T18:24+09:00 2024-03-06T18:24+09:00 Multiple vulnerabilities in printers and scanners which implement BROTHER Web Based Management https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000026.html Multiple printers and scanners which implement Web Based Management provided by BROTHER INDUSTRIES, LTD. contain multiple vulnerabilities listed below. * Improper Authentication (CWE-287) - CVE-2024-21824 * Cross-Site Request Forgery (CWE-352) - CVE-2024-22475 Hiroki Yasui, Yudai Morii, Takaya Noma, Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000026 https://jvn.jp/en/jp/JVN82749078/index.html https://www.cve.org/CVERecord?id=CVE-2024-21824 https://www.cve.org/CVERecord?id=CVE-2024-22475 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:brother:web_based_management 2024-03-06T18:12+09:00 2024-03-06T18:12+09:00 2024-03-06T18:12+09:00 Toyoko Inn official App vulnerable to improper server certificate verification https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000029.html Toyoko Inn official App provided by Toyoko Inn IT Solution Co., Ltd. is vulnerable to improper server certificate verification (CWE-295). Ryo Nihonyanagi of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000029 https://jvn.jp/en/jp/JVN52919306/index.html https://www.cve.org/CVERecord?id=CVE-2024-27440 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:toyoko_inn_it_solution_official_android_app_for_hotel_chain_toyoko_inn. cpe:/a:misc:toyoko_inn_it_solution_official_iphone_app_for_hotel_chain_toyoko_inn. 2024-03-06T13:53+09:00 2024-03-06T13:53+09:00 2024-03-06T13:53+09:00 Protection mechanism failure in RevoWorks https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000025.html RevoWorks SCVX and RevoWorks Browser provided by J's Communication Co., Ltd. enable users to execute web browsers in the sandboxed environment isolated from the client's local environment. In the products, file exchange between the sandboxed environment and local environment is prohibited in principle, but by using the optional "VirusChecker" or "ThreatChecker" feature and changing the policy settings, files checked for viruses by these features in the sandboxed environment can be permitted to be downloaded to the local environment. However, there is a vulnerability (CWE-693) in the products where malware detection is failed when data containing malware is saved in a specific file format (eml, dmg, vhd, iso, msi) in the sandboxed environment J's Communication Co., Ltd. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and J's Communication Co., Ltd. coordinated under the Information Security Early Warning Partnership. JVNDB-2024-000025 https://jvn.jp/en/jp/JVN35928117/index.html https://www.cve.org/CVERecord?id=CVE-2024-25091 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:jscom:revoworks_browser cpe:/a:jscom:revoworks_scvx 2024-02-29T15:40+09:00 2024-02-29T15:40+09:00 2024-02-29T15:40+09:00 OET-213H-BTS1 missing authorization check in the initial configuration https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000024.html OET-213H-BTS1 is a digital temperature measurement and face recognition terminal, developed by Zhejiang Uniview Technologies Co.,Ltd and provided by Atsumi Electric Co., Ltd. The initial configuration of the product is &#8203;insecure (CWE-1188), it does not perform an authorization check when processing the API requests. JVNDB-2024-000024 https://jvn.jp/en/jp/JVN77203800/index.html https://www.cve.org/CVERecord?id=CVE-2024-25972 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:atsumi_electric_oet-213h-bts1 2024-02-29T14:59+09:00 2024-02-29T14:59+09:00 2024-02-29T14:59+09:00 OpenPNE plugin "opTimelinePlugin" vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000023.html OpenPNE plugin "opTimelinePlugin" provided by OpenPNE Project contains a stored cross-site scripting vulnerability (CWE-79) in Edit Profile page. Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000023 https://jvn.jp/en/jp/JVN78084105/index.html https://www.cve.org/CVERecord?id=CVE-2024-27278 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:tejimaya:optimelineplugin 2024-02-29T13:12+09:00 2024-02-29T13:12+09:00 2024-02-29T13:12+09:00 Multiple vulnerabilities in baserCMS https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000022.html baserCMS provided by baserCMS Users Community contains multiple vulnerabilities listed below. <ul> <li>Reflected cross-site scripting vulnerability in Site search Feature (CWE-79) - CVE-2023-44379</li> <li>Stored cross-site scripting vulnerability in Content Management (CWE-79) - CVE-2024-26128</li> <li>OS command injection vulnerability (CWE-78) - CVE-2023-51450</li> </ul> CVE-2023-44379 Yusuke Uchida of PERSOL CROSS TECHNOLOGY CO., LTD. (Not affiliated at the time of report submission) reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-26128 Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-51450 Shunsuke Tanizaki reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000022 https://jvn.jp/en/jp/JVN73283159/index.html https://www.cve.org/CVERecord?id=CVE-2023-44379 https://www.cve.org/CVERecord?id=CVE-2024-26128 https://www.cve.org/CVERecord?id=CVE-2023-51450 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:basercms:basercms 2024-02-27T14:25+09:00 2024-02-27T14:25+09:00 2024-02-27T14:25+09:00 ELECOM wireless LAN routers vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-002831.html Multiple wireless LAN routers provided by ELECOM CO.,LTD. contain an OS command injection vulnerability. Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-002831 https://jvn.jp/en/vu/JVNVU99444194/index.html https://www.cve.org/CVERecord?id=CVE-2024-25579 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:elecom:wmc-x1800gst-b cpe:/o:elecom:wrc-1167gs2-b_firmware cpe:/o:elecom:wrc-1167gs2h-b_firmware cpe:/o:elecom:wrc-2533gs2-b_firmware cpe:/o:elecom:wrc-2533gs2-w_firmware cpe:/o:elecom:wrc-2533gs2v-b_firmware cpe:/o:elecom:wrc-2533gst2_firmware cpe:/o:elecom:wrc-g01-w cpe:/o:elecom:wrc-x3200gst3-b 2024-08-28T17:09+09:00 2024-02-22T08:15+09:00 2024-08-28T17:09+09:00 EL Injection Vulnerability in Hitachi Global Link Manager https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-002832.html An EL Injection Vulnerability (CVE-2024-0715) exists in Hitachi Global Link Manager. Affected products and versions are listed below. Please upgrade your version to the appropriate version. JVNDB-2024-002832 https://www.cve.org/CVERecord?id=CVE-2024-0715 https://nvd.nist.gov/vuln/detail/CVE-2024-0715 https://cwe.mitre.org/data/definitions/917.html cpe:/a:hitachi:global_link_manager 2024-02-21T15:53+09:00 2024-02-21T15:53+09:00 2024-02-21T15:53+09:00 Multiple vulnerabilities in ELECOM wireless LAN routers and wireless LAN repeater https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000020.html Multiple wireless LAN routers and wireless LAN repeater provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below. <ul><li>Cross-site Scripting (CWE-79) - CVE-2024-21798</li> <li>Cross-Site Request Forgery (CWE-352) - CVE-2024-23910</li></ul> CVE-2024-21798 Yamaguchi Kakeru of Fujitsu Limited reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-23910 Satoru Nagaoka of Cyber Defense Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000020 https://jvn.jp/en/jp/JVN44166658/index.html https://www.cve.org/CVERecord?id=CVE-2024-21798 https://www.cve.org/CVERecord?id=CVE-2024-23910 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:elecom:wmc-x1800gst-b cpe:/o:elecom:wrc-1167gs2-b_firmware cpe:/o:elecom:wrc-1167gs2h-b_firmware cpe:/o:elecom:wrc-2533gs2-b_firmware cpe:/o:elecom:wrc-2533gs2-w_firmware cpe:/o:elecom:wrc-2533gs2v-b_firmware cpe:/o:elecom:wrc-g01-w cpe:/o:elecom:wrc-x3200gst3-b cpe:/o:elecom:wsc-x1800gs-b 2024-03-26T14:10+09:00 2024-02-20T14:14+09:00 2024-03-26T14:10+09:00 Android App "Mopria Print Service" vulnerable to improper intent handling https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-002560.html Android app "Mopria Print Service" provided by Mopria Alliance is vulnerable to improper intent handling (CWE-668). Johan Francsics reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-002560 https://jvn.jp/en/vu/JVNVU93381734/index.html https://www.cve.org/CVERecord?id=CVE-2024-25555 https://cwe.mitre.org/data/definitions/668.html cpe:/a:misc:mopria_alliance_mopria_print_service 2024-02-15T15:26+09:00 2024-02-15T15:26+09:00 2024-02-15T15:26+09:00 a-blog cms vulnerable to URL spoofing https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000019.html a-blog cms provided by appleple Inc. is a content management system (CMS). a-blog cms contains an URL spoofing vulnerability (CWE-451). Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000019 https://jvn.jp/en/jp/JVN48966481/index.html https://www.cve.org/CVERecord?id=CVE-2024-25559 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:appleple:a-blog_cms 2024-02-15T14:12+09:00 2024-02-15T14:12+09:00 2024-02-15T14:12+09:00 Multiple out-of-bounds write vulnerabilities in Canon Office/Small Office Multifunction Printers and Laser Printers https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-002050.html Office/Small Office Multifunction Printers and Laser Printers provided by Canon Inc. contain multiple out-of-bounds write vulnerabilities (CWE-787, CVE-2023-6229, CVE-2023-6230, CVE-2023-6231, CVE-2023-6232, CVE-2023-6233, CVE-2023-6234, CVE-2024-0244). Canon Inc. reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2024-002050 https://jvn.jp/en/vu/JVNVU90033405/index.html https://www.cve.org/CVERecord?id=CVE-2023-6229 https://www.cve.org/CVERecord?id=CVE-2023-6230 https://www.cve.org/CVERecord?id=CVE-2023-6231 https://www.cve.org/CVERecord?id=CVE-2023-6232 https://www.cve.org/CVERecord?id=CVE-2023-6233 https://www.cve.org/CVERecord?id=CVE-2023-6234 https://www.cve.org/CVERecord?id=CVE-2024-0244 https://nvd.nist.gov/vuln/detail/CVE-2023-6229 https://nvd.nist.gov/vuln/detail/CVE-2023-6230 https://nvd.nist.gov/vuln/detail/CVE-2023-6231 https://nvd.nist.gov/vuln/detail/CVE-2023-6232 https://nvd.nist.gov/vuln/detail/CVE-2023-6233 https://nvd.nist.gov/vuln/detail/CVE-2023-6234 https://nvd.nist.gov/vuln/detail/CVE-2024-0244 https://cwe.mitre.org/data/definitions/787.html cpe:/a:canon:multiple_product 2024-03-08T18:05+09:00 2024-02-07T15:39+09:00 2024-03-08T18:05+09:00 Sharp NEC Display Solutions' public displays vulnerable to local file inclusion https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001882.html Multiple public displays provided by Sharp NEC Display Solutions, Ltd. contain a local file inclusion vulnerability (CWE-22, CVE-2023-7077). Tunahan TEKEO&#286;LU of Senior Cyber Security Consultant reported this vulnerability to Sharp NEC Display Solutions, Ltd. and coordinated. Sharp NEC Display Solutions, Ltd. reported this case to JPCERT/CC to notify users of the solution through JVN. JVNDB-2024-001882 https://jvn.jp/en/vu/JVNVU97836276/index.html https://www.cve.org/CVERecord?id=CVE-2023-7077 https://nvd.nist.gov/vuln/detail/CVE-2023-7077 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:sharp-nec-displays:multiple_product 2024-07-11T14:27+09:00 2024-02-07T14:25+09:00 2024-07-11T14:27+09:00 Zeroshell vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2020-013805.html The web interface of Zeroshell, Linux distribution provided by Zeroshell.org, contains an OS command injection vulnerability (CWE-78). Hirukawa Norihiko of MYT Consulting Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2020-013805 https://jvn.jp/en/jp/JVN44033918/index.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29390 https://nvd.nist.gov/vuln/detail/CVE-2020-29390 https://www.exploit-db.com/exploits/41040 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:zeroshell:zeroshell 2024-02-07T13:38+09:00 2024-02-07T13:38+09:00 2024-02-07T13:38+09:00 Multiple buffer overflow vulnerabilities in HOME SPOT CUBE2 https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001804.html HOME SPOT CUBE2 provided by KDDI CORPORATION contains multiple vulnerabilities listed below. * Stack-based buffer overflow (CWE-121) - CVE-2024-21780 * Heap-based buffer overflow (CWE-122) - CVE-2024-23978 Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-001804 https://jvn.jp/en/vu/JVNVU93740658/index.html https://www.cve.org/CVERecord?id=CVE-2024-21780 https://www.cve.org/CVERecord?id=CVE-2024-23978 https://nvd.nist.gov/vuln/detail/CVE-2024-21780 https://nvd.nist.gov/vuln/detail/CVE-2024-23978 https://cwe.mitre.org/data/definitions/121.html https://cwe.mitre.org/data/definitions/122.html cpe:/o:kddi:home_spot_cube_2_firmware 2024-03-11T17:32+09:00 2024-02-06T15:02+09:00 2024-03-11T17:32+09:00 Incorrect permission assignment vulnerability in Trend Micro uiAirSupport https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001785.html Trend Micro Incorporated has released a security update for Trend Micro uiAirSupport. Proof-of-concept code (PoC) for this vulnerability is available on the Internet. Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN. JVNDB-2024-001785 https://jvn.jp/en/vu/JVNVU99844997/index.html https://www.cve.org/CVERecord?id=CVE-2024-23940 https://nvd.nist.gov/vuln/detail/CVE-2024-23940 https://medium.com/@s1kr10s/av-when-a-friend-becomes-an-enemy-55f41aba42b1 https://cwe.mitre.org/data/definitions/427.html cpe:/a:trendmicro:antivirus_%2B_security cpe:/a:trendmicro:internet_security cpe:/a:trendmicro:maximum_security cpe:/a:trendmicro:premium_security 2024-03-11T17:42+09:00 2024-02-06T14:46+09:00 2024-03-11T17:42+09:00 Cybozu KUNAI for Android vulnerable to denial-of-service (DoS) https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000017.html Cybozu KUNAI for Android is a client application for using Cybozu products from an Android device. Cybozu KUNAI for Android contains an issue allowing to send massive requests to the connected Cybozu product if a user performs certain operations on KUNAI, which may result in repeated session disconnections in a short period of time and preventing normal use of KUNAI (CWE-436). Cybozu, Inc. reported this vulnerability to JPCERT/CC to notify users of the solution through JVN. JVNDB-2024-000017 https://jvn.jp/en/jp/JVN18743512/index.html https://www.cve.org/CVERecord?id=CVE-2024-23304 https://nvd.nist.gov/vuln/detail/CVE-2024-23304 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:cybozu:kunai 2024-06-27T13:28+09:00 2024-02-06T13:25+09:00 2024-06-27T13:28+09:00 File and Directory Permissions Vulnerability in Hitachi Tuning Manager https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001462.html A File and Directory Permissions Vulnerability (CVE-2023-6457) exists in Hitachi Tuning Manager. JVNDB-2024-001462 https://www.cve.org/CVERecord?id=CVE-2023-6457 https://nvd.nist.gov/vuln/detail/CVE-2023-6457 https://cwe.mitre.org/data/definitions/276.html cpe:/a:hitachi:tuning_manager 2024-02-05T14:54+09:00 2024-02-05T14:54+09:00 2024-02-05T14:54+09:00 Group Office vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000016.html Group Office provided by Intermesh BV contains a stored cross-site scripting vulnerability (CWE-79). Yoichi Tsuzuki of FFRI Security, Inc. and Tsutomu Aramaki of Mitsui Bussan Secure Directions, Inc reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000016 https://jvn.jp/en/jp/JVN63567545/index.html https://www.cve.org/CVERecord?id=CVE-2024-23941 https://nvd.nist.gov/vuln/detail/CVE-2024-23941 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:intermesh:group_office cpe:/a:intermesh:group_office cpe:/a:intermesh:group_office 2024-03-11T18:04+09:00 2024-02-01T13:48+09:00 2024-03-11T18:04+09:00 Payment EX vulnerable to information disclosure https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000015.html Payment EX provided by Simplesite contains an information disclosure vulnerability (CWE-200). JVNDB-2024-000015 https://jvn.jp/en/jp/JVN41129639/index.html https://www.cve.org/CVERecord?id=CVE-2024-24548 https://nvd.nist.gov/vuln/detail/CVE-2024-24548 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:estore-wss:payment_ex 2024-03-11T17:42+09:00 2024-02-01T13:41+09:00 2024-03-11T17:42+09:00 Multiple vulnerabilities in SHARP Energy Management Controller with Cloud Services https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001161.html Energy Management Controller with Cloud Services provided by SHARP CORPORATION contains multiple vulnerabilities listed below. * Improper authentication (CWE-287) - CVE-2024-23783 * Improper access control (CWE-284) - CVE-2024-23784 * Cross-site request forgery (CWE-352) - CVE-2024-23785 * Stored cross-site scripting (CWE-79) - CVE-2024-23786 * Path traversal (CWE-22) - CVE-2024-23787 * Server-side request forgery (CWE-918) - CVE-2024-23788 * OS command injection (CWE-78) - CVE-2024-23789 Shoji Baba of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-001161 https://jvn.jp/en/vu/JVNVU94591337/index.html https://www.cve.org/CVERecord?id=CVE-2024-23783 https://www.cve.org/CVERecord?id=CVE-2024-23784 https://www.cve.org/CVERecord?id=CVE-2024-23785 https://www.cve.org/CVERecord?id=CVE-2024-23786 https://www.cve.org/CVERecord?id=CVE-2024-23787 https://www.cve.org/CVERecord?id=CVE-2024-23788 https://www.cve.org/CVERecord?id=CVE-2024-23789 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/284.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/918.html cpe:/o:sharp:jh-rv11 cpe:/o:sharp:jh-rvb1 2024-01-31T16:01+09:00 2024-01-31T16:01+09:00 2024-01-31T16:01+09:00 File and Directory Permissions Vulnerability in Hitachi Storage Plug-in for VMware vCenter https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001160.html A File and Directory Permissions Vulnerability exists in Hitachi Storage Plug-in for VMware vCenter. Affected products and versions are listed below. Please upgrade your version to the appropriate version. JVNDB-2024-001160 https://www.cve.org/CVERecord?id=CVE-2024-21840 https://nvd.nist.gov/vuln/detail/CVE-2024-21840 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:storage_plug-in 2024-03-11T17:41+09:00 2024-01-31T15:25+09:00 2024-03-11T17:41+09:00 ELECOM wireless LAN routers vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001061.html Multiple ELECOM wireless LAN routers provided by ELECOM CO.,LTD. contain an OS command injection vulnerability. Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-001061 https://jvn.jp/en/vu/JVNVU90908488/index.html https://www.cve.org/CVERecord?id=CVE-2024-22372 https://nvd.nist.gov/vuln/detail/CVE-2024-22372 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:elecom:wrc-x1500GS-B cpe:/o:elecom:wrc-x1500GSA-B cpe:/o:elecom:wrc-x1800gs-b_firmware cpe:/o:elecom:wrc-x1800gsa-b_firmware cpe:/o:elecom:wrc-x1800gsh-b_firmware cpe:/o:elecom:wrc-x3000gs2-b_firmware cpe:/o:elecom:wrc-x3000gs2-w_firmware cpe:/o:elecom:wrc-x3000gs2a-b_firmware cpe:/o:elecom:wrc-x6000xs-g_firmware cpe:/o:elecom:wrc-x6000xst-g_firmware 2024-08-28T17:12+09:00 2024-01-24T17:16+09:00 2024-08-28T17:12+09:00 Yamaha wireless LAN access point devices vulnerable to active debug code https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001062.html Active debug code (CWE-489) exists in wireless LAN access point devices provided by Yamaha Corporation. The debug function can be enabled by performing specific operations. Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-001062 https://jvn.jp/en/vu/JVNVU99896362/index.html https://www.cve.org/CVERecord?id=CVE-2024-22366 https://nvd.nist.gov/vuln/detail/CVE-2024-22366 https://cwe.mitre.org/data/definitions/489.html cpe:/o:yamaha:wlx202_firmware cpe:/o:yamaha:wlx212_firmware cpe:/o:yamaha:wlx222_firmware cpe:/o:yamaha:wlx313_firmware cpe:/o:yamaha:wlx413_firmware 2024-03-13T17:24+09:00 2024-01-24T17:16+09:00 2024-03-13T17:24+09:00 Oracle WebLogic Server vulnerable to HTTP header injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000014.html Oracle WebLogic Server provided by Oracle contains an HTTP header injection vulnerability (CWE-113). Professional Service Department of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000014 https://jvn.jp/en/jp/JVN93541851/index.html https://www.cve.org/CVERecord?id=CVE-2024-20927 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:oracle:weblogic_server cpe:/a:oracle:weblogic_server 2024-01-24T13:53+09:00 2024-01-24T13:53+09:00 2024-01-24T13:53+09:00 "Mercari" App for Android fails to restrict custom URL schemes properly https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000005.html "Mercari" App for Android by Mercari, Inc. provides the function to access a requested URL using Custom URL Scheme. The App does not restrict access to the function properly (CWE-939) which may be exploited to direct the App to access any sites. Shiga Takuma of BroadBand Security Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000005 https://jvn.jp/en/jp/JVN70818619/index.html https://www.cve.org/CVERecord?id=CVE-2024-23388 https://nvd.nist.gov/vuln/detail/CVE-2024-23388 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:mercari:mercari 2024-03-04T18:01+09:00 2024-01-24T13:46+09:00 2024-03-04T18:01+09:00 Improper restriction of XML external entity references (XXE) in MLIT "Electronic Delivery Check System" and "Electronic delivery item Inspection Support System" https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000008.html "Electronic Delivery Check System" and "Electronic delivery item Inspection Support System" provided by Ministry of Land, Infrastructure, Transport and Tourism, Japan improperly restricts XML external entity references (XXE) (CWE-611). Toyama Taku, Iwakawa Kento of NEC Corporation, and Manami Kawauchi of NEC Fielding,Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000008 https://jvn.jp/en/jp/JVN77736613/index.html https://www.cve.org/CVERecord?id=CVE-2024-21765 https://nvd.nist.gov/vuln/detail/CVE-2024-21765 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:mlit:electronic_delivery_check_system cpe:/a:mlit:electronic_delivery_item_inspection_support_system 2024-03-13T17:40+09:00 2024-01-23T16:57+09:00 2024-03-13T17:40+09:00 Android App "Spoon" uses a hard-coded API key for an external service https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000013.html Android App "Spoon" provided by Spoon Radio Japan Inc. uses a hard-coded API key for an external service (CWE-798). Yoshihito Sakai of BroadBand Security, Inc reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000013 https://jvn.jp/en/jp/JVN96154238/index.html https://www.cve.org/CVERecord?id=CVE-2024-23453 https://nvd.nist.gov/vuln/detail/CVE-2024-23453 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:spooncast:spoon 2024-03-14T17:44+09:00 2024-01-23T16:53+09:00 2024-03-14T17:44+09:00 Improper restriction of XML external entity references (XXE) in "Electronic Delivery Check System (Ministry of Agriculture, Forestry and Fisheries The Agriculture and Rural Development Project Version)" https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000010.html "Electronic Delivery Check System (Ministry of Agriculture, Forestry and Fisheries The Agriculture and Rural Development Project Version)" provided by Ministry of Agriculture, Forestry and Fisheries improperly restricts XML external entity references (XXE) (CWE-611). Iwakawa Kento and Toyama Taku of NEC Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000010 https://jvn.jp/en/jp/JVN01434915/index.html https://www.cve.org/CVERecord?id=CVE-2024-22380 https://nvd.nist.gov/vuln/detail/CVE-2024-22380 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:maff:electronic_delivery_check_system 2024-03-14T17:33+09:00 2024-01-23T15:25+09:00 2024-03-14T17:33+09:00 Improper restriction of XML external entity references (XXE) in Electronic Deliverables Creation Support Tool provided by Ministry of Defense https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000009.html Electronic Deliverables Creation Support Tool provided by Ministry of Defense improperly restricts XML external entity references (XXE) (CWE-611). Toyama Taku of NEC Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000009 https://jvn.jp/en/jp/JVN40049211/index.html https://www.cve.org/CVERecord?id=CVE-2024-21796 https://nvd.nist.gov/vuln/detail/CVE-2024-21796 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:dfeg:electronic_deliverables_creation_support_tool 2024-03-13T17:46+09:00 2024-01-23T15:13+09:00 2024-03-13T17:46+09:00 Access analysis CGI An-Analyzer vulnerable to open redirect https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000012.html Access analysis CGI An-Analyzer provided by ANGLERSNET Co,.Ltd. contains an open redirect vulnerability (CWE-601). Tomoomi Iwata of Information-technology Promotion Agency, Japan reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000012 https://jvn.jp/en/jp/JVN73587943/index.html https://www.cve.org/CVERecord?id=CVE-2024-22113 https://nvd.nist.gov/vuln/detail/CVE-2024-22113 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:anglers-net:cgi_an-anlyzer 2024-03-13T17:34+09:00 2024-01-22T15:57+09:00 2024-03-13T17:34+09:00 Multiple vulnerabilities in a-blog cms https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000011.html a-blog cms provided by appleple inc. contains multiple vulnerabilities listed below.<ul><li>Improper input validation (CWE-20) - CVE-2024-23180</li><li>Cross-site scripting (CWE-79) - CVE-2024-23181</li><li>Relative path traversal (CWE-23) - CVE-2024-23182</li><li>Cross-site scripting (CWE-79) - CVE-2024-23183</li><li>Improper input validation (CWE-20) - CVE-2024-23348</li><li>Cross-site scripting (CWE-79) - CVE-2024-23782</li></ul> CVE-2024-23180 Naoya Miyaguchi reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-23181 Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-23182, CVE-2024-23183 Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2024-23348, CVE-2024-23782 Yuta Morioka of Information Science College reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000011 https://jvn.jp/en/jp/JVN34565930/index.html https://www.cve.org/CVERecord?id=CVE-2024-23180 https://www.cve.org/CVERecord?id=CVE-2024-23181 https://www.cve.org/CVERecord?id=CVE-2024-23182 https://www.cve.org/CVERecord?id=CVE-2024-23183 https://www.cve.org/CVERecord?id=CVE-2024-23348 https://www.cve.org/CVERecord?id=CVE-2024-23782 https://nvd.nist.gov/vuln/detail/CVE-2024-23180 https://nvd.nist.gov/vuln/detail/CVE-2024-23181 https://nvd.nist.gov/vuln/detail/CVE-2024-23182 https://nvd.nist.gov/vuln/detail/CVE-2024-23183 https://nvd.nist.gov/vuln/detail/CVE-2024-23348 https://nvd.nist.gov/vuln/detail/CVE-2024-23782 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/23.html cpe:/a:appleple:a-blog_cms 2024-03-13T17:50+09:00 2024-01-22T15:08+09:00 2024-03-13T17:50+09:00 FusionPBX vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000006.html FusionPBX contains a stored cross-site scripting vulnerability (CWE-79). Satoshi Horikoshi reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000006 https://jvn.jp/en/jp/JVN67215338/index.html https://www.cve.org/CVERecord?id=CVE-2024-23387 https://nvd.nist.gov/vuln/detail/CVE-2024-23387 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:fusionpbx:fusionpbx 2024-03-12T17:31+09:00 2024-01-19T12:30+09:00 2024-03-12T17:31+09:00 Multiple Dahua Technology products vulnerable to authentication bypass https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000007.html Multiple products provided by Dahua Technology contain an authentication bypass vulnerability (CWE-287). Mitsui Bussan Secure Directions, Inc. reported the vulnerability existed in "DHI-ASI7213Y-V3-T1" to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000007 https://jvn.jp/en/jp/JVN83655695/index.html https://www.cve.org/CVERecord?id=CVE-2021-33044 https://nvd.nist.gov/vuln/detail/CVE-2021-33044 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:dahuasecurity:dhi-asi7213y-v3-t1_firmware cpe:/o:dahuasecurity:ipc-hum7xxx_firmware cpe:/o:dahuasecurity:ipc-hx1xxx_firmware cpe:/o:dahuasecurity:ipc-hx2xxx_firmware cpe:/o:dahuasecurity:ipc-hx3xxx_firmware cpe:/o:dahuasecurity:ipc-hx5%284%29%283%29xxx_firmware cpe:/o:dahuasecurity:ipc-hx5xxx_firmware cpe:/o:dahuasecurity:ipc-hx8xxx_firmware cpe:/o:dahuasecurity:ptz-dome-camera-sd1a1_firmware cpe:/o:dahuasecurity:ptz-dome-camera-sd22_firmware cpe:/o:dahuasecurity:ptz-dome-camera-sd49_firmware cpe:/o:dahuasecurity:ptz-dome-camera-sd50_firmware cpe:/o:dahuasecurity:ptz-dome-camera-sd52c_firmware cpe:/o:dahuasecurity:ptz-dome-camera-sd6al_firmware cpe:/o:dahuasecurity:thermal-tpc-bf1241_firmware cpe:/o:dahuasecurity:thermal-tpc-bf2221_firmware cpe:/o:dahuasecurity:thermal-tpc-bf5xxx_firmware cpe:/o:dahuasecurity:thermal-tpc-sd2221_firmware cpe:/o:dahuasecurity:thermal-tpc-sd8x21b_firmware cpe:/o:dahuasecurity:thermal-tpc-sd8x21_firmware cpe:/o:dahuasecurity:vth-542xh_firmware cpe:/o:dahuasecurity:vto-65xxx_firmware cpe:/o:dahuasecurity:vto-75x95x_firmware 2024-07-11T16:10+09:00 2024-01-18T13:43+09:00 2024-07-11T16:10+09:00 Drupal vulnerable to improper handling of structural elements https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000004.html Drupal provided by Drupal.org contains an improper handling of structural elements vulnerability (CWE-237). Shiga Takuma of BroadBand Security Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000004 https://jvn.jp/en/jp/JVN63383723/index.html https://www.cve.org/CVERecord?id=CVE-2024-22362 https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-22362 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:drupal:drupal 2024-03-12T17:33+09:00 2024-01-16T13:41+09:00 2024-03-12T17:33+09:00 Pleasanter vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000003.html Pleasanter provided by Implem Inc. contains a cross-site scripting vulnerability (CWE-79). Masamitsu Kushi of Operation Group, Communication Technology Department, Digital Innovation HQ at Mitsubishi Heavy Industries, Ltd. reported this vulnerability to Implem Inc. and coordinated. After the coordination was completed, Implem Inc. reported the case to IPA under the Information Security Early Warning Partnership to notify users of the solution through JVN. JVNDB-2024-000003 https://jvn.jp/en/jp/JVN51135247/index.html https://www.cve.org/CVERecord?id=CVE-2024-21584 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:pleasanter:pleasanter 2024-01-15T15:59+09:00 2024-01-15T15:59+09:00 2024-01-15T15:59+09:00 Thermal camera TMC series vulnerable to insufficient technical documentation https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000002.html Thermal camera TMC series provided by THREE R SOLUTION CORP. JAPAN are vulnerable to insufficient technical documentation (CWE-1059). The related documentation does not describe the existence of the network interface, nor the internal storage for pictures and measurement data. Hiroyuki Harada of Sapporo Gakuin University reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000002 https://jvn.jp/en/jp/JVN96240417/index.html https://www.cve.org/CVERecord?id=CVE-2024-22028 https://nvd.nist.gov/vuln/detail/CVE-2024-22028 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:3rrr-btob:3r-tmc01_firmware cpe:/o:3rrr-btob:3r-tmc02_firmware cpe:/o:3rrr-btob:3r-tmc03_firmware cpe:/o:3rrr-btob:3r-tmc04_firmware cpe:/o:3rrr-btob:3r-tmc05_firmware cpe:/o:3rrr-btob:3r-tmc06_firmware 2024-03-11T18:17+09:00 2024-01-15T15:19+09:00 2024-03-11T18:17+09:00 Improper input validation vulnerability in WordPress Plugin "WordPress Quiz Maker Plugin" https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000001.html WordPress Plugin "WordPress Quiz Maker Plugin" provided by AYS Pro Plugins contains an improper input validation vulnerability (CWE-20). Shogo Kumamaru of LAC CyberLink Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2024-000001 https://jvn.jp/en/jp/JVN37326856/index.html https://www.cve.org/CVERecord?id=CVE-2024-22027 https://nvd.nist.gov/vuln/detail/CVE-2024-22027 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ays-pro:quiz_maker 2024-03-14T12:28+09:00 2024-01-12T13:51+09:00 2024-03-14T12:28+09:00 Multiple TP-Link products vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001002.html Multiple products provided by TP-LINK contain multiple vulnerabilities listed below. * OS command injection (CWE-78) - CVE-2024-21773 * OS command injection (CWE-78) - CVE-2024-21821 * OS command injection (CWE-78) - CVE-2024-21833 Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2024-001002 https://jvn.jp/en/vu/JVNVU91401812/index.html https://www.cve.org/CVERecord?id=CVE-2024-21773 https://www.cve.org/CVERecord?id=CVE-2024-21821 https://www.cve.org/CVERecord?id=CVE-2024-21833 https://nvd.nist.gov/vuln/detail/CVE-2024-21773 https://nvd.nist.gov/vuln/detail/CVE-2024-21821 https://nvd.nist.gov/vuln/detail/CVE-2024-21833 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:tp-link:archer_air_r5_firmware cpe:/o:tp-link:archer_ax3000_firmware cpe:/o:tp-link:archer_ax5400_firmware cpe:/o:tp-link:archer_axe75 cpe:/o:tp-link:deco_x50_firmware cpe:/o:tp-link:deco_xe200_firmware 2024-03-14T13:52+09:00 2024-01-10T13:57+09:00 2024-03-14T13:52+09:00 Multiple vulnerabilities in Panasonic Control FPWIN Pro7 https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-001001.html Control FPWIN Pro7 provided by Panasonic contains multiple vulnerabilities listed below. * Stack-based Buffer Overflow (CWE-121) - CVE-2023-6314 * Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) - CVE-2023-6315 Michael Heinzl reported these vulnerabilities to the developer and coordinated. After the coordination was completed, Panasonic reported the case to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2024-001001 https://jvn.jp/en/vu/JVNVU92102247/index.html https://www.cve.org/CVERecord?id=CVE-2023-6314 https://www.cve.org/CVERecord?id=CVE-2023-6315 https://nvd.nist.gov/vuln/detail/CVE-2023-6314 https://nvd.nist.gov/vuln/detail/CVE-2023-6315 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/121.html cpe:/a:panasonic:fpwin_pro 2024-01-10T13:46+09:00 2024-01-10T13:46+09:00 2024-01-10T13:46+09:00 Multiple vulnerabilities in PowerCMS https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000126.html PowerCMS provided by Alfasado Inc. contains multiple vulnerabilities listed below. <ul><li>Stored cross-site scripting vulnerability in the management screen (CWE-79) - CVE-2023-49117</li><li>Open redirect vulnerability in the members' site (CWE-601) - CVE-2023-50297</li></ul> Alfasado Inc. reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JPCERT/CC and Alfasado Inc. coordinated under the Information Security Early Warning Partnership. JVNDB-2023-000126 https://jvn.jp/en/jp/JVN32646742/index.html https://www.cve.org/CVERecord?id=CVE-2023-49117 https://www.cve.org/CVERecord?id=CVE-2023-50297 https://nvd.nist.gov/vuln/detail/CVE-2023-49117 https://nvd.nist.gov/vuln/detail/CVE-2023-50297 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:alfasado:powercms 2024-03-18T17:58+09:00 2023-12-26T16:46+09:00 2024-03-18T17:58+09:00 Multiple vulnerabilities in BUFFALO VR-S1000 https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000125.html VR-S1000 provided by BUFFALO INC. contains multiple vulnerabilities listed below. <ul><li>OS command injection (CWE-78) - CVE-2023-45741</li><li>Argument injection (CWE-88) - CVE-2023-46681</li><li>Use of hard-coded cryptographic key (CWE-321) - CVE-2023-46711</li><li>Information disclosure (CWE-200) - CVE-2023-51363</li></ul> CVE-2023-45741, CVE-2023-46681, CVE-2023-46711 Thomas J. Knudsen and Samy Younsi of NeroTeam Security Labs reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. CVE-2023-51363 MASAHIRO IIDA of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000125 https://jvn.jp/en/jp/JVN23771490/index.html https://www.cve.org/CVERecord?id=CVE-2023-45741 https://www.cve.org/CVERecord?id=CVE-2023-46681 https://www.cve.org/CVERecord?id=CVE-2023-46711 https://www.cve.org/CVERecord?id=CVE-2023-51363 https://nvd.nist.gov/vuln/detail/CVE-2023-45741 https://nvd.nist.gov/vuln/detail/CVE-2023-46681 https://nvd.nist.gov/vuln/detail/CVE-2023-46711 https://nvd.nist.gov/vuln/detail/CVE-2023-51363 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:buffalo_inc:vr-s1000_firmware 2024-03-19T17:56+09:00 2023-12-26T15:51+09:00 2024-03-19T17:56+09:00 Brother iPrint&Scan Desktop for Windows vulnerable to improper link resolution before file access https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-014781.html iPrint&Scan Desktop for Windows provided by Brother Industries, Ltd. outputs logs to a certain log file. The affected version of the product does not check whether the log file is a normal file or a symbolic link to a certain file (CWE-59). Chris Au reported this vulnerability to Brother Industries, Ltd. and coordinated. Brother Industries, Ltd. and JPCERT/CC published respective advisories in order to notify users of this vulnerability. JVNDB-2023-014781 https://jvn.jp/en/vu/JVNVU97943829/ https://www.cve.org/CVERecord?id=CVE-2023-51654 https://nvd.nist.gov/vuln/detail/CVE-2023-51654 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:brother:iprint%26scan 2024-03-18T18:05+09:00 2023-12-26T09:27+09:00 2024-03-18T18:05+09:00 WordPress plugin "MW WP Form" vulnerable to arbitrary file upload https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-012042.html WordPress plugin "MW WP Form" provided by Web Consultation Office Co., Ltd can create a mail form using shortcode. MW WP Form contains a vulnerability that may allow an attacker to upload arbitrary files (CVE-2023-6316, CWE-434). JVNDB-2023-012042 https://jvn.jp/en/vu/JVNVU97876221/index.html https://www.cve.org/CVERecord?id=CVE-2023-6316 https://nvd.nist.gov/vuln/detail/CVE-2023-6316 https://www.wordfence.com/blog/2023/12/update-asap-critical-unauthenticated-arbitrary-file-upload-in-mw-wp-form-allows-malicious-code-execution/ https://cwe.mitre.org/data/definitions/434.html cpe:/a:mw_wp_form_project:mw_wp_form 2024-03-26T17:39+09:00 2023-12-15T15:17+09:00 2024-03-26T17:39+09:00 Multiple vulnerabilities in GROWI https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000123.html GROWI provided by WESEEK, Inc. contains multiple vulnerabilities listed below. <ul><li>Stored cross-site scripting vulnerability in the presentation feature (CWE-79) - CVE-2023-42436</li><li>Stored cross-site scripting vulnerability in the App Settings (/admin/app) page and the Markdown Settings (/admin/markdown) page (CWE-79) - CVE-2023-45737</li><li>Stored cross-site scripting vulnerability when processing profile images (CWE-79) - CVE-2023-45740</li><li>Cross-site request forgery vulnerability in the User settings (/me) page (CWE-352) - CVE-2023-46699</li><li>Stored cross-site scripting vulnerability exploiting a behavior of the XSS Filter (CWE-79) - CVE-2023-47215</li><li>Stored cross-site scripting vulnerability via the img tags (CWE-79) - CVE-2023-49119</li><li>Stored cross-site scripting vulnerability in the event handlers of the pre tags (CWE-79) - CVE-2023-49598</li><li>Stored cross-site scripting vulnerability in the anchor tag (CWE-79) - CVE-2023-49779</li><li>Stored cross-site scripting vulnerability when processing the MathJax (CWE-79) - CVE-2023-49807</li><li>Stored cross-site scripting vulnerability in the App Settings (/admin/app) page, the Markdown Settings (/admin/markdown) page, and the Customize (/admin/customize) page (CWE-79) - CVE-2023-50175</li><li>Cleartext storage of sensitive information vulnerability in the App Settings (/admin/app) page's Secret access key (CWE-312) - CVE-2023-50294</li><li>Improper authorization in the User Management (/admin/users) page (CWE-285) - CVE-2023-50332</li><li>Stored cross-site scripting vulnerability in the User Management (/admin/users) page (CWE-79) - CVE-2023-50339</li></ul> CVE-2023-42436 Kakeru Kajihara of NTT-ME System Operation Center reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-45737 Naoki Takayama of University of Tsukuba reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-45740 Kanta Nishitani of GMO Cybersecurity by Ierae Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-46699 Norihide Saito reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-47215, CVE-2023-49779 Naoya Miyaguchi of Kanmu, Inc reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-49119 Naoki Takayama of University of Tsukuba, Suguru Itagaki of NTT-ME System Operation Center, and Norihide Saito of Flatt Security inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-49598 Naoya Miyaguchi of Kanmu, Inc, SHO ODAGIRI of GMO Cybersecurity by Ierae Inc., Tsubasa Fujii (@reinforchu), Eiji Mori of Flatt Security Inc., Shiga Takuma of BroadBand Security Inc., and Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-49807 Naoya Miyaguchi of Kanmu, Inc and Naoki Takayama of University of Tsukuba reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-50175 Norihide Saito of Flatt Security inc., Naoya Miyaguchi of Kanmu, Inc, and Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-50294, CVE-2023-50332, CVE-2023-50339 Norihide Saito of Flatt Security inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000123 https://jvn.jp/en/jp/JVN18715935/index.html https://www.cve.org/CVERecord?id=CVE-2023-42436 https://www.cve.org/CVERecord?id=CVE-2023-45737 https://www.cve.org/CVERecord?id=CVE-2023-45740 https://www.cve.org/CVERecord?id=CVE-2023-46699 https://www.cve.org/CVERecord?id=CVE-2023-47215 https://www.cve.org/CVERecord?id=CVE-2023-49119 https://www.cve.org/CVERecord?id=CVE-2023-49598 https://www.cve.org/CVERecord?id=CVE-2023-49779 https://www.cve.org/CVERecord?id=CVE-2023-49807 https://www.cve.org/CVERecord?id=CVE-2023-50175 https://www.cve.org/CVERecord?id=CVE-2023-50294 https://www.cve.org/CVERecord?id=CVE-2023-50332 https://www.cve.org/CVERecord?id=CVE-2023-50339 https://nvd.nist.gov/vuln/detail/CVE-2023-42436 https://nvd.nist.gov/vuln/detail/CVE-2023-45737 https://nvd.nist.gov/vuln/detail/CVE-2023-45740 https://nvd.nist.gov/vuln/detail/CVE-2023-46699 https://nvd.nist.gov/vuln/detail/CVE-2023-47215 https://nvd.nist.gov/vuln/detail/CVE-2023-49119 https://nvd.nist.gov/vuln/detail/CVE-2023-49598 https://nvd.nist.gov/vuln/detail/CVE-2023-49779 https://nvd.nist.gov/vuln/detail/CVE-2023-49807 https://nvd.nist.gov/vuln/detail/CVE-2023-50175 https://nvd.nist.gov/vuln/detail/CVE-2023-50294 https://nvd.nist.gov/vuln/detail/CVE-2023-50332 https://nvd.nist.gov/vuln/detail/CVE-2023-50339 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:weseek:growi 2024-03-19T17:46+09:00 2023-12-13T15:30+09:00 2024-03-19T17:46+09:00 ELECOM wireless LAN routers vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-011403.html Multiple ELECOM wireless LAN routers provided by ELECOM CO.,LTD. contain an OS command injection vulnerability (CWE-78). Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-011403 https://jvn.jp/en/vu/JVNVU97499577/index.html https://www.cve.org/CVERecord?id=CVE-2023-49695 https://nvd.nist.gov/vuln/detail/CVE-2023-49695 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:elecom:wrc-x3000gsa_firmware cpe:/o:elecom:wrc-x3000gsn_firmware cpe:/o:elecom:wrc-x3000gs_firmware 2024-04-18T17:22+09:00 2023-12-13T15:06+09:00 2024-04-18T17:22+09:00 Multiple denial-of-service (DoS) vulnerabilities in JTEKT ELECTRONICS HMI GC-A2 series https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000122.html HMI GC-A2 series provided by JTEKT ELECTRONICS CORPORATION contains multiple denial-of-service (DoS) vulnerabilities listed below. <ul><li>Denial-of-service (DoS) vulnerability in FTP service (CWE-400) - CVE-2023-41963</li><li>Denial-of-service (DoS) vulnerability in commplex-link service (CWE-400) - CVE-2023-49140</li><li>Denial-of-service (DoS) vulnerability in rfe service (CWE-400) - CVE-2023-49143</li><li>Denial-of-service (DoS) vulnerability in NetBIOS service (CWE-400) - CVE-2023-49713</li></ul> JTEKT ELECTRONICS CORPORATION reported these vulnerabilities to IPA to notify users of the solution through JVN. JPCERT/CC and JTEKT ELECTRONICS CORPORATION coordinated under the Information Security Early Warning Partnership. JVNDB-2023-000122 https://jvn.jp/en/jp/JVN34145838/index.html https://www.cve.org/CVERecord?id=CVE-2023-41963 https://www.cve.org/CVERecord?id=CVE-2023-49140 https://www.cve.org/CVERecord?id=CVE-2023-49143 https://www.cve.org/CVERecord?id=CVE-2023-49713 https://nvd.nist.gov/vuln/detail/CVE-2023-41963 https://nvd.nist.gov/vuln/detail/CVE-2023-49140 https://nvd.nist.gov/vuln/detail/CVE-2023-49143 https://nvd.nist.gov/vuln/detail/CVE-2023-49713 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:jtekt:gc-a22w-cw_firmware cpe:/o:jtekt:gc-a24-m_firmware cpe:/o:jtekt:gc-a24w-c%28w%29_firmware cpe:/o:jtekt:gc-a24_firmware cpe:/o:jtekt:gc-a25_firmware cpe:/o:jtekt:gc-a26-j2_firmware cpe:/o:jtekt:gc-a26w-c%28w%29_firmware cpe:/o:jtekt:gc-a26_firmware cpe:/o:jtekt:gc-a27-c_firmware cpe:/o:jtekt:gc-a28-c_firmware 2024-04-22T16:55+09:00 2023-12-11T14:12+09:00 2024-04-22T16:55+09:00 FXC wireless LAN routers "AE1021PE" and "AE1021" vulnerable to OS command injection Critical https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-009966.html "AE1021PE" and "AE1021" provided by FXC Inc. are information outlet-based wireless LAN routers. "AE1021PE" and "AE1021" contain an OS command injection vulnerability (CWE-78). JPCERT/CC has confirmed the communication which exploits this vulnerability. Ryu Kuki, Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. And almost at the same time, The Akamai SIRT reported this vulnerability to CISA. JPCERT/CC coordinated with the developer. JVNDB-2023-009966 https://jvn.jp/en/vu/JVNVU92152057/index.html https://www.cve.org/CVERecord?id=CVE-2023-49897 https://nvd.nist.gov/vuln/detail/CVE-2023-49897 https://cisa.gov/known-exploited-vulnerabilities-catalog https://www.cisa.gov/news-events/ics-advisories/icsa-23-355-01 https://www.akamai.com/blog/security-research/zero-day-vulnerability-spreading-mirai-patched https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:fxc:ae1021pe_firmware cpe:/o:fxc:ae1021_firmware 2023-12-25T16:54+09:00 2023-12-07T15:09+09:00 2023-12-25T16:54+09:00 OS command injection vulnerability in DT900 https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-009619.html DT900 contains an OS command injection vulnerability. reported by Mr. Gianluca Altomani. for NEC-PSIRT JVNDB-2023-009619 https://www.cve.org/CVERecord?id=CVE-2023-3741 https://nvd.nist.gov/vuln/detail/CVE-2023-3741 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:nec:itk-12d-1%28bk%29tel_firmware cpe:/o:nec:itk-12d-1p%28bk%29tel_firmware cpe:/o:nec:itk-12dg-1p%28bk%29tel_firmware cpe:/o:nec:itk-32lcg-1p%28bk%29tel_firmware cpe:/o:nec:itk-32lcgs-1%28bk%29tel_firmware cpe:/o:nec:itk-32lcgs-1a%28bk%29tel_firmware cpe:/o:nec:itk-32lcgs-1p%28bk%29tel_firmware cpe:/o:nec:itk-32tcg-1p%28bk%29tel_firmware cpe:/o:nec:itk-32tcgs-1%28bk%29tel_firmware cpe:/o:nec:itk-32tcgs-1a%28bk%29tel_firmware cpe:/o:nec:itk-32tcgs-1p%28bk%29tel_firmware cpe:/o:nec:itk-6d-1%28bk%29tel_firmware cpe:/o:nec:itk-6d-1p%28bk%29tel_firmware cpe:/o:nec:itk-6dg-1p%28bk%29tel_firmware cpe:/o:nec:itk-6dgs-1%28bk%29tel_firmware cpe:/o:nec:itk-6dgs-1%28bk%29tel_firmware cpe:/o:nec:itk-6dgs-1a%28bk%29tel_firmware cpe:/o:nec:itk-6dgs-1p%28bk%29tel_firmware cpe:/o:nec:itk-8lcg-1p%28bk%29tel_firmware cpe:/o:nec:itk-8lcx-1%28bk%29tel_firmware cpe:/o:nec:itk-8lcx-1p%28bk%29tel_firmware cpe:/o:nec:itk-8tcgx-1%28bk%29tel_firmware cpe:/o:nec:itk-8tcgx-1p%28bk%29tel_firmware 2023-12-06T14:43+09:00 2023-12-06T14:43+09:00 2023-12-06T14:43+09:00 RakRak Document Plus vulnerable to path traversal https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000121.html RakRak Document Plus provided by Sumitomo Electric Information Systems Co., Ltd. contains a path traversal vulnerability (CWE-22). Asato Masamu of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000121 https://jvn.jp/en/jp/JVN46895889/index.html https://www.cve.org/CVERecord?id=CVE-2023-49108 https://nvd.nist.gov/vuln/detail/CVE-2023-49108#vulnConfigurationsArea https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:sei-info:rakrak_document_plus 2024-01-24T12:06+09:00 2023-12-04T13:45+09:00 2024-01-24T12:06+09:00 Ruckus Access Point contains a cross-site scripting vulnerability. https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000119.html Ruckus Access Point provided by CommScope, Inc. contains a cross-site scripting vulnerability (CWE-79). MUNEHIRO SHIRATANI of AGEST,Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000119 https://jvn.jp/en/jp/JVN45891816/index.html https://www.cve.org/CVERecord?id=CVE-2023-49225 https://nvd.nist.gov/vuln/detail/CVE-2023-49225 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:commscope:ap_solo cpe:/o:commscope:smartzone_firmware cpe:/o:commscope:zonedirector_firmware 2024-04-23T17:51+09:00 2023-12-01T14:58+09:00 2024-04-23T17:51+09:00 Multiple vulnerabilities in LuxCal Web Calendar https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000117.html LuxCal Web Calendar provided by LuxSoft contains multiple vulnerabilities listed below. <ul><li>SQL injection (CWE-89) - CVE-2023-46700</li><li>Cross-site scripting (CWE-79) - CVE-2023-47175</li></ul> Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000117 https://jvn.jp/en/jp/JVN15005948/index.html https://www.cve.org/CVERecord?id=CVE-2023-46700 https://www.cve.org/CVERecord?id=CVE-2023-47175 https://nvd.nist.gov/vuln/detail/CVE-2023-46700 https://nvd.nist.gov/vuln/detail/CVE-2023-47175 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:luxsoft:luxcal_web_calendar 2023-11-20T17:15+09:00 2023-11-20T17:15+09:00 2023-11-20T17:15+09:00 Multiple vulnerabilities in EXPRESSCLUSTER X https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-007152.html WebManager/Cluster WebUI of EXPRESSCLUSTER X provided by NEC Corporation contains multiple vulnerabilities listed below. * Missing authorization (CWE-862) - CVE-2023-39544 * Files or directories accessible to external parties (CWE-552) - CVE-2023-39545 * Use of password hash instead of password for authentication (CWE-836) - CVE-2023-39546 * Authentication bypass by Capture-replay (CWE-294) - CVE-2023-39547 * Unrestricted upload of file with dangerous type (CWE-434) - CVE-2023-39548 JVNDB-2023-007152 https://jvn.jp/en/vu/JVNVU98954968/index.html https://www.cve.org/CVERecord?id=CVE-2023-39544 https://www.cve.org/CVERecord?id=CVE-2023-39545 https://www.cve.org/CVERecord?id=CVE-2023-39546 https://www.cve.org/CVERecord?id=CVE-2023-39547 https://www.cve.org/CVERecord?id=CVE-2023-39548 https://nvd.nist.gov/vuln/detail/CVE-2023-39544 https://nvd.nist.gov/vuln/detail/CVE-2023-39545 https://nvd.nist.gov/vuln/detail/CVE-2023-39546 https://nvd.nist.gov/vuln/detail/CVE-2023-39547 https://nvd.nist.gov/vuln/detail/CVE-2023-39548 https://cwe.mitre.org/data/definitions/294.html https://cwe.mitre.org/data/definitions/434.html https://cwe.mitre.org/data/definitions/552.html https://cwe.mitre.org/data/definitions/836.html https://cwe.mitre.org/data/definitions/862.html cpe:/a:nec:expresscluster_x cpe:/a:nec:expresscluster_x_singleserversafe 2024-05-01T18:10+09:00 2023-11-20T14:09+09:00 2024-05-01T18:10+09:00 Multiple vulnerabilities in First Corporation's DVRs https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-007150.html DVRs provided by First Co., Ltd. contain multiple vulnerabilities listed below. * Use of hard-coded password (CWE-259) - CVE-2023-47213 * Missing authentication for critical function (CWE-306) - CVE-2023-47674 Yoshiki Mori of National Institute of Information and Communications Technology Cybersecurity Research Institute reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-007150 https://jvn.jp/en/vu/JVNVU99077347/index.html https://www.cve.org/CVERecord?id=CVE-2023-47213 https://www.cve.org/CVERecord?id=CVE-2023-47674 https://nvd.nist.gov/vuln/detail/CVE-2023-47213 https://nvd.nist.gov/vuln/detail/CVE-2023-47674 https://blog.nicter.jp/2022/04/nicter_statistics_2022_1q/#%E6%97%A5%E6%9C%AC%E5%9B%BD%E5%86%85%E3%81%AE-mirai-%E6%84%9F%E6%9F%93%E3%83%9B%E3%82%B9%E3%83%88%E6%95%B0%E3%81%AE%E6%80%A5%E5%A2%97%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6 https://cwe.mitre.org/data/definitions/259.html https://cwe.mitre.org/data/definitions/306.html cpe:/o:c-first:cfr-1004ea_firmware cpe:/o:c-first:cfr-1008ea_firmware cpe:/o:c-first:cfr-1016ea_firmware cpe:/o:c-first:cfr-16eaa_firmware cpe:/o:c-first:cfr-16eab_firmware cpe:/o:c-first:cfr-16eha_firmware cpe:/o:c-first:cfr-16ehd_firmware cpe:/o:c-first:cfr-4eaam_firmware cpe:/o:c-first:cfr-4eaa_firmware cpe:/o:c-first:cfr-4eabc_firmware cpe:/o:c-first:cfr-4eab_firmware cpe:/o:c-first:cfr-4eha_firmware cpe:/o:c-first:cfr-4ehd_firmware cpe:/o:c-first:cfr-8eaa_firmware cpe:/o:c-first:cfr-8eab_firmware cpe:/o:c-first:cfr-8eha_firmware cpe:/o:c-first:cfr-8ehd_firmware cpe:/o:c-first:cfr-904e_firmware cpe:/o:c-first:cfr-908e_firmware cpe:/o:c-first:cfr-916e_firmware cpe:/o:c-first:md-404aa_firmware cpe:/o:c-first:md-404ab_firmware cpe:/o:c-first:md-404ha_firmware cpe:/o:c-first:md-404hd_firmware cpe:/o:c-first:md-808aa_firmware cpe:/o:c-first:md-808ab_firmware cpe:/o:c-first:md-808ha_firmware cpe:/o:c-first:md-808hd_firmware 2024-07-11T17:05+09:00 2023-11-17T17:31+09:00 2024-07-11T17:05+09:00 Redmine vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000116.html Redmine contains a cross-site scripting vulnerability (CWE-79) due to improper character string processing. Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000116 https://jvn.jp/en/jp/JVN13618065/index.html https://www.cve.org/CVERecord?id=CVE-2023-47259 https://nvd.nist.gov/vuln/detail/CVE-2023-47259 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:redmine:redmine 2024-05-09T17:55+09:00 2023-11-17T14:32+09:00 2024-05-09T17:55+09:00 Multiple vulnerabilities in CubeCart https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000118.html CubeCart provided by CubeCart Limited contains multiple vulnerabilities listed below. <ul><li>Cross-site request forgery (CWE-352) - CVE-2023-38130</li><li>Directory traversal (CWE-22) - CVE-2023-42428</li><li>Directory traversal (CWE-22) - CVE-2023-47283</li><li>OS command injection (CWE-78) - CVE-2023-47675</li></ul> Gen Sato of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to the developer first, and to IPA later. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000118 https://jvn.jp/en/jp/JVN22220399/index.html https://www.cve.org/CVERecord?id=CVE-2023-38130 https://www.cve.org/CVERecord?id=CVE-2023-42428 https://www.cve.org/CVERecord?id=CVE-2023-47283 https://www.cve.org/CVERecord?id=CVE-2023-47675 https://nvd.nist.gov/vuln/detail/CVE-2023-38130 https://nvd.nist.gov/vuln/detail/CVE-2023-42428 https://nvd.nist.gov/vuln/detail/CVE-2023-47283 https://nvd.nist.gov/vuln/detail/CVE-2023-47675 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:cubecart:cubecart 2024-04-30T18:15+09:00 2023-11-17T14:22+09:00 2024-04-30T18:15+09:00 Multiple vulnerabilities in ELECOM and LOGITEC routers https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-006588.html Multiple routers provided by ELECOM CO.,LTD. and LOGITEC CORPORATION contain multiple vulnerabilities listed below. * OS Command Injection (CWE-78) - CVE-2023-43752 * Inadequate Encryption Strength (CWE-326) - CVE-2023-43757 CVE-2023-43752 Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. CVE-2023-43757 Katsuhiko Sato(a.k.a. goroh_kun), Yuya Adachi and Ryo Kamino of 00One, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-006588 http://jvn.jp/en/vu/JVNVU94119876/index.html https://www.cve.org/CVERecord?id=CVE-2023-43752 https://www.cve.org/CVERecord?id=CVE-2023-43757 https://nvd.nist.gov/vuln/detail/CVE-2023-43752 https://nvd.nist.gov/vuln/detail/CVE-2023-43757 https://cwe.mitre.org/data/definitions/326.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:elecom:wrc-1167ghbk2_firmware cpe:/o:elecom:wrc-1167ghbk_firmware cpe:/o:elecom:wrc-1750ghbk-e_firmware cpe:/o:elecom:wrc-1750ghbk2-i_firmware cpe:/o:elecom:wrc-1750ghbk_firmware cpe:/o:elecom:wrc-2533ghbk-i_firmware cpe:/o:elecom:wrc-2533ghbk2-t_firmware cpe:/o:elecom:wrc-300febk_firmware cpe:/o:elecom:wrc-300ghbk2-i_firmware cpe:/o:elecom:wrc-300ghbk_firmware cpe:/o:elecom:wrc-733febk_firmware cpe:/o:elecom:wrc-733ghbk-c_firmware cpe:/o:elecom:wrc-733ghbk-i_firmware cpe:/o:elecom:wrc-733ghbk_firmware cpe:/o:elecom:wrc-f1167acf_firmware cpe:/o:elecom:wrc-f300nf_firmware cpe:/o:elecom:wrc-x3000gs2-b_firmware cpe:/o:elecom:wrc-x3000gs2-w_firmware cpe:/o:elecom:wrc-x3000gs2a-b_firmware cpe:/o:elecom:wrh-150bk_firmware cpe:/o:elecom:wrh-150wh_firmware cpe:/o:elecom:wrh-300bk-s_firmware cpe:/o:elecom:wrh-300bk2-s_firmware cpe:/o:elecom:wrh-300bk_firmware cpe:/o:elecom:wrh-300rd_firmware cpe:/o:elecom:wrh-300sv_firmware cpe:/o:elecom:wrh-300wh-h_firmware cpe:/o:elecom:wrh-300wh-s_firmware cpe:/o:elecom:wrh-300wh2-s_firmware cpe:/o:elecom:wrh-300wh_firmware cpe:/o:elecom:wrh-h300bk_firmware cpe:/o:elecom:wrh-h300wh_firmware cpe:/o:logitec:lan-w300n%2fp_firmware cpe:/o:logitec:lan-w300n%2frs_firmware cpe:/o:logitec:lan-w301nr_firmware cpe:/o:logitec:lan-wh300n%2fdgp_firmware cpe:/o:logitec:lan-wh300ndgpe_firmware 2024-04-26T15:22+09:00 2023-11-15T18:27+09:00 2024-04-26T15:22+09:00 ASUSTeK COMPUTER RT-AC87U vulnerable to improper access control https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-006578.html RT-AC87U provided by ASUSTeK COMPUTER INC. contains an improper access control vulnerability (CWE-284). Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-006578 http://jvn.jp/en/vu/JVNVU96079387/index.html https://www.cve.org/CVERecord?id=CVE-2023-47678 https://nvd.nist.gov/vuln/detail/CVE-2023-47678 https://cwe.mitre.org/data/definitions/284.html cpe:/o:asus:rt-ac87u_firmware 2024-04-30T18:08+09:00 2023-11-15T17:44+09:00 2024-04-30T18:08+09:00 OSS Calendar vulnerable to SQL injection https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000115.html OSS Calendar provided by Thinkingreed Inc. contains an SQL injection vulnerability (CWE-89). Shogo Iyota of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000115 https://jvn.jp/en/jp/JVN67822421/index.html https://www.cve.org/CVERecord?id=CVE-2023-47609 https://nvd.nist.gov/vuln/detail/CVE-2023-47609 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:f-revocrm:oss_calendar 2024-05-01T17:38+09:00 2023-11-14T14:05+09:00 2024-05-01T17:38+09:00 Multiple security updates for Trend Micro Apex One and Apex One as a Service (November 2023) https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-006199.html Trend Micro Incorporated has released multiple security updates for Trend Micro Apex One and Apex One as a Service. Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2023-006199 http://jvn.jp/en/vu/JVNVU98040889/index.html https://www.cve.org/CVERecord?id=CVE-2023-47192 https://www.cve.org/CVERecord?id=CVE-2023-47193 https://www.cve.org/CVERecord?id=CVE-2023-47194 https://www.cve.org/CVERecord?id=CVE-2023-47195 https://www.cve.org/CVERecord?id=CVE-2023-47196 https://www.cve.org/CVERecord?id=CVE-2023-47197 https://www.cve.org/CVERecord?id=CVE-2023-47198 https://www.cve.org/CVERecord?id=CVE-2023-47199 https://www.cve.org/CVERecord?id=CVE-2023-47200 https://www.cve.org/CVERecord?id=CVE-2023-47201 https://www.cve.org/CVERecord?id=CVE-2023-47202 https://nvd.nist.gov/vuln/detail/CVE-2023-47192 https://nvd.nist.gov/vuln/detail/CVE-2023-47193 https://nvd.nist.gov/vuln/detail/CVE-2023-47194 https://nvd.nist.gov/vuln/detail/CVE-2023-47195 https://nvd.nist.gov/vuln/detail/CVE-2023-47196 https://nvd.nist.gov/vuln/detail/CVE-2023-47197 https://nvd.nist.gov/vuln/detail/CVE-2023-47198 https://nvd.nist.gov/vuln/detail/CVE-2023-47199 https://nvd.nist.gov/vuln/detail/CVE-2023-47200 https://nvd.nist.gov/vuln/detail/CVE-2023-47201 https://nvd.nist.gov/vuln/detail/CVE-2023-47202 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:trendmicro:apex_one 2024-03-13T17:28+09:00 2023-11-13T17:28+09:00 2024-03-13T17:28+09:00 Multiple vulnerabilities in Pleasanter https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000112.html Pleasanter provided by Implem Inc. contains multiple vulnerabilities listed below. <ul><li>Stored cross-site scripting vulnerability (CWE-79) - CVE-2023-34439</li><li>Improper access control vulnerability (CWE-284) - CVE-2023-45210</li><li>Open redirect vulnerability (CWE-601) - CVE-2023-46688</li><li>Authentication bypass vulnerability by SAML (CWE-289) - CVE-2023-41890</li></ul> CVE-2023-41890 This issue is caused by a vulnerability in Sustainsys.Saml2 library used in the product. CVE-2023-34439,CVE-2023-45210 Sato Nobuhiro of Suzuki Motor Corporation and You Okuma of LAC Co., Ltd. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-46688 Yoichi Tsuzuki of FFRI Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. Implem Inc. reported to IPA that CVE-2023-41890 vulnerability still exists in the product. JPCERT/CC coordinated with the developer. JVNDB-2023-000112 https://jvn.jp/en/jp/JVN96209256/index.html https://www.cve.org/CVERecord?id=CVE-2023-34439 https://www.cve.org/CVERecord?id=CVE-2023-45210 https://www.cve.org/CVERecord?id=CVE-2023-46688 https://www.cve.org/CVERecord?id=CVE-2023-41890 https://nvd.nist.gov/vuln/detail/CVE-2023-34439 https://nvd.nist.gov/vuln/detail/CVE-2023-41890 https://nvd.nist.gov/vuln/detail/CVE-2023-45210 https://nvd.nist.gov/vuln/detail/CVE-2023-46688 https://github.com/Sustainsys/Saml2/security/advisories/GHSA-fv2h-753j-9g39 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:pleasanter:pleasanter 2024-04-22T17:56+09:00 2023-11-13T15:57+09:00 2024-04-22T17:56+09:00 Multiple vulnerabilities in Cisco Firepower Management Center Software https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000114.html Cisco Firepower Management Center Software provided by Cisco Systems contains multiple vulnerabilities listed below. <ul><li>OS command injection (CWE-78) - CVE-2023-20219</li><li>Path traversal (CWE-22) - CVE-2023-20220</li></ul> Kentaro Kawane of LAC Co., Ltd. reported these vulnerabilitis to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000114 https://jvn.jp/en/jp/JVN17806703/index.html https://www.cve.org/CVERecord?id=CVE-2023-20219 https://www.cve.org/CVERecord?id=CVE-2023-20220 https://nvd.nist.gov/vuln/detail/CVE-2023-20219 https://nvd.nist.gov/vuln/detail/CVE-2023-20220 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:cisco:firepower_management_center 2024-05-07T15:07+09:00 2023-11-13T14:01+09:00 2024-05-07T15:07+09:00 Remarshal unlimitedly expanding YAML alias nodes https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000111.html Remarshal provided by Remarshal Project expands YAML alias nodes unlimitedly (CWE-674), hence Remarshal is vulnerable to Billion Laughs Attack. Taichi Kotake of Sterra Security Co.,Ltd. / Akatsuki Games Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000111 http://jvn.jp/en/jp/JVN86156389/index.html https://www.cve.org/CVERecord?id=CVE-2023-47163 https://nvd.nist.gov/vuln/detail/CVE-2023-47163 https://github.com/yaml/yaml-spec/issues/45 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:remarshal_project:remarshal 2024-05-08T17:53+09:00 2023-11-10T14:41+09:00 2024-05-08T17:53+09:00 HOTELDRUID vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000113.html HOTELDRUID provided by DigitalDruid.Net contains a cross-site scripting vulnerability (CWE-79). Tomoro Taniguchi of FiveDrive, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000113 http://jvn.jp/en/jp/JVN99177549/index.html https://www.cve.org/CVERecord?id=CVE-2023-47164 https://nvd.nist.gov/vuln/detail/CVE-2023-47164 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:digitaldruid:hoteldruid 2024-05-01T17:47+09:00 2023-11-10T14:41+09:00 2024-05-01T17:47+09:00 EC-CUBE 3 series and 4 series vulnerable to arbitrary code execution https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000107.html EC-CUBE 3 series and 4 series provided by EC-CUBE CO.,LTD. contain an arbitrary code execution vulnerability (CWE-94) due to improper settings of the product's template engine "Twig". Takeshi Miura of N.F.Laboratories Inc. reported this vulnerability to EC-CUBE CO.,LTD. EC-CUBE CO.,LTD. Inc. reported this case to JPCERT/CC to notify users of its solution through JVN. JVNDB-2023-000107 https://jvn.jp/en/jp/JVN29195731/index.html https://www.cve.org/CVERecord?id=CVE-2023-46845 https://nvd.nist.gov/vuln/detail/CVE-2023-46845 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ec-cube:ec-cube 2024-05-09T17:17+09:00 2023-11-07T13:47+09:00 2024-05-09T17:17+09:00 FUJIFILM Business Innovation Corp. and Xerox Corporation MFPs export Address Books with insufficient encryption strength https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-004919.html Multiple MFPs (multifunction printers) provided by FUJIFILM Business Innovation Corp. and Xerox Corporation provide a facility to export the contents of their Address Book with encrypted form, but the encryption strength is insufficient (CWE-1391). Kunal Thakrar and Ceri Coburn of Pen Test Partners directly reported this vulnerability to FUJIFILM Business Innovation Corp. FUJIFILM Business Innovation Corp. reported this case to JPCERT/CC to request the coordination with the reporter. JVNDB-2023-004919 https://jvn.jp/en/vu/JVNVU96482726/ https://www.cve.org/CVERecord?id=CVE-2023-46327 https://nvd.nist.gov/vuln/detail/CVE-2023-46327 https://cwe.mitre.org/data/definitions/1391.html cpe:/a:fuji_xerox:multiple_product cpe:/a:xerox:multiple_product 2024-05-07T15:25+09:00 2023-11-02T17:21+09:00 2024-05-07T15:25+09:00 Improper restriction of XML external entity references (XXE) in e-Tax software https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000110.html e-Tax software provided by National Tax Agency improperly restricts XML external entity references (XXE) (CWE-611) due to the configuration of the embedded XML parser. Toyama Taku of NEC Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000110 https://jvn.jp/en/jp/JVN14762986/index.html https://www.cve.org/CVERecord?id=CVE-2023-46802 https://nvd.nist.gov/vuln/detail/CVE-2023-46802 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:nta:e-tax 2024-05-01T18:41+09:00 2023-11-02T13:38+09:00 2024-05-01T18:41+09:00 Multiple Vulnerabilities in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-004790.html Multiple vulnerabilities have been found in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer. JVNDB-2023-004790 https://www.cve.org/CVERecord?id=CVE-2022-3884 https://www.cve.org/CVERecord?id=CVE-2022-4895 https://nvd.nist.gov/vuln/detail/CVE-2022-3884 https://nvd.nist.gov/vuln/detail/CVE-2022-4895 https://cwe.mitre.org/data/definitions/276.html https://cwe.mitre.org/data/definitions/295.html cpe:/a:hitachi:infrastructure_analytics_advisor cpe:/a:hitachi:ops_center_analyzer 2023-11-02T12:14+09:00 2023-11-02T12:14+09:00 2023-11-02T12:14+09:00 MCL Technologies MCL-Net vulnerable to directory traversal https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-004754.html Server software "MCL-Net" provided by MCL Technologies contains a directory traversal vulnerability (CWE-22, CVE-2023-4990). Panasonic reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2023-004754 https://jvn.jp/en/vu/JVNVU99565391/index.html https://www.cve.org/CVERecord?id=CVE-2023-4990 https://nvd.nist.gov/vuln/detail/CVE-2023-4990 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:mcl-collection:mcl-net_firmware 2023-11-01T16:49+09:00 2023-11-01T16:49+09:00 2023-11-01T16:49+09:00 Cybozu Remote Service vulnerable to uncontrolled resource consumption https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000109.html Cybozu Remote Service provided by Cybozu, Inc. is vulnerable to uncontrolled resource consumption (CWE-400). Cybozu, Inc. reported this vulnerability to JPCERT/CC to notify users of the solution through JVN. JVNDB-2023-000109 https://jvn.jp/en/jp/JVN94132951/index.html https://www.cve.org/CVERecord?id=CVE-2023-46278 https://nvd.nist.gov/vuln/detail/CVE-2023-46278 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:cybozu:cybozu_remote_service 2024-05-07T15:51+09:00 2023-10-31T13:43+09:00 2024-05-07T15:51+09:00 Inkdrop vulnerable to code injection https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000108.html Inkdrop provided by Takuya Matsuyama is a Markdown editor. Inkdrop contains a code injection vulnerability (CWE-94). T.Nodoka reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000108 https://jvn.jp/en/jp/JVN48057522/index.html https://www.cve.org/CVERecord?id=CVE-2023-44141 https://nvd.nist.gov/vuln/detail/CVE-2023-44141 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:inkdrop 2024-05-07T16:09+09:00 2023-10-30T13:48+09:00 2024-05-07T16:09+09:00 Advanced Micro Devices Windows kernel drivers vulnerable to insufficient access control on its IOCTL https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-004294.html Multiple Windows kernel drivers provided by Advanced Micro Devices Inc. are vulnerable to insufficient access control on its IOCTL (CWE-782, CVE-2023-20598). Takahiro Haruyama of VMware reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-004294 https://jvn.jp/en/vu/JVNVU97149791/ https://jvn.jp/en/ta/JVNTA90371415/index.html https://www.cve.org/CVERecord?id=CVE-2023-20598 https://nvd.nist.gov/vuln/detail/CVE-2023-20598 https://cwe.mitre.org/data/definitions/782.html cpe:/a:amd:adrenalin cpe:/a:amd:pro 2024-05-20T17:49+09:00 2023-10-27T16:10+09:00 2024-05-20T17:49+09:00 Multiple vulnerabilities in baserCMS https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000106.html baserCMS provided by baserCMS Users Community contains multiple vulnerabilities listed below.<ul><li>Stored cross-site scripting vulnerability (CWE-79) - CVE-2023-29009</li><li>Reflected cross-site scripting vulnerability (CWE-79) - CVE-2023-43647</li><li>Directory traversal vulnerability (CWE-22) - CVE-2023-43648</li><li>Cross-site request forgery vulnerability (CWE-352) - CVE-2023-43649</li><li>Arbitrary file upload vulnerability (CWE-434) - CVE-2023-43792</li></ul> CVE-2023-29009 Kyohei Ota reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-43647, CVE-2023-43648, CVE-2023-43649, CVE-2023-43792 Shiga Takuma of BroadBand Security, Inc reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000106 https://jvn.jp/en/jp/JVN45547161/index.html https://www.cve.org/CVERecord?id=CVE-2023-29009 https://www.cve.org/CVERecord?id=CVE-2023-43647 https://www.cve.org/CVERecord?id=CVE-2023-43648 https://www.cve.org/CVERecord?id=CVE-2023-43649 https://www.cve.org/CVERecord?id=CVE-2023-43792 https://nvd.nist.gov/vuln/detail/CVE-2023-29009 https://nvd.nist.gov/vuln/detail/CVE-2023-43647 https://nvd.nist.gov/vuln/detail/CVE-2023-43648 https://nvd.nist.gov/vuln/detail/CVE-2023-43649 https://nvd.nist.gov/vuln/detail/CVE-2023-43792 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:basercms:basercms 2024-05-07T15:59+09:00 2023-10-27T14:46+09:00 2024-05-07T15:59+09:00 Movable Type vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000105.html Movable Type provided by Six Apart Ltd. contains a cross-site scripting vulnerability (CWE-79). Six Apart Ltd. reported this vulnerability to JPCERT/CC to notify users of the solutions through JVN. JPCERT/CC and Six Apart Ltd. coordinated under the Information Security Early Warning Partnership. JVNDB-2023-000105 https://jvn.jp/en/jp/JVN39139884/index.html https://www.cve.org/CVERecord?id=CVE-2023-45746 https://nvd.nist.gov/vuln/detail/CVE-2023-45746 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:sixapart:movable_type cpe:/a:sixapart:movable_type_advanced cpe:/a:sixapart:movable_type_premium cpe:/a:sixapart:movable_type_premium_advanced 2024-05-10T17:47+09:00 2023-10-25T15:18+09:00 2024-05-10T17:47+09:00 Improper restriction of XML external entity reference (XXE) vulnerability in OMRON CX-Designer https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003956.html CX-Designer provided by OMRON Corporation contains an improper restriction of XML external entity reference (XXE) vulnerability (CWE-611). Michael Heinzl reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-003956 https://jvn.jp/en/vu/JVNVU98683567/ https://www.cve.org/CVERecord?id=CVE-2023-43624 https://nvd.nist.gov/vuln/detail/CVE-2023-43624 https://cwe.mitre.org/data/definitions/611.html cpe:/a:omron:cx-designer 2024-05-10T17:47+09:00 2023-10-24T16:11+09:00 2024-05-10T17:47+09:00 HP ThinUpdate vulnerable to improper server certificate verification https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000103.html HP ThinUpdate provided by HP Development Company, L.P. is vulnerable to improper server certificate verification (CWE-295). Narumi Hirai of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000103 https://jvn.jp/en/jp/JVN02058996/index.html https://www.cve.org/CVERecord?id=CVE-2023-4499 https://nvd.nist.gov/vuln/detail/CVE-2023-4499 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hp:thinupdate 2023-10-23T14:26+09:00 2023-10-23T14:26+09:00 2023-10-23T14:26+09:00 Multiple vulnerabilities in JustSystems products https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000102.html Multiple products provided by JustSystems Corporation contain multiple vulnerabilities listed below. * Use after free (CWE-416) - CVE-2023-34366 * Integer overflow (CWE-190) - CVE-2023-38127 * Access of resource using incompatible type (Type confusion) (CWE-843) - CVE-2023-38128 * Improper validation of array index (CWE-129) - CVE-2023-35126 Cisco Talos Security Intelligence & Research Group reported these vulnerabilities to JustSystems Corporation and coordinated. JustSystems Corporation and JPCERT/CC published respective advisories in order to notify users of the solution through JVN. JVNDB-2023-000102 https://jvn.jp/en/jp/JVN28846531/index.html https://www.cve.org/CVERecord?id=CVE-2023-34366 https://www.cve.org/CVERecord?id=CVE-2023-38127 https://www.cve.org/CVERecord?id=CVE-2023-38128 https://www.cve.org/CVERecord?id=CVE-2023-35126 https://nvd.nist.gov/vuln/detail/CVE-2023-34366 https://nvd.nist.gov/vuln/detail/CVE-2023-38127 https://nvd.nist.gov/vuln/detail/CVE-2023-38128 https://nvd.nist.gov/vuln/detail/CVE-2023-35126 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:justsystems:ichitaro cpe:/a:justsystems:just_government cpe:/a:justsystems:just_office cpe:/a:justsystems:just_police cpe:/a:justsystems:rakuraku_hagaki 2024-05-16T16:44+09:00 2023-10-19T15:16+09:00 2024-05-16T16:44+09:00 Improper restriction of XML external entity references (XXE) in Proself https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000104.html Proself provided by North Grid Corporation improperly restricts XML external entity references (XXE) (CWE-611). The developer states that attacks exploiting this vulnerability have been observed. North Grid Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and North Grid Corporation coordinated under the Information Security Early Warning Partnership. JVNDB-2023-000104 https://jvn.jp/en/jp/JVN95981460/index.html https://www.cve.org/CVERecord?id=CVE-2023-45727 https://nvd.nist.gov/vuln/detail/CVE-2023-45727 https://www.ipa.go.jp/security/security-alert/2023/20231018-jvn.html https://www.jpcert.or.jp/at/2023/at230022.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:northgrid:proself 2024-05-15T17:08+09:00 2023-10-18T18:00+09:00 2024-05-15T17:08+09:00 Multiple vulnerabilities in JTEKT ELECTRONICS OnSinView2 https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003913.html OnSinView2 provided by JTEKT ELECTRONICS CORPORATION contains multiple vulnerabilities listed below. * Improper restriction of operations within the bounds of a memory buffer (CWE-119) - CVE-2023-42506 * Stack-based buffer overflow (CWE-121) - CVE-2023-42507 Michael Heinzl reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-003913 https://jvn.jp/en/vu/JVNVU98392064/index.html https://www.cve.org/CVERecord?id=CVE-2023-42506 https://www.cve.org/CVERecord?id=CVE-2023-42507 https://nvd.nist.gov/vuln/detail/CVE-2023-42506 https://nvd.nist.gov/vuln/detail/CVE-2023-42507 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/121.html cpe:/a:jtekt:onsinview2 2024-05-16T17:28+09:00 2023-10-18T14:13+09:00 2024-05-16T17:28+09:00 Scanning evasion issue in Cisco Secure Email Gateway https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000100.html Cisco Secure Email Gateway provides anti-virus scanning facility for e-mail attachments. It was reported that a certain crafted file can evade anti-virus scanning facility. This issue was found by Takahiro Ohtani and Michael Joshua Telloyan in the Bug Bounty program at the University of Electro-Communications. They then reported it to IPA, and JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000100 https://jvn.jp/en/jp/JVN58574030/index.html cpe:/o:cisco:secure_email_gateway_firmware 2023-10-27T15:52+09:00 2023-10-16T16:11+09:00 2023-10-27T15:52+09:00 web2py vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000101.html web2py web application framework contains an OS command injection vulnerability (CWE-78). Masashi Yamane of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000101 https://jvn.jp/en/jp/JVN80476432/index.html https://www.cve.org/CVERecord?id=CVE-2023-45158 https://nvd.nist.gov/vuln/detail/CVE-2023-45158 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:web2py:web2py 2024-05-22T17:58+09:00 2023-10-16T16:11+09:00 2024-05-22T17:58+09:00 Out-of-bounds read vulnerability in Keyence KV STUDIO and KV REPLAY VIEWER https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003788.html KV STUDIO and KV REPLAY VIEWER provided by KEYENCE CORPORATION contain an out-of-bounds read vulnerability (CWE-125, CVE-2023-42138). Michael Heinzl reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-003788 https://jvn.jp/en/vu/JVNVU94752076/index.html https://www.cve.org/CVERecord?id=CVE-2023-42138 https://nvd.nist.gov/vuln/detail/CVE-2023-42138 https://cwe.mitre.org/data/definitions/125.html cpe:/a:keyence:kv_replay_viewer cpe:/a:keyence:kv_studio 2024-05-16T17:09+09:00 2023-10-11T15:23+09:00 2024-05-16T17:09+09:00 e-Gov Client Application fails to restrict custom URL schemes properly https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000098.html e-Gov Client Application is installed, a Custom URL Scheme is configured on the system to enable invoking the product through a web browser. This custom URL contains the information about the website which the product should access, and a crafted URL may direct the application to access an unexpected website (CWE-939). Toyama Taku of NEC Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000098 https://jvn.jp/en/jp/JVN15808274/index.html https://www.cve.org/CVERecord?id=CVE-2023-44689 https://nvd.nist.gov/vuln/detail/CVE-2023-44689 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:e-gov:e-gov cpe:/a:e-gov:e-gov 2024-05-17T17:55+09:00 2023-10-06T14:57+09:00 2024-05-17T17:55+09:00 Information Exposure Vulnerability in Hitachi Ops Center Administrator https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003769.html A vulnerability (CVE-2023-3335) exists in Hitachi Ops Center Administrator. JVNDB-2023-003769 https://www.cve.org/CVERecord?id=CVE-2023-3335 https://nvd.nist.gov/vuln/detail/CVE-2023-3335 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:hitachi_ops_center_administrator 2024-05-22T15:20+09:00 2023-10-04T15:23+09:00 2024-05-22T15:20+09:00 DoS Vulnerability in Hitachi Ops Center Common Services https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003770.html A DoS vulnerability (CVE-2023-3967) exists in Hitachi Ops Center Common Services. JVNDB-2023-003770 https://www.cve.org/CVERecord?id=CVE-2023-3967 https://nvd.nist.gov/vuln/detail/CVE-2023-3967 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:ops_center_common_services 2024-05-22T15:31+09:00 2023-10-04T15:23+09:00 2024-05-22T15:31+09:00 File and Directory Permissions Vulnerability in JP1/Performance Management https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003771.html A File and Directory Permissions Vulnerability (CVE-2023-3440) exists in JP1/Performance Management. JVNDB-2023-003771 https://www.cve.org/CVERecord?id=CVE-2023-3440 https://nvd.nist.gov/vuln/detail/CVE-2023-3440 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:jp1%2fperformance_management cpe:/a:hitachi:tuning_manager 2023-10-04T15:23+09:00 2023-10-04T15:23+09:00 2023-10-04T15:23+09:00 Citadel WebCit vulnerable to cross-site scripting on Instant Messaging facility https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000097.html Citadel WebCit provided by Citadel contains a cross-site scripting vulnerability (CWE-79). Tomoro Taniguchi of FiveDrive, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000097 http://jvn.jp/en/jp/JVN08237727/index.html https://www.cve.org/CVERecord?id=CVE-2023-44272 https://nvd.nist.gov/vuln/detail/CVE-2023-44272 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:citadel:citadel 2024-05-21T17:08+09:00 2023-10-04T14:07+09:00 2024-05-21T17:08+09:00 Multiple vulnerabilities in multiple FURUNO SYSTEMS wireless LAN access point devices in ST(Standalone) mode https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003767.html Wireless LAN access point devices provided by FURUNO SYSTEMS Co.,Ltd., running in ST(Standalone) mode, contain multiple vulnerabilities listed below. * OS Command Injection (CWE-78) - CVE-2023-39222 * Cross-site Scripting (CWE-79) - CVE-2023-39429 * Cross-Site Request Forgery (CWE-352) - CVE-2023-41086 * Authentication Bypass (CWE-288) - CVE-2023-42771 * Path traversal (CWE-22) - CVE-2023-43627 Katsuhiko Sato(a.k.a. goroh_kun) of 00One, Inc. reported OS Command Injection vulnerability (CVE-2023-39222) to JPCERT/CC. JPCERT/CC coordinated with the developer. As a result of the developer's investigation into this report, other vulnerabilities were newly discovered and addressed. The developer reported these vulnerabilities to notify users of the solution through JVN. JPCERT/CC coordinated with the developer for the publication. JVNDB-2023-003767 https://jvn.jp/en/vu/JVNVU94497038/index.html https://www.cve.org/CVERecord?id=CVE-2023-39222 https://www.cve.org/CVERecord?id=CVE-2023-39429 https://www.cve.org/CVERecord?id=CVE-2023-41086 https://www.cve.org/CVERecord?id=CVE-2023-42771 https://www.cve.org/CVERecord?id=CVE-2023-43627 https://nvd.nist.gov/vuln/detail/CVE-2023-39222 https://nvd.nist.gov/vuln/detail/CVE-2023-39429 https://nvd.nist.gov/vuln/detail/CVE-2023-41086 https://nvd.nist.gov/vuln/detail/CVE-2023-42771 https://nvd.nist.gov/vuln/detail/CVE-2023-43627 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/288.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:furunosystems:acera_1010_firmware cpe:/o:furunosystems:acera_1020_firmware cpe:/o:furunosystems:acera_1110_firmware cpe:/o:furunosystems:acera_1150i_firmware cpe:/o:furunosystems:acera_1150w_firmware cpe:/o:furunosystems:acera_1210_firmware cpe:/o:furunosystems:acera_1310_firmware cpe:/o:furunosystems:acera_1320_firmware cpe:/o:furunosystems:acera_800st_firmware cpe:/o:furunosystems:acera_810_firmware cpe:/o:furunosystems:acera_850f_firmware cpe:/o:furunosystems:acera_850m_firmware cpe:/o:furunosystems:acera_900_firmware cpe:/o:furunosystems:acera_950_firmware 2024-05-22T18:01+09:00 2023-10-03T14:26+09:00 2024-05-22T18:01+09:00 Improper restriction of XML external entity references (XXE) in FD Application https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000096.html FD Application provided by Ministry of Health, Labour and Welfare improperly restricts XML external entity references (XXE) (CWE-611). Toyama Taku and Sakaki Ryutaro of NEC Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000096 http://jvn.jp/en/jp/JVN39596244/index.html https://www.cve.org/CVERecord?id=CVE-2023-42132 https://nvd.nist.gov/vuln/detail/CVE-2023-42132 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:mhlw:fd_application 2024-05-22T15:37+09:00 2023-10-02T12:36+09:00 2024-05-22T15:37+09:00 Multiple vulnerabilities in Panasonic KW Watcher https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003764.html KW Watcher provided by Panasonic contains multiple vulnerabilities listed below. * Improper restriction of operations within the bounds of a memory buffer (CWE-119) - CVE-2023-3471 * Use after free (CWE-416) - CVE-2023-3472 Michael Heinzl reported these vulnerabilities to Panasonic and coordinated. After the coordination was completed, Panasonic reported the case to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2023-003764 https://jvn.jp/en/vu/JVNVU95549489/index.html https://www.cve.org/CVERecord?id=CVE-2023-3471 https://www.cve.org/CVERecord?id=CVE-2023-3472 https://nvd.nist.gov/vuln/detail/CVE-2023-3471 https://nvd.nist.gov/vuln/detail/CVE-2023-3472 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/416.html cpe:/a:panasonic:kw_watcher 2023-09-27T14:44+09:00 2023-09-27T14:44+09:00 2023-09-27T14:44+09:00 Shihonkanri Plus vulnerable to relative path traversal https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000095.html Shihonkanri Plus provided by EKAKIN contains a relative path traversal vulnerability (CWE-23). Shimizu Yutaro of Cyber Defense Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000095 http://jvn.jp/en/jp/JVN17434995/index.html https://www.cve.org/CVERecord?id=CVE-2023-43825 https://nvd.nist.gov/vuln/detail/CVE-2023-43825 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ekakin:shihonkanri_plus 2024-05-21T17:16+09:00 2023-09-27T13:49+09:00 2024-05-21T17:16+09:00 Trend Micro Mobile Security vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003757.html Trend Micro Incorporated has released a security update for Trend Micro Mobile Security. Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN. JVNDB-2023-003757 https://jvn.jp/en/vu/JVNVU95732401/index.html https://www.cve.org/CVERecord?id=CVE-2023-41176 https://www.cve.org/CVERecord?id=CVE-2023-41177 https://www.cve.org/CVERecord?id=CVE-2023-41178 https://nvd.nist.gov/vuln/detail/CVE-2023-41176 https://nvd.nist.gov/vuln/detail/CVE-2023-41177 https://nvd.nist.gov/vuln/detail/CVE-2023-41178 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:trendmicro:mobile_security 2024-03-13T18:07+09:00 2023-09-26T11:30+09:00 2024-03-13T18:07+09:00 Multiple vulnerabilities in WordPress plugin "Welcart e-Commerce" https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000094.html WordPress plugin "Welcart e-Commerce" provided by Collne Inc. contains multiple vulnerabilities listed below. * Unrestricted Upload of File with Dangerous Type (CWE-434) - CVE-2023-40219 * Path Traversal (CWE-22) - CVE-2023-40532 * Cross-site Scripting in registration process of Item List page (CWE-79) - CVE-2023-41233 * Cross-site Scripting in Credit Card Payment Setup page (CWE-79) - CVE-2023-41962 * Cross-site Scripting in Item List page (CWE-79) - CVE-2023-43484 * SQL Injection in Item List page (CWE-89) - CVE-2023-43493 * SQL Injection in Order Data Edit page (CWE-89) - CVE-2023-43610 * Cross-site Scripting in Order Data Edit page (CWE-79) - CVE-2023-43614 CVE-2023-40219 Akihiro Hashimoto reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-40532, CVE-2023-41233, CVE-2023-41962, CVE-2023-43484, CVE-2023-43493, CVE-2023-43610, CVE-2023-43614 Shogo Kumamaru of LAC CyberLink Co., Ltd. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000094 https://jvn.jp/en/jp/JVN97197972/index.html https://www.cve.org/CVERecord?id=CVE-2023-40219 https://www.cve.org/CVERecord?id=CVE-2023-40532 https://www.cve.org/CVERecord?id=CVE-2023-41233 https://www.cve.org/CVERecord?id=CVE-2023-41962 https://www.cve.org/CVERecord?id=CVE-2023-43484 https://www.cve.org/CVERecord?id=CVE-2023-43493 https://www.cve.org/CVERecord?id=CVE-2023-43610 https://www.cve.org/CVERecord?id=CVE-2023-43614 https://nvd.nist.gov/vuln/detail/CVE-2023-40219 https://nvd.nist.gov/vuln/detail/CVE-2023-40532 https://nvd.nist.gov/vuln/detail/CVE-2023-41233 https://nvd.nist.gov/vuln/detail/CVE-2023-41962 https://nvd.nist.gov/vuln/detail/CVE-2023-43484 https://nvd.nist.gov/vuln/detail/CVE-2023-43493 https://nvd.nist.gov/vuln/detail/CVE-2023-43610 https://nvd.nist.gov/vuln/detail/CVE-2023-43614 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:collne:welcart_e-commerce 2024-07-11T16:49+09:00 2023-09-22T13:51+09:00 2024-07-11T16:49+09:00 Trend Micro Endpoint security products for enterprises vulnerable to arbitrary code execution https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003721.html Trend Micro Endpoint security products for enterprises provided by Trend Micro Incorporated contain an arbitrary code execution vulnerability (CWE-94, CVE-2023-41179) in 3rd Party AV Uninstaller Module. Trend Micro Incorporated states that an attack exploiting this vulnerability has been observed. Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN. JVNDB-2023-003721 http://jvn.jp/en/vu/JVNVU90967486/index.html https://www.cve.org/CVERecord?id=CVE-2023-41179 https://nvd.nist.gov/vuln/detail/CVE-2023-41179 https://www.jpcert.or.jp/english/at/2023/at230021.html https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:trendmicro:apex_one cpe:/a:trendmicro:business_security cpe:/a:trendmicro:business_security_services 2024-05-09T18:22+09:00 2023-09-20T13:58+09:00 2024-05-09T18:22+09:00 Multiple vulnerabilities in JTEKT ELECTRONICS Kostac PLC Programming Software https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003592.html Kostac PLC Programming Software provided by JTEKT ELECTRONICS CORPORATION contains multiple vulnerabilities listed below. * Double free (CWE-415) - CVE-2023-41374 * Use-after-free (CWE-416) - CVE-2023-41375 Michael Heinzl reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-003592 https://jvn.jp/en/vu/JVNVU95282683/index.html https://www.cve.org/CVERecord?id=CVE-2023-41374 https://www.cve.org/CVERecord?id=CVE-2023-41375 https://nvd.nist.gov/vuln/detail/CVE-2023-41374 https://nvd.nist.gov/vuln/detail/CVE-2023-41375 https://cwe.mitre.org/data/definitions/415.html https://cwe.mitre.org/data/definitions/416.html cpe:/a:jtekt:kostac_plc 2023-09-13T15:02+09:00 2023-09-13T15:02+09:00 2023-09-13T15:02+09:00 Pyramid vulnerable to directory traversal https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000093.html Pyramid provided by Pylons Project contains a directory traversal vulnerability. Masashi Yamane of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000093 http://jvn.jp/en/jp/JVN41113329/index.html https://www.cve.org/CVERecord?id=CVE-2023-40587 https://nvd.nist.gov/vuln/detail/CVE-2023-40587 https://github.com/advisories/GHSA-65fx-pmw6-rcfm https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:pylonsproject:pyramid 2024-05-16T16:52+09:00 2023-09-11T13:53+09:00 2024-05-16T16:52+09:00 Vulnerability in JP1/VERITAS https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003335.html A vulnerability (VTS23-011) exists in JP1/VERITAS. JVNDB-2023-003335 https://www.cve.org/CVERecord?id=CVE-2023-40256 https://nvd.nist.gov/vuln/detail/CVE-2023-40256 cpe:/a:hitachi:jp1_veritas_netbackup cpe:/a:veritas:netbackup 2023-09-06T15:35+09:00 2023-09-06T15:35+09:00 2023-09-06T15:35+09:00 "direct" Desktop App for macOS fails to restrict access permissions https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000092.html "direct" Desktop App for macOS provided by L is B Corp. fails to restrict access permissions (CWE-284). The access control mechanism provided by macOS "TCC (Transparency Consent and Control)" may be bypassed. Koh M. Nakagawa of FFRI Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000092 https://jvn.jp/en/jp/JVN42691027/index.html https://www.cve.org/CVERecord?id=CVE-2023-41775 https://nvd.nist.gov/vuln/detail/CVE-2023-41775 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:l-is-b:direct 2023-09-06T14:33+09:00 2023-09-06T14:33+09:00 2023-09-06T14:33+09:00 Multiple vulnerabilities in F-RevoCRM https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000091.html F-RevoCRM provided by ThinkingReed inc. contains multiple vulnerabilities listed below. * OS Command Injection (CWE-78) - CVE-2023-41149 * Cross-site scripting vulnerability (CWE-79) - CVE-2023-41150 Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000091 https://jvn.jp/en/jp/JVN78113802/index.html https://www.cve.org/CVERecord?id=CVE-2023-41149 https://www.cve.org/CVERecord?id=CVE-2023-41150 https://nvd.nist.gov/vuln/detail/CVE-2023-41149 https://nvd.nist.gov/vuln/detail/CVE-2023-41150 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:f-revocrm:f-revocrm 2024-05-14T18:06+09:00 2023-09-05T15:51+09:00 2024-05-14T18:06+09:00 Multiple vulnerabilities in CGIs of PMailServer and PMailServer2 https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000090.html CGIs included with PMailServer and PMailServer2 provided by A.K.I Software contain multiple vulnerabilities listed below. * Stored cross-site scripting vulnerability (CWE-79) - CVE-2023-39223 * Insufficient verification vulnerability in Broadcast Mail CGI (pmc.exe) (CWE-434) - CVE-2023-39933 * Directory traversal vulnerability in Mailing List Search CGI (pmmls.exe) (CWE-22) - CVE-2023-40160 * Directory traversal vulnerability in Internal Simple Webserver (CWE-22) - CVE-2023-40747 CVE-2023-39223, CVE-2023-39933, CVE-2023-40160 Shuji Shimizu of VeriServe Corporation reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-40747 Shunta Nakanishi of VeriServe Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000090 https://jvn.jp/en/jp/JVN92720882/index.html https://www.cve.org/CVERecord?id=CVE-2023-39223 https://www.cve.org/CVERecord?id=CVE-2023-39933 https://www.cve.org/CVERecord?id=CVE-2023-40160 https://www.cve.org/CVERecord?id=CVE-2023-40747 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:aki_software_pmailserver cpe:/a:misc:aki_software_pmailserver2 2023-09-05T14:55+09:00 2023-09-05T14:55+09:00 2023-09-05T14:55+09:00 Multiple vulnerabilities in SHIRASAGI https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000088.html SHIRASAGI provided by SHIRASAGI Project contains multiple vulnerabilities listed below. * Reflected cross-site scripting (CWE-79) - CVE-2023-36492 * Stored cross-site scripting (CWE-79) - CVE-2023-38569 * Path traversal (CWE-22) - CVE-2023-39448 CVE-2023-36492, CVE-2023-38569 Taiga Shirakura of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-39448 Masashi Yamane of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000088 https://jvn.jp/en/jp/JVN82758000/index.html https://www.cve.org/CVERecord?id=CVE-2023-36492 https://www.cve.org/CVERecord?id=CVE-2023-38569 https://www.cve.org/CVERecord?id=CVE-2023-39448 https://nvd.nist.gov/vuln/detail/CVE-2023-36492 https://nvd.nist.gov/vuln/detail/CVE-2023-38569 https://nvd.nist.gov/vuln/detail/CVE-2023-39448 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ss-proj:shirasagi 2024-05-14T17:58+09:00 2023-09-04T13:41+09:00 2024-05-14T17:58+09:00 Multiple vulnerabilities in i-PRO VI Web Client https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000089.html VI Web Client provided by i-PRO Co., Ltd. is Video Insight's video management software. VI Web Client contains multiple vulnerabilities listed below.<ul><li>Open Redirect (CWE-601) - CVE-2023-38574</li><li>Reflected Cross-site Scripting (CWE-79) - CVE-2023-39938</li><li>View Stored Cross-site Scripting in View setting page (CWE-79) - CVE-2023-40535</li><li>Stored Cross-site Scripting in Map setting page (CWE-79) - CVE-2023-40705</li></ul>Michael Heinzl reported these vulnerabilities to i-PRO Co., Ltd. and coordinated with them. After the coordination was completed, the developer reported this case to IPA to notify users of the solution through JVN. JPCERT/CC coordinated with the developer for the publication. JVNDB-2023-000089 https://jvn.jp/en/jp/JVN60140221/index.html https://www.cve.org/CVERecord?id=CVE-2023-38574 https://www.cve.org/CVERecord?id=CVE-2023-39938 https://www.cve.org/CVERecord?id=CVE-2023-40535 https://www.cve.org/CVERecord?id=CVE-2023-40705 https://nvd.nist.gov/vuln/detail/CVE-2023-38574 https://nvd.nist.gov/vuln/detail/CVE-2023-39938 https://nvd.nist.gov/vuln/detail/CVE-2023-40535 https://nvd.nist.gov/vuln/detail/CVE-2023-40705 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:i-pro:i-pro_vi_web_client 2024-05-14T18:05+09:00 2023-08-31T14:13+09:00 2024-05-14T18:05+09:00 Phoenix Technologies Windows kernel driver vulnerable to insufficient access control on its IOCTL https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003028.html Some of the Windows kernel drivers provided by Phoenix Technologies Inc. is vulnerable to insufficient access control on its IOCTL (CWE-782, CVE-2023-35841). Takahiro Haruyama of VMware reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-003028 https://jvn.jp/en/vu/JVNVU93886750/index.html https://jvn.jp/en/ta/JVNTA90371415/index.html https://www.cve.org/CVERecord?id=CVE-2023-35841 https://cwe.mitre.org/data/definitions/782.html cpe:/a:phoenix:tdklib64.sys 2024-04-24T11:43+09:00 2023-08-30T10:05+09:00 2024-04-24T11:43+09:00 Vulnerability in HiRDB https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-003023.html A Vulnerability (CVE-2023-1995) exists in HiRDB. JVNDB-2023-003023 https://www.cve.org/CVERecord?id=CVE-2023-1995 https://nvd.nist.gov/vuln/detail/CVE-2023-1995 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:hirdb_server cpe:/a:hitachi:hirdb_server_with_additional_function cpe:/a:hitachi:hirdb_structured_data_access_facility 2023-09-06T15:45+09:00 2023-08-29T15:55+09:00 2023-09-06T15:45+09:00 SYNCK GRAPHICA Mailform Pro CGI vulnerable to Regular expression Denial-of-Service (ReDoS) https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000087.html Mailform Pro CGI provided by SYNCK GRAPHICA contains a Regular expression Denial-of-Service (ReDoS) vulnerability (CWE-1333, CVE-2023-40599). This vulnerability is a similar issue as CVE-2023-32610 published on JVN on June 20, 2023, and was newly discovered in several Add-ons listed above. Tran Quang Vu of FPT Software reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000087 http://jvn.jp/en/jp/JVN86484824/index.html https://jvn.jp/en/jp/JVN70502982/ https://www.cve.org/CVERecord?id=CVE-2023-40599 https://nvd.nist.gov/vuln/detail/CVE-2023-40599 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:synck_graphica:mailform_pro_cgi 2024-05-15T17:12+09:00 2023-08-24T14:12+09:00 2024-05-15T17:12+09:00 "Skylark" App fails to restrict custom URL schemes properly https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000085.html "Skylark" App provided by SKYLARK HOLDINGS CO., LTD. provides the function to access a requested URL using Custom URL Scheme. The App does not restrict access to the function properly (CWE-939) which may be exploited to direct the App to access any sites. Shunsuke Kaneko of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000085 http://jvn.jp/en/jp/JVN03447226/index.html https://www.cve.org/CVERecord?id=CVE-2023-40530 https://nvd.nist.gov/vuln/detail/CVE-2023-40530 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:skylark:skylark 2024-05-15T17:19+09:00 2023-08-24T13:34+09:00 2024-05-15T17:19+09:00 Rakuten WiFi Pocket vulnerable to improper authentication https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000086.html Rakuten WiFi Pocket provided by Rakuten Mobile, Inc. is a mobile router. Management Screen of Rakuten WiFi Pocket contains an improper authentication vulnerability (CWE-287). Sato Nobuhiro of Suzuki Motor Corporation and You Okuma of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000086 http://jvn.jp/en/jp/JVN55217369/index.html https://www.cve.org/CVERecord?id=CVE-2023-40282 https://nvd.nist.gov/vuln/detail/CVE-2023-40282 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:rakuten:wifi_pocket_firmware 2024-03-27T13:43+09:00 2023-08-23T12:42+09:00 2024-03-27T13:43+09:00 Multiple vulnerabilities in Panasonic Control FPWIN Pro7 https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002906.html Control FPWIN Pro7 provided by Panasonic contains multiple vulnerabilities listed below. * Stack-based Buffer Overflow (CWE-121) - CVE-2023-28728 * Access of Resource Using Incompatible Type (CWE-843) - CVE-2023-28729 * Improper Restriction of Operations within the Bounds of a Memory Buffer Michael Heinzl first contacted JPCERT/CC, and JPCERT/CC advised him to contact Panasonic directly. Afterwards, he reported these vulnerabilities to Panasonic and coordinated with them. Panasonic and JPCERT/CC published respective advisories in order to notify users of these vulnerabilities. JVNDB-2023-002906 http://jvn.jp/en/vu/JVNVU96622721/index.html https://www.cve.org/CVERecord?id=CVE-2023-28728 https://www.cve.org/CVERecord?id=CVE-2023-28729 https://www.cve.org/CVERecord?id=CVE-2023-28730 https://nvd.nist.gov/vuln/detail/CVE-2023-28730 https://nvd.nist.gov/vuln/detail/CVE-2023-28728 https://nvd.nist.gov/vuln/detail/CVE-2023-28729 https://www.cisa.gov/news-events/ics-advisories/icsa-23-192-03 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/121.html https://cwe.mitre.org/data/definitions/843.html cpe:/a:panasonic:fpwin_pro 2024-04-18T17:31+09:00 2023-08-22T18:02+09:00 2024-04-18T17:31+09:00 Multiple vulnerabilities in CBC digital video recorders https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002905.html Digital video recorders provided by CBC Co.,Ltd. contain multiple vulnerabilities listed below. * Improper authentication (CWE-287) - CVE-2023-38585 * OS command injection (CWE-78) - CVE-2023-40144 * Hidden functionality (CWE-912) - CVE-2023-40158 Yoshiki Mori, Ushimaru Hayato, Hiromu Kubiura and Masaki Kubo of National Institute of Information and Communications Technology Cybersecurity Research Institute reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-002905 http://jvn.jp/en/vu/JVNVU92545432/index.html https://www.cve.org/CVERecord?id=CVE-2023-38585 https://www.cve.org/CVERecord?id=CVE-2023-40144 https://www.cve.org/CVERecord?id=CVE-2023-40158 https://nvd.nist.gov/vuln/detail/CVE-2023-38585 https://nvd.nist.gov/vuln/detail/CVE-2023-40144 https://nvd.nist.gov/vuln/detail/CVE-2023-40158 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/912.html cpe:/o:cbc:dr-16f42a_firmware cpe:/o:cbc:dr-16f45at_firmware cpe:/o:cbc:dr-16h_firmware cpe:/o:cbc:dr-16m52-av_firmware cpe:/o:cbc:dr-16m52_firmware cpe:/o:cbc:dr-4fx1_firmware cpe:/o:cbc:dr-4h_firmware cpe:/o:cbc:dr-4m51-av_firmware cpe:/o:cbc:dr-8f42a_firmware cpe:/o:cbc:dr-8f45at_firmware cpe:/o:cbc:dr-8h_firmware cpe:/o:cbc:dr-8m52-av_firmware cpe:/o:cbc:drh8-4m41-a_firmware cpe:/o:cbc:nr-16f82-16p_firmware cpe:/o:cbc:nr-16f85-8pra_firmware cpe:/o:cbc:nr-16m_firmware cpe:/o:cbc:nr-4f_firmware cpe:/o:cbc:nr-8f_firmware cpe:/o:cbc:nr16h_firmware cpe:/o:cbc:nr4h_firmware cpe:/o:cbc:nr8-4m71_firmware cpe:/o:cbc:nr8-8m72_firmware cpe:/o:cbc:nr8h_firmware 2024-04-10T17:39+09:00 2023-08-22T17:35+09:00 2024-04-10T17:39+09:00 WordPress Plugin "Advanced Custom Fields" vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000084.html WordPress Plugin "Advanced Custom Fields" provided by WP Engine contains a cross-site scripting vulnerability (CWE-79). Ryotaro Imamura of SB Technology Corp. and Satoo Nakano reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000084 http://jvn.jp/en/jp/JVN98946408/index.html https://www.cve.org/CVERecord?id=CVE-2023-40068 https://nvd.nist.gov/vuln/detail/CVE-2023-40068 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:advancedcustomfields:advanced_custom_fields 2024-03-25T17:55+09:00 2023-08-21T14:05+09:00 2024-03-25T17:55+09:00 Multiple vulnerabilities in LuxCal Web Calendar https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000083.html LuxCal Web Calendar provided by LuxSoft contains multiple vulnerabilities listed below. * Cross-site scripting (CWE-79) - CVE-2023-39543 * SQL injection (CWE-89) - CVE-2023-39939 Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000083 http://jvn.jp/en/jp/JVN04876736/index.html https://www.cve.org/CVERecord?id=CVE-2023-39543 https://www.cve.org/CVERecord?id=CVE-2023-39939 https://nvd.nist.gov/vuln/detail/CVE-2023-39543 https://nvd.nist.gov/vuln/detail/CVE-2023-39939 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:luxsoft:luxcal_web_calendar 2024-03-26T17:09+09:00 2023-08-21T13:29+09:00 2024-03-26T17:09+09:00 Multiple vulnerabilities in Proself https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000078.html Proself provided by North Grid Corporation is an online storage server software. Proself contains multiple vulnerabilities listed below. <ul><li>Improper authentication (CWE-287) - CVE-2023-39415 <li>OS command injection (CWE-78) - CVE-2023-39416</li></ul> The developer states that attacks exploiting these vulnerabilities have been observed. North Grid Corporation reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JPCERT/CC and North Grid Corporation coordinated under the Information Security Early Warning Partnership. JVNDB-2023-000078 http://jvn.jp/en/jp/JVN19661362/index.html https://www.cve.org/CVERecord?id=CVE-2023-39415 https://www.cve.org/CVERecord?id=CVE-2023-39416 https://nvd.nist.gov/vuln/detail/CVE-2023-39415 https://nvd.nist.gov/vuln/detail/CVE-2023-39416 https://www.ipa.go.jp/security/security-alert/2023/alert20230803.html https://www.jpcert.or.jp/at/2023/at230014.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:northgrid:proself 2024-03-28T17:43+09:00 2023-08-18T13:47+09:00 2024-03-28T17:43+09:00 EC-CUBE 2 series vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000082.html EC-CUBE 2 series provided by EC-CUBE CO.,LTD. contains a cross-site scripting vulnerability (CWE-79) in "mail/template" and "products/product" of Management page. Shimamine Taihei of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. reported it to JPCERT/CC to notify users of its solution through JVN. JVNDB-2023-000082 http://jvn.jp/en/jp/JVN46993816/index.html https://www.cve.org/CVERecord?id=CVE-2023-40281 https://nvd.nist.gov/vuln/detail/CVE-2023-40281 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ec-cube:ec-cube 2024-03-25T18:07+09:00 2023-08-17T15:12+09:00 2024-03-25T18:07+09:00 Multiple vulnerabilities in ELECOM and LOGITEC network devices https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002797.html Multiple network devices provided by ELECOM CO.,LTD. and LOGITEC CORPORATION contain multiple vulnerabilities listed below. * Hidden Functionality (CWE-912) - CVE-2023-32626, CVE-2023-35991, CVE-2023-39445 * Telnet service access restriction failure (CWE-284) - CVE-2023-38132 * Hidden Functionality (CWE-912) - CVE-2023-38576 * Buffer overflow (CWE-120) - CVE-2023-39454 * OS Command Injection (CWE-78) - CVE-2023-39455, CVE-2023-40072 * OS Command Injection (CWE-78) - CVE-2023-39944, CVE-2023-40069 Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-002797 http://jvn.jp/en/vu/JVNVU91630351/index.html https://www.cve.org/CVERecord?id=CVE-2023-32626 https://www.cve.org/CVERecord?id=CVE-2023-35991 https://www.cve.org/CVERecord?id=CVE-2023-38132 https://www.cve.org/CVERecord?id=CVE-2023-38576 https://www.cve.org/CVERecord?id=CVE-2023-39445 https://www.cve.org/CVERecord?id=CVE-2023-39454 https://www.cve.org/CVERecord?id=CVE-2023-39455 https://www.cve.org/CVERecord?id=CVE-2023-39944 https://www.cve.org/CVERecord?id=CVE-2023-40069 https://www.cve.org/CVERecord?id=CVE-2023-40072 https://nvd.nist.gov/vuln/detail/CVE-2023-32626 https://nvd.nist.gov/vuln/detail/CVE-2023-35991 https://nvd.nist.gov/vuln/detail/CVE-2023-38132 https://nvd.nist.gov/vuln/detail/CVE-2023-38576 https://nvd.nist.gov/vuln/detail/CVE-2023-39445 https://nvd.nist.gov/vuln/detail/CVE-2023-39454 https://nvd.nist.gov/vuln/detail/CVE-2023-39455 https://nvd.nist.gov/vuln/detail/CVE-2023-39944 https://nvd.nist.gov/vuln/detail/CVE-2023-40069 https://nvd.nist.gov/vuln/detail/CVE-2023-40072 https://cwe.mitre.org/data/definitions/120.html https://cwe.mitre.org/data/definitions/284.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/912.html cpe:/a:elecom:wab-i1750-ps cpe:/a:elecom:wab-s1167-ps cpe:/o:elecom:wab-m1775-ps_firmware cpe:/o:elecom:wab-m2133_firmware cpe:/o:elecom:wab-s1167_firmware cpe:/o:elecom:wab-s1775_firmware cpe:/o:elecom:wab-s300_firmware cpe:/o:elecom:wab-s600-ps_firmware cpe:/o:elecom:wrc-1167ghbk2_firmware cpe:/o:elecom:wrc-1467ghbk-a_firmware cpe:/o:elecom:wrc-1467ghbk-s_firmware cpe:/o:elecom:wrc-1750ghbk-e_firmware cpe:/o:elecom:wrc-1750ghbk2-i_firmware cpe:/o:elecom:wrc-1750ghbk_firmware cpe:/o:elecom:wrc-1900ghbk-a_firmware cpe:/o:elecom:wrc-1900ghbk-s_firmware cpe:/o:elecom:wrc-600ghbk-a_firmware cpe:/o:elecom:wrc-733febk2-a_firmware cpe:/o:elecom:wrc-f1167acf2_firmware cpe:/o:elecom:wrc-f1167acf_firmware cpe:/o:elecom:wrc-x1800gs-b_firmware cpe:/o:elecom:wrc-x1800gsa-b_firmware cpe:/o:elecom:wrc-x1800gsh-b_firmware cpe:/o:logitec:lan-w300n%2fdr_firmware cpe:/o:logitec:lan-w300n%2fpr5_firmware cpe:/o:logitec:lan-w300n%2fp_firmware cpe:/o:logitec:lan-w300n%2frs_firmware cpe:/o:logitec:lan-w451ngr_firmware cpe:/o:logitec:lan-wh300an%2fdgp_firmware cpe:/o:logitec:lan-wh300andgpe_firmware cpe:/o:logitec:lan-wh300n%2fdgp_firmware cpe:/o:logitec:lan-wh300n%2fdr_firmware cpe:/o:logitec:lan-wh300n%2fre_firmware cpe:/o:logitec:lan-wh450n%2fgp_firmware 2024-08-29T09:39+09:00 2023-08-15T11:54+09:00 2024-08-29T09:39+09:00 Multiple server-side request forgery vulnerabilities in Trend Micro Apex Central (July 2023) https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002796.html Trend Micro Apex Central is vulnerable to multiple server-side request forgeries. Trend Micro Incorporated has released Patch 5 (build 6481) for Trend Micro Apex Central. Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN. JVNDB-2023-002796 http://jvn.jp/en/vu/JVNVU98367862/index.html https://www.cve.org/CVERecord?id=CVE-2023-38624 https://www.cve.org/CVERecord?id=CVE-2023-38625 https://www.cve.org/CVERecord?id=CVE-2023-38626 https://www.cve.org/CVERecord?id=CVE-2023-38627 https://nvd.nist.gov/vuln/detail/CVE-2023-38624 https://nvd.nist.gov/vuln/detail/CVE-2023-38625 https://nvd.nist.gov/vuln/detail/CVE-2023-38626 https://nvd.nist.gov/vuln/detail/CVE-2023-38627 https://cwe.mitre.org/data/definitions/918.html cpe:/a:trendmicro:apex_central 2024-03-13T17:58+09:00 2023-08-10T16:04+09:00 2024-03-13T17:58+09:00 "Rikunabi NEXT" App for Android fails to restrict custom URL schemes properly https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000081.html "Rikunabi NEXT" App for Android provided by Recruit Co., Ltd. provides the function to access a requested URL using Custom URL Scheme. The App does not restrict access to the function properly (CWE-939) which may be exploited to direct the App to access any sites. Nao Komatsu of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000081 http://jvn.jp/en/jp/JVN84820712/index.html https://www.cve.org/CVERecord?id=CVE-2023-39507 https://nvd.nist.gov/vuln/detail/CVE-2023-39507 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:recruit:rikunabi_next 2024-03-28T18:01+09:00 2023-08-09T12:45+09:00 2024-03-28T18:01+09:00 "FFRI yarai" and "FFRI yarai Home and Business Edition" handle exceptional conditions improperly https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000080.html "FFRI yarai" and "FFRI yarai Home and Business Edition" provided by FFRI Security, Inc. handle exceptional conditions improperly (CWE-703). When the product's Windows Defender management feature is enabled, and Microsoft Defender detects some files matching specific conditions as a threat, the affected product may fail to handle this situation properly and stop working. FFRI Security, Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and FFRI Security, Inc. coordinated under the Information Security Early Warning Partnership. JVNDB-2023-000080 http://jvn.jp/en/jp/JVN42527152/index.html https://www.cve.org/CVERecord?id=CVE-2023-39341 https://nvd.nist.gov/vuln/detail/CVE-2023-39341 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ffri:ffri_yarai cpe:/a:nec:actsecure_x_managed_security_service cpe:/a:skygroup:edr_plus_pack cpe:/a:skygroup:edr_plus_pack_cloud cpe:/a:soliton:infotrace_mark_ii_malware_protection cpe:/a:soliton:zerona cpe:/a:soliton:zerona_plus cpe:/a:sourcenext:dual_safe 2024-03-28T17:54+09:00 2023-08-07T17:39+09:00 2024-03-28T17:54+09:00 Multiple vulnerabilities in Special Interest Group Network for Analysis and Liaison's API https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000079.html Special Interest Group Network for Analysis and Liaison's "Inter-SOC Cooperation API" provided by Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) contains multiple vulnerabilities listed below. * Improper Authorization in Information Provision function (CWE-285) - CVE-2023-38751 * Improper Authorization in Information Provision and Group Message functions (CWE-285) - CVE-2023-38752 yusuke negishi of JPCERT/CC Platform Service Group reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000079 http://jvn.jp/en/jp/JVN83334799/index.html https://www.cve.org/CVERecord?id=CVE-2023-38751 https://www.cve.org/CVERecord?id=CVE-2023-38752 https://nvd.nist.gov/vuln/detail/CVE-2023-38751 https://nvd.nist.gov/vuln/detail/CVE-2023-38752 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:jpcert:special_interest_group_network_for_analysis_and_liaison 2024-03-28T18:08+09:00 2023-08-07T15:15+09:00 2024-03-28T18:08+09:00 Fujitsu Software Infrastructure Manager (ISM) stores sensitive information in cleartext https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000077.html Fujitsu Software Infrastructure Manager (ISM) V2.8.0.060, provided by Fujitsu Limited, stores the password for the proxy server in cleartext form to the product's maintenance data (ismsnap) (CWE-312) under the following conditions. <ul><li>Using a proxy server that requires authentication in the connection from ISM to internet</li><li>The user ID and/or the password for the proxy server contain "\" (backslash) character</li><li>The product's firmware download function is enabled (*)</li> * This is a function for the Europe Region and is disabled by default</ul> Fujitsu Limited reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Fujitsu Limited coordinated under the Information Security Early Warning Partnership. JVNDB-2023-000077 http://jvn.jp/en/jp/JVN38847224/index.html https://www.cve.org/CVERecord?id=CVE-2023-39379 https://nvd.nist.gov/vuln/detail/CVE-2023-39379 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:fujitsu:software_infrastructure_manager 2024-04-03T17:19+09:00 2023-08-04T17:31+09:00 2024-04-03T17:19+09:00 OMRON CJ series and CS/CJ Series EtherNet/IT unit vulnerable to Denial-of-Service (DoS) https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002787.html Denial-of-service (DoS) vulnerability due to improper validation of specified type of input (CWE-1287) issue exists in the built-in EtherNet/IP port of the CJ Series CJ2 CPU unit and the communication function of the CS/CJ Series EtherNet/IP unit provided by OMRON Corporation. OMRON Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2023-002787 http://jvn.jp/en/vu/JVNVU92193064/index.html https://www.cve.org/CVERecord?id=CVE-2023-38744 https://nvd.nist.gov/vuln/detail/CVE-2023-38744 https://cwe.mitre.org/data/definitions/1287.html cpe:/a:omron:cj2h_cpu6 cpe:/a:omron:cj2m_cpu3 cpe:/o:omron:cj1w-eip21_firmware cpe:/o:omron:cs1w-eip21_firmware 2023-08-03T13:45+09:00 2023-08-03T13:45+09:00 2023-08-03T13:45+09:00 Multiple vulnerabilities in OMRON CX-Programmer https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002786.html CX-Programmer provided by OMRON Corporation contains multiple vulnerabilities listed below. * Out-of-bounds read (CWE-125) - CVE-2023-38746 * Heap-based buffer overflow (CWE-122) - CVE-2023-38747 * Use after free (CWE-416) - CVE-2023-38748 Michael Heinzl reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-002786 http://jvn.jp/en/vu/JVNVU93286117/index.html https://www.cve.org/CVERecord?id=CVE-2023-38746 https://www.cve.org/CVERecord?id=CVE-2023-38747 https://www.cve.org/CVERecord?id=CVE-2023-38748 https://nvd.nist.gov/vuln/detail/CVE-2023-38746 https://nvd.nist.gov/vuln/detail/CVE-2023-38747 https://nvd.nist.gov/vuln/detail/CVE-2023-38748 https://cwe.mitre.org/data/definitions/122.html https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/416.html cpe:/a:omron:cx-programmer 2024-04-05T17:39+09:00 2023-08-03T13:42+09:00 2024-04-05T17:39+09:00 SEIKO EPSON printer Web Config vulnerable to denial-of-service (DoS) https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000076.html SEIKO EPSON printer Web Config contains a denial-of-service (DoS) vulnerability due to improper input validation (CWE-20). SEIKO EPSON CORPORATION reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and SEIKO EPSON CORPORATION coordinated under the Information Security Early Warning Partnership. JVNDB-2023-000076 http://jvn.jp/en/jp/JVN61337171/index.html https://www.cve.org/CVERecord?id=CVE-2023-38556 https://nvd.nist.gov/vuln/detail/CVE-2023-38556 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:epson:web_config 2024-04-19T17:27+09:00 2023-08-02T14:55+09:00 2024-04-19T17:27+09:00 Multiple vulnerabilities in Command Center RX (CCRX) of Kyocera Document Solutions MFPs and printers https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002725.html Command Center RX (CCRX), a web interface for MFPs and printers provided by KYOCERA Document Solutions Inc., contains multiple vulnerabilities listed below. * Path traversal (CWE-22) - CVE-2023-34259 * Path traversal (CWE-22) - CVE-2023-34260 * Observable response discrepancy (CWE-204) - CVE-2023-34261 Stefan Michlits of SEC Consult reported these vulnerabilities to KYOCERA Document Solutions Inc. and coordinated. KYOCERA Document Solutions Inc. and JPCERT/CC published respective advisories in order to notify users of this vulnerability. JVNDB-2023-002725 http://jvn.jp/en/vu/JVNVU98785541/index.html https://www.cve.org/CVERecord?id=CVE-2023-34259 https://www.cve.org/CVERecord?id=CVE-2023-34260 https://www.cve.org/CVERecord?id=CVE-2023-34261 https://nvd.nist.gov/vuln/detail/CVE-2023-34259 https://nvd.nist.gov/vuln/detail/CVE-2023-34260 https://nvd.nist.gov/vuln/detail/CVE-2023-34261 https://cwe.mitre.org/data/definitions/204.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:kyocera_document_solutions_multiple_product 2024-05-07T18:15+09:00 2023-07-28T18:24+09:00 2024-05-07T18:15+09:00 Fujitsu network devices Si-R series and SR-M series vulnerable to authentication bypass https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002722.html The web management interface of Fujitsu network devices Si-R series and SR-M series contains an authentication bypass vulnerability (CWE-287,CVE-2023-38555). Katsuhiko Sato (a.k.a. goroh_kun) of 00One, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-002722 https://jvn.jp/en/vu/JVNVU96643580/index.html https://www.cve.org/CVERecord?id=CVE-2023-38555 https://nvd.nist.gov/vuln/detail/CVE-2023-38555 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:fujitsu:si-r220d_firmware cpe:/o:fujitsu:si-r370b_firmware cpe:/o:fujitsu:si-r570b_firmware cpe:/o:fujitsu:si-r_130b_firmware cpe:/o:fujitsu:si-r_30b_firmware cpe:/o:fujitsu:si-r_90brin_firmware cpe:/o:fujitsu:si-r_g100b_firmware cpe:/o:fujitsu:si-r_g100_firmware cpe:/o:fujitsu:si-r_g110b_firmware cpe:/o:fujitsu:si-r_g120_firmware cpe:/o:fujitsu:si-r_g121_firmware cpe:/o:fujitsu:si-r_g200b_firmware cpe:/o:fujitsu:si-r_g200_firmware cpe:/o:fujitsu:si-r_g210_firmware cpe:/o:fujitsu:si-r_g211_firmware cpe:/o:fujitsu:sr-m_50ap1_firmware 2024-04-19T18:07+09:00 2023-07-27T18:12+09:00 2024-04-19T18:07+09:00 Fujitsu Real-time Video Transmission Gear "IP series" uses a hard-coded credentials https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000074.html Real-time Video Transmission Gear "IP series" provided by Fujitsu Limited uses a hard-coded credentials (CWE-798) . The product's credentials for factory testing may be obtained by reverse engineering and others. Fujitsu Limited reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Fujitsu Limited coordinated under the Information Security Early Warning Partnership. JVNDB-2023-000074 http://jvn.jp/en/jp/JVN95727578/index.html https://www.cve.org/CVERecord?id=CVE-2023-38433 https://nvd.nist.gov/vuln/detail/CVE-2023-38433 https://www.cisa.gov/news-events/ics-advisories/icsa-23-248-01 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:fujitsu:ip-900d_firmware cpe:/o:fujitsu:ip-900e_firmware cpe:/o:fujitsu:ip-900iid_firmware cpe:/o:fujitsu:ip-90_firmware cpe:/o:fujitsu:ip-920d_firmware cpe:/o:fujitsu:ip-920e_firmware cpe:/o:fujitsu:ip-9610_firmware cpe:/o:fujitsu:ip-he900d_firmware cpe:/o:fujitsu:ip-he900e_firmware cpe:/o:fujitsu:ip-he950d_firmware cpe:/o:fujitsu:ip-he950e_firmware 2024-04-12T18:04+09:00 2023-07-26T18:00+09:00 2024-04-12T18:04+09:00 Improper restriction of XML external entity references (XXE) in Applicant Programme https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000075.html Applicant Programme provided by The Ministry of Justice improperly restricts XML external entity references (XXE) (CWE-611). Toyama Taku and Sakaki Ryutaro of NEC Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000075 https://jvn.jp/en/jp/JVN37857022/index.html https://www.cve.org/CVERecord?id=CVE-2023-32639 https://nvd.nist.gov/vuln/detail/CVE-2023-32639 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:moj:applicant_programme 2024-04-22T14:20+09:00 2023-07-24T15:44+09:00 2024-04-22T14:20+09:00 GBrowse vulnerable to unrestricted upload of files with dangerous types https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000073.html GBrowse provided by Generic Model Organism Database Project is a web-based genome browser. GBrowse allows the users to upload their own data in several file formats (see "GBrowse User Uploads"). The affected versions of GBrowse accept files with any formats uploaded (CWE-434), and place them in the area accessible through unauthenticated web requests. The reporter states that attacks exploiting this vulnerability have been observed. Cyber Defense Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000073 https://jvn.jp/en/jp/JVN35897618/index.html https://www.cve.org/CVERecord?id=CVE-2023-32637 https://nvd.nist.gov/vuln/detail/CVE-2023-32637 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:gmod:gbrowse 2024-04-12T17:31+09:00 2023-07-21T15:02+09:00 2024-04-12T17:31+09:00 Multiple vulnerabilities in WordPress Plugin "TS Webfonts for SAKURA" https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000070.html WordPress Plugin "TS Webfonts for SAKURA" provided by SAKURA internet Inc. contains multiple vulnerabilities listed below. * Cross-site scripting (CWE-79) - CVE-2023-32624 * Cross-site request forgery (CWE-352) - CVE-2023-32625 SAKURA internet Inc. reported these vulnerabilities to IPA to notify users of the solutions through JVN. JPCERT/CC and SAKURA internet Inc. coordinated under the Information Security Early Warning Partnership. JVNDB-2023-000070 https://jvn.jp/en/jp/JVN90560760/index.html https://www.cve.org/CVERecord?id=CVE-2023-32624 https://www.cve.org/CVERecord?id=CVE-2023-32625 https://nvd.nist.gov/vuln/detail/CVE-2023-32624 https://nvd.nist.gov/vuln/detail/CVE-2023-32625 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:sakura:ts_webfonts_for_sakura 2024-04-17T17:20+09:00 2023-07-20T16:05+09:00 2024-04-17T17:20+09:00 Multiple Vulnerabilities in Hitachi Device Manager https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002510.html Multiple vulnerabilities have been found in Hitachi Device Manager. JVNDB-2023-002510 https://www.cve.org/CVERecord?id=CVE-2023-34142 https://www.cve.org/CVERecord?id=CVE-2023-34143 https://nvd.nist.gov/vuln/detail/CVE-2023-34142 https://nvd.nist.gov/vuln/detail/CVE-2023-34143 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:device_manager 2023-07-19T14:48+09:00 2023-07-19T14:48+09:00 2023-07-19T14:48+09:00 File and Directory Permissions Vulnerability in Hitachi Command Suite https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002511.html A File and Directory Permissions Vulnerability (CVE-2020-36695) exists in Hitachi Command Suite. JVNDB-2023-002511 https://www.cve.org/CVERecord?id=CVE-2020-36695 https://nvd.nist.gov/vuln/detail/CVE-2020-36695 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:compute_systems_manager cpe:/a:hitachi:device_manager cpe:/a:hitachi:replication_manager cpe:/a:hitachi:tiered_storage_manager cpe:/a:hitachi:tuning_manager 2024-04-26T12:29+09:00 2023-07-19T14:48+09:00 2024-04-26T12:29+09:00 EL Injection Vulnerability in Hitachi Replication Manager https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002512.html An EL Injection Vulnerability (CVE-2022-4146) exists in Hitachi Replication Manager. JVNDB-2023-002512 https://www.cve.org/CVERecord?id=CVE-2022-4146 https://nvd.nist.gov/vuln/detail/CVE-2022-4146 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:replication_manager 2024-04-26T12:24+09:00 2023-07-19T14:48+09:00 2024-04-26T12:24+09:00 Improper restriction of XML external entity references (XXE) in XBRL data create application https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000072.html XBRL data create application provided by Financial Services Agency improperly restricts XML external entity references (XXE) (CWE-611). Taku Toyama of NEC Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000072 https://jvn.jp/en/jp/JVN44726469/index.html https://www.cve.org/CVERecord?id=CVE-2023-32635 https://nvd.nist.gov/vuln/detail/CVE-2023-32635 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:edinet-fsa:xbrl_data_create 2024-03-19T18:11+09:00 2023-07-18T15:22+09:00 2024-03-19T18:11+09:00 Multiple vulnerabilities in ELECOM and LOGITEC wireless LAN routers https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002413.html Multiple wireless LAN routers provided by ELECOM CO.,LTD. and LOGITEC CORPORATION contain multiple vulnerabilities listed below. * Command Injection on the web management page (CWE-77) - CVE-2023-37566, CVE-2023-37568 * Command Injection on a certain port of the web management page (CWE-77) - CVE-2023-37567 Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-002413 https://jvn.jp/en/vu/JVNVU91850798/ https://www.cve.org/CVERecord?id=CVE-2023-37566 https://www.cve.org/CVERecord?id=CVE-2023-37567 https://www.cve.org/CVERecord?id=CVE-2023-37568 https://nvd.nist.gov/vuln/detail/CVE-2023-37566 https://nvd.nist.gov/vuln/detail/CVE-2023-37567 https://nvd.nist.gov/vuln/detail/CVE-2023-37568 https://cwe.mitre.org/data/definitions/77.html cpe:/o:elecom:wrc-1167febk-a_firmware cpe:/o:elecom:wrc-1167gebk-s_firmware cpe:/o:elecom:wrc-1167ghbk-s_firmware cpe:/o:elecom:wrc-1167ghbk3-a_firmware cpe:/o:elecom:wrc-1467ghbk-a_firmware cpe:/o:elecom:wrc-1900ghbk-a_firmware cpe:/o:elecom:wrc-600ghbk-a_firmware cpe:/o:elecom:wrc-733febk2-a_firmware cpe:/o:elecom:wrc-f1167acf2_firmware cpe:/o:logitec:lan-w301nr_firmware 2024-04-22T16:18+09:00 2023-07-12T16:15+09:00 2024-04-22T16:18+09:00 Multiple vulnerabilities in multiple ELECOM wireless LAN routers and wireless LAN repeaters https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000071.html Wireless LAN routers and wireless LAN repeaters provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below. * Cross-site Scripting (CWE-79) - CVE-2023-37560 * Open Redirect (CWE-601) - CVE-2023-37561 * Cross-Site Request Forgery (CWE-352) - CVE-2023-37562 * Information disclosure (CWE-200) - CVE-2023-37563 * OS Command Injection (CWE-78) - CVE-2023-37564 * Code Injection (CWE-94) - CVE-2023-37565 CVE-2023-37560 Yamaguchi Kakeru reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-37561, CVE-2023-37562 Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-37563 Shu Yoshikoshi reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC during the same period, and JPCERT/CC coordinated with the developer. CVE-2023-37564 Shu Yoshikoshi reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-37565 MASAHIRO IIDA and SHUTA IDE of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000071 http://jvn.jp/en/jp/JVN05223215/index.html https://www.cve.org/CVERecord?id=CVE-2023-37560 https://www.cve.org/CVERecord?id=CVE-2023-37561 https://www.cve.org/CVERecord?id=CVE-2023-37562 https://www.cve.org/CVERecord?id=CVE-2023-37563 https://www.cve.org/CVERecord?id=CVE-2023-37564 https://www.cve.org/CVERecord?id=CVE-2023-37565 https://nvd.nist.gov/vuln/detail/CVE-2023-37560 https://nvd.nist.gov/vuln/detail/CVE-2023-37561 https://nvd.nist.gov/vuln/detail/CVE-2023-37562 https://nvd.nist.gov/vuln/detail/CVE-2023-37563 https://nvd.nist.gov/vuln/detail/CVE-2023-37564 https://nvd.nist.gov/vuln/detail/CVE-2023-37565 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:elecom:wrc-1167febk-a_firmware cpe:/o:elecom:wrc-1167febk-s cpe:/o:elecom:wrc-1167gebk-s_firmware cpe:/o:elecom:wrc-1167ghbk-s_firmware cpe:/o:elecom:wrc-1167ghbk3-a_firmware cpe:/o:elecom:wrh-300wh-h_firmware cpe:/o:elecom:wtc-300hwh cpe:/o:elecom:wtc-c1167gc-b cpe:/o:elecom:wtc-c1167gc-w 2024-03-29T15:28+09:00 2023-07-11T15:37+09:00 2024-03-29T15:28+09:00 Multiple vulnerabilities in SoftEther VPN and PacketiX VPN https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000069.html SoftEther VPN provided by University of Tsukuba SoftEther VPN Project and PacketiX VPN provided by SoftEther Corporation contain multiple vulnerabilities listed below in VPN Client function, and Dynamic DNS Client function included in the VPN server.<ul><li>Heap-based buffer overflow (CWE-122) - CVE-2023-27395</li><li>Integer overflow or wraparound (CWE-190) - CVE-2023-22325</li><li>Exposure of resource to wrong sphere (CWE-668) - CVE-2023-32275</li><li>Improper access control (CWE-284) - CVE-2023-27516</li><li>Channel accessible by non-endpoint (CWE-300) - CVE-2023-32634</li><li>Use of uninitialized resource (CWE-908) - CVE-2023-31192</li></ul>Lilith of Cisco Talos of Cisco Systems, Inc., United States of America reported these vulnerabilities to the developer and coordinated. The developer reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000069 http://jvn.jp/en/jp/JVN64316789/index.html https://www.cve.org/CVERecord?id=CVE-2023-27395 https://www.cve.org/CVERecord?id=CVE-2023-22325 https://www.cve.org/CVERecord?id=CVE-2023-32275 https://www.cve.org/CVERecord?id=CVE-2023-27516 https://www.cve.org/CVERecord?id=CVE-2023-31192 https://www.cve.org/CVERecord?id=CVE-2023-32634 https://nvd.nist.gov/vuln/detail/CVE-2023-22325 https://nvd.nist.gov/vuln/detail/CVE-2023-27395 https://nvd.nist.gov/vuln/detail/CVE-2023-27516 https://nvd.nist.gov/vuln/detail/CVE-2023-31192 https://nvd.nist.gov/vuln/detail/CVE-2023-32275 https://nvd.nist.gov/vuln/detail/CVE-2023-32634 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:softether_packetix_vpn cpe:/a:softether:vpn 2024-05-22T17:47+09:00 2023-07-03T15:07+09:00 2024-05-22T17:47+09:00 "NewsPicks" App uses a hard-coded API key for an external service https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000068.html "NewsPicks" App for Android and "NewsPicks" App for iOS provided by NewsPicks, Inc. use a hard-coded API key for an external service (CWE-798). Sunagawa Masanori of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000068 http://jvn.jp/en/jp/JVN32739265/index.html https://www.cve.org/CVERecord?id=CVE-2023-28387 https://nvd.nist.gov/vuln/detail/CVE-2023-28387 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:newspicks_newspicks_economic_news_app cpe:/a:misc:newspicks_newspicks_economic_news_app_useful_for_business 2024-04-30T18:09+09:00 2023-06-30T15:06+09:00 2024-04-30T18:09+09:00 Null pointer dereference vulnerability in multiple printers and MFPs which implement BROTHER debut web server https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002270.html Multiple printers and MFPs (multifunction printers) which implement Brother debut web server contain a null pointer dereference vulnerability (CWE-476, CVE-2023-29984). Darren Johnson directly reported this vulnerability to BROTHER INDUSTRIES, LTD. and FUJIFILM Business Innovation Corp., and both vendors reported this case to JPCERT/CC to request the coordination between the reporter and the susceptible multiple vendors. JVNDB-2023-002270 http://jvn.jp/en/vu/JVNVU93767756/index.html https://www.cve.org/CVERecord?id=CVE-2023-29984 https://nvd.nist.gov/vuln/detail/CVE-2023-29984 http://cwe.mitre.org/data/definitions/476.html cpe:/a:brother:debutwebserver 2024-04-22T16:07+09:00 2023-06-30T11:49+09:00 2024-04-22T16:07+09:00 WordPress Plugin "Snow Monkey Forms" vulnerable to directory traversal https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000067.html WordPress Plugin "Snow Monkey Forms" provided by Monkey Wrench Inc. contains a directory traversal vulnerability (CWE-22). Shinsaku Nomura of Bitforest Co.,Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000067 http://jvn.jp/en/jp/JVN97127032/index.html https://www.cve.org/CVERecord?id=CVE-2023-32623 https://nvd.nist.gov/vuln/detail/CVE-2023-32623 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:2inc:snow_monkey_forms 2024-04-26T17:56+09:00 2023-06-27T17:05+09:00 2024-04-26T17:56+09:00 Multiple vulnerabilities in WAVLINK WL-WN531AX2 https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000065.html WL-WN531AX2 provided by WAVLINK contains multiple vulnerabilities listed below. * Client-side enforcement of server-side security (CWE-602) - CVE-2023-32612 * Exposure of resource to wrong sphere (CWE-668) - CVE-2023-32613 * Improper authentication (CWE-287) - CVE-2023-32620 * Unrestricted upload of file with dangerous type (CWE-434) - CVE-2023-32621 * Improper neutralization of special elements (CWE-138) - CVE-2023-32622 Cyber Defense Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000065 http://jvn.jp/en/jp/JVN78634340/index.html https://www.cve.org/CVERecord?id=CVE-2023-32612 https://www.cve.org/CVERecord?id=CVE-2023-32613 https://www.cve.org/CVERecord?id=CVE-2023-32620 https://www.cve.org/CVERecord?id=CVE-2023-32621 https://www.cve.org/CVERecord?id=CVE-2023-32622 https://nvd.nist.gov/vuln/detail/CVE-2023-32612 https://nvd.nist.gov/vuln/detail/CVE-2023-32613 https://nvd.nist.gov/vuln/detail/CVE-2023-32620 https://nvd.nist.gov/vuln/detail/CVE-2023-32621 https://nvd.nist.gov/vuln/detail/CVE-2023-32622 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:wavlink:wl-wn531ax2_firmware 2023-06-27T16:50+09:00 2023-06-27T16:50+09:00 2023-06-27T16:50+09:00 Multiple vulnerabilities in Aterm series https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000066.html Aterm series provided by NEC Corporation contain multiple vulnerabilities listed below. * Directory traversal (CWE-22) - CVE-2023-3330 * Directory traversal (CWE-22) - CVE-2023-3331 * Stored cross-site scripting (CWE-79) - CVE-2023-3332 * OS command injection (CWE-78) - CVE-2023-3333 Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000066 http://jvn.jp/en/jp/JVN38343415/index.html https://www.cve.org/CVERecord?id=CVE-2023-3330 https://www.cve.org/CVERecord?id=CVE-2023-3331 https://www.cve.org/CVERecord?id=CVE-2023-3332 https://www.cve.org/CVERecord?id=CVE-2023-3333 https://nvd.nist.gov/vuln/detail/CVE-2023-3330 https://nvd.nist.gov/vuln/detail/CVE-2023-3331 https://nvd.nist.gov/vuln/detail/CVE-2023-3332 https://nvd.nist.gov/vuln/detail/CVE-2023-3333 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:nec:aterm_wf300hp_firmware cpe:/o:nec:aterm_wg1400hp_firmware cpe:/o:nec:aterm_wg1800hp2_firmware cpe:/o:nec:aterm_wg1800hp_firmware cpe:/o:nec:aterm_wg2200hp_firmware cpe:/o:nec:aterm_wg2600hp cpe:/o:nec:aterm_wg2600hp2_firmware cpe:/o:nec:aterm_wg300hp_firmware cpe:/o:nec:aterm_wg600hp_firmware cpe:/o:nec:aterm_wr8170n_firmware cpe:/o:nec:aterm_wr8175n_firmware cpe:/o:nec:aterm_wr8370n_firmware cpe:/o:nec:aterm_wr8600n_firmware cpe:/o:nec:aterm_wr8700n_firmware cpe:/o:nec:aterm_wr8750n_firmware cpe:/o:nec:aterm_wr9300n_firmware cpe:/o:nec:aterm_wr9500n_firmware 2024-05-22T18:16+09:00 2023-06-27T15:12+09:00 2024-05-22T18:16+09:00 Multiple vulnerabilities in Pleasanter https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000060.html Pleasanter provided by Implem Inc. contains multiple vulnerabilities listed below. * Stored cross-site scripting vulnerability (CWE-79) - CVE-2023-32607 * Directory traversal vulnerability (CWE-22) - CVE-2023-32608 Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to Implem Inc. and Implem Inc. reported them to IPA. JPCERT/CC and Implem Inc. coordinated under the Information Security Early Warning Partnership. JVNDB-2023-000060 http://jvn.jp/en/jp/JVN97818024/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32607 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32608 https://nvd.nist.gov/vuln/detail/CVE-2023-32607 https://nvd.nist.gov/vuln/detail/CVE-2023-32608 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:pleasanter:pleasanter 2024-05-07T14:10+09:00 2023-06-22T15:49+09:00 2024-05-07T14:10+09:00 SYNCK GRAPHICA Mailform Pro CGI vulnerable to Regular expression Denial-of-Service (ReDoS) https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000064.html Mailform Pro CGI provided by SYNCK GRAPHICA contains a Regular expression Denial-of-Service (ReDoS) vulnerability (CWE-1333). Tran Quang Vu of FPT Software reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000064 https://jvn.jp/en/jp/JVN70502982/index.html https://www.cve.org/CVERecord?id=CVE-2023-32610 https://nvd.nist.gov/vuln/detail/CVE-2023-32610 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:synck_graphica:mailform_pro_cgi 2024-04-26T18:03+09:00 2023-06-20T14:48+09:00 2024-04-26T18:03+09:00 Multiple vulnerabilities in Panasonic AiSEG2 https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000063.html Panasonic AiSEG2 contains multiple vulnerabilities listed below. * OS Command Injection (CWE-78) - CVE-2023-28726 * Improper Authentication (CWE-287) - CVE-2023-28727 Taku Toyama of NEC Corporation reported CVE-2023-28726 and CVE-2023-28727 vulnerabilities to Panasonic and coordinated. Panasonic and JPCERT/CC published respective advisories in order to notify users of the vulnerabilities. Yota Egusa of SAKURA internet Inc. reported CVE-2023-28727 vulnerability to IPA. JPCERT/CC coordinated with Panasonic under Information Security Early Warning Partnership. JVNDB-2023-000063 https://jvn.jp/en/jp/JVN19748237/index.html https://www.cve.org/CVERecord?id=CVE-2023-28726 https://www.cve.org/CVERecord?id=CVE-2023-28727 https://nvd.nist.gov/vuln/detail/CVE-2023-28726 https://nvd.nist.gov/vuln/detail/CVE-2023-28727 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:panasonic:aiseg2_firmware 2023-06-16T14:05+09:00 2023-06-16T14:05+09:00 2023-06-16T14:05+09:00 Printer Driver Packager NX creates driver installation packages without modification detection https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002111.html Printer Driver Packager NX provided by Ricoh Company, Ltd. is a tool to create driver installation packages. A driver installation package is used to install and configure printer drivers on the target PCs. The installation and configuration of printer drivers require an administrative privilege, and a created driver installation package can bundle administrative credentials in encrypted form enabling non-administrative users to install printer drivers without administrator's help. The driver installation package, created by the affected version of Printer Driver Packager NX, fails to detect its modification (CWE-345) and may spawn an unexpected process with the administrative privilege. Ricoh Company, Ltd. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2023-002111 https://jvn.jp/en/vu/JVNVU92207133/ https://www.cve.org/CVERecord?id=CVE-2023-30759 https://nvd.nist.gov/vuln/detail/CVE-2023-30759 https://cwe.mitre.org/data/definitions/345.html cpe:/a:ricoh:ridoc_ez_Installer_nx 2024-05-23T15:45+09:00 2023-06-15T16:06+09:00 2024-05-23T15:45+09:00 Security updates for multiple Trend Micro products for enterprises (June 2023) https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002100.html Trend Micro Incorporated has released security updates for multiple Trend Micro products for enterprises. For more details, refer to the information provided by the developer. Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2023-002100 https://jvn.jp/en/vu/JVNVU91852506/ https://jvn.jp/en/vu/JVNVU93384719/index.html https://www.cve.org/CVERecord?id=CVE-2023-32521 https://www.cve.org/CVERecord?id=CVE-2023-32522 https://www.cve.org/CVERecord?id=CVE-2023-32523 https://www.cve.org/CVERecord?id=CVE-2023-32524 https://www.cve.org/CVERecord?id=CVE-2023-32525 https://www.cve.org/CVERecord?id=CVE-2023-32526 https://www.cve.org/CVERecord?id=CVE-2023-32527 https://www.cve.org/CVERecord?id=CVE-2023-32528 https://www.cve.org/CVERecord?id=CVE-2023-30902 https://www.cve.org/CVERecord?id=CVE-2023-32552 https://www.cve.org/CVERecord?id=CVE-2023-32553 https://www.cve.org/CVERecord?id=CVE-2023-32554 https://www.cve.org/CVERecord?id=CVE-2023-32555 https://www.cve.org/CVERecord?id=CVE-2023-32556 https://www.cve.org/CVERecord?id=CVE-2023-32557 https://www.cve.org/CVERecord?id=CVE-2023-34144 https://www.cve.org/CVERecord?id=CVE-2023-34145 https://www.cve.org/CVERecord?id=CVE-2023-34146 https://www.cve.org/CVERecord?id=CVE-2023-34147 https://www.cve.org/CVERecord?id=CVE-2023-34148 https://www.cve.org/CVERecord?id=CVE-2023-32529 https://www.cve.org/CVERecord?id=CVE-2023-32530 https://www.cve.org/CVERecord?id=CVE-2023-32531 https://www.cve.org/CVERecord?id=CVE-2023-32532 https://www.cve.org/CVERecord?id=CVE-2023-32533 https://www.cve.org/CVERecord?id=CVE-2023-32534 https://www.cve.org/CVERecord?id=CVE-2023-32535 https://www.cve.org/CVERecord?id=CVE-2023-32536 https://www.cve.org/CVERecord?id=CVE-2023-32537 https://www.cve.org/CVERecord?id=CVE-2023-32604 https://www.cve.org/CVERecord?id=CVE-2023-32605 https://nvd.nist.gov/vuln/detail/CVE-2023-30902 https://nvd.nist.gov/vuln/detail/CVE-2023-32521 https://nvd.nist.gov/vuln/detail/CVE-2023-32522 https://nvd.nist.gov/vuln/detail/CVE-2023-32523 https://nvd.nist.gov/vuln/detail/CVE-2023-32524 https://nvd.nist.gov/vuln/detail/CVE-2023-32525 https://nvd.nist.gov/vuln/detail/CVE-2023-32526 https://nvd.nist.gov/vuln/detail/CVE-2023-32527 https://nvd.nist.gov/vuln/detail/CVE-2023-32528 https://nvd.nist.gov/vuln/detail/CVE-2023-32552 https://nvd.nist.gov/vuln/detail/CVE-2023-32553 https://nvd.nist.gov/vuln/detail/CVE-2023-32554 https://nvd.nist.gov/vuln/detail/CVE-2023-32555 https://nvd.nist.gov/vuln/detail/CVE-2023-32556 https://nvd.nist.gov/vuln/detail/CVE-2023-32557 https://nvd.nist.gov/vuln/detail/CVE-2023-34144 https://nvd.nist.gov/vuln/detail/CVE-2023-34145 https://nvd.nist.gov/vuln/detail/CVE-2023-34146 https://nvd.nist.gov/vuln/detail/CVE-2023-34147 https://nvd.nist.gov/vuln/detail/CVE-2023-32529 https://nvd.nist.gov/vuln/detail/CVE-2023-32530 https://nvd.nist.gov/vuln/detail/CVE-2023-32531 https://nvd.nist.gov/vuln/detail/CVE-2023-32532 https://nvd.nist.gov/vuln/detail/CVE-2023-32533 https://nvd.nist.gov/vuln/detail/CVE-2023-32534 https://nvd.nist.gov/vuln/detail/CVE-2023-32535 https://nvd.nist.gov/vuln/detail/CVE-2023-32536 https://nvd.nist.gov/vuln/detail/CVE-2023-32537 https://nvd.nist.gov/vuln/detail/CVE-2023-32604 https://nvd.nist.gov/vuln/detail/CVE-2023-32605 https://nvd.nist.gov/vuln/detail/CVE-2023-34148 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/367.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/426.html https://cwe.mitre.org/data/definitions/269.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:trendmicro:apex_central cpe:/a:trendmicro:apex_one cpe:/a:trendmicro:mobile_security 2024-05-23T15:23+09:00 2023-06-14T14:47+09:00 2024-05-23T15:23+09:00 Chatwork Desktop Application (Mac) vulnerable to code injection https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000061.html Chatwork Desktop Application (Mac) provided by Chatwork Co., Ltd. contains a code injection vulnerability (CWE-94). Koh M. Nakagawa of FFRI Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000061 https://jvn.jp/en/jp/JVN96828492/index.html https://www.cve.org/CVERecord?id=CVE-2023-32546 https://nvd.nist.gov/vuln/detail/CVE-2023-32546 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:chatwork:chatwork 2024-05-24T16:02+09:00 2023-06-13T13:38+09:00 2024-05-24T16:02+09:00 "WPS Office" vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000062.html "WPS Office" which was provided by KINGSOFT JAPAN, INC. contains an OS command injection vulnerability (CWE-78). JVNDB-2023-000062 https://jvn.jp/en/jp/JVN36060509/index.html https://www.cve.org/CVERecord?id=CVE-2023-32548 https://nvd.nist.gov/vuln/detail/CVE-2023-32548 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:kingsoft:kingsoft_wps_office 2024-04-18T17:49+09:00 2023-06-12T12:57+09:00 2024-04-18T17:49+09:00 ASUS Router RT-AX3000 vulnerable to using sensitive cookies without 'Secure' attribute https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000048.html ASUS Router RT-AX3000 provided by ASUSTeK COMPUTER INC. uses sensitive cookies without 'Secure' attribute (CWE-614). Shungo Kumasaka of GMO Cyber Security by IERAE reported this vulnerability to the developer and JPCERT/CC published respective advisories in order to notify users of this vulnerability. JVNDB-2023-000048 http://jvn.jp/en/jp/JVN34232595/index.html https://www.cve.org/CVERecord?id=CVE-2023-31195 https://nvd.nist.gov/vuln/detail/CVE-2023-31195 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/h:asus:asus_router_rt-ax3000 2024-04-18T17:44+09:00 2023-06-09T15:18+09:00 2024-04-18T17:44+09:00 Multiple vulnerabilities in Inaba Denki Sangyo Wi-Fi AP UNIT https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000059.html Wi-Fi AP UNIT provided by Inaba Denki Sangyo Co., Ltd. contains multiple vulnerabilities listed below. <ul> <li>Missing authentication for critical function (CWE-306) - CVE-2023-31196 <li>OS command injection (CWE-78) - CVE-2023-31198 <li>OS command injection (CWE-78) - CVE-2023-28392</ul> MASAHIRO IIDA of LAC Co., Ltd. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000059 http://jvn.jp/en/jp/JVN28412757/index.html http://jvn.jp/en/vu/JVNVU98968780/index.html https://www.cve.org/CVERecord?id=CVE-2023-31196 https://www.cve.org/CVERecord?id=CVE-2023-31198 https://www.cve.org/CVERecord?id=CVE-2023-28392 https://nvd.nist.gov/vuln/detail/CVE-2023-28392 https://nvd.nist.gov/vuln/detail/CVE-2023-31196 https://nvd.nist.gov/vuln/detail/CVE-2023-31198 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:inaba:ac-pd-wapu-p_firmware cpe:/o:inaba:ac-pd-wapum-p_firmware cpe:/o:inaba:ac-pd-wapum_firmware cpe:/o:inaba:ac-pd-wapu_firmware cpe:/o:inaba:ac-wapu-300-p_firmware cpe:/o:inaba:ac-wapu-300_firmware cpe:/o:inaba:ac-wapum-300-p_firmware cpe:/o:inaba:ac-wapum-300_firmware 2024-05-27T16:38+09:00 2023-06-09T15:18+09:00 2024-05-27T16:38+09:00 Multiple vulnerabilities in Fuji Electric products https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002072.html Multiple vulnerabilities listed below exist in the simulator module and the remote monitoring software 'V-Server Lite' and 'V-Server' contained in the graphic editor 'V-SFT', and the remote monitoring software 'TELLUS' and 'TELLUS Lite' provided by FUJI ELECTRIC CO., LTD. * Stack-based buffer overflow in V-Serve, V-Server Lite (CWE-121) - CVE-2023-31239 * Stack-based buffer overflow in TELLUS, TELLUS Lite (CWE-121) - CVE-2023-32538, CVE-2023-32273, CVE-2023-32201 * Out-of-bounds read in TELLUS, TELLUS Lite (CWE-125) - CVE-2023-32288 * Stack-based buffer overflow in TELLUS, TELLUS Lite (CWE-121) - CVE-2023-32276 * Access of memory location after end of buffer in TELLUS, TELLUS Lite (CWE-788) - CVE-2023-32270 * Out-of-bounds read in TELLUS, TELLUS Lite (CWE-125) - CVE-2023-32542 Michael Heinzl reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-002072 https://jvn.jp/en/vu/JVNVU98818508/index.html https://www.cve.org/CVERecord?id=CVE-2023-31239 https://www.cve.org/CVERecord?id=CVE-2023-32538 https://www.cve.org/CVERecord?id=CVE-2023-32273 https://www.cve.org/CVERecord?id=CVE-2023-32201 https://www.cve.org/CVERecord?id=CVE-2023-32288 https://www.cve.org/CVERecord?id=CVE-2023-32276 https://www.cve.org/CVERecord?id=CVE-2023-32270 https://www.cve.org/CVERecord?id=CVE-2023-32542 https://nvd.nist.gov/vuln/detail/CVE-2023-31239 https://nvd.nist.gov/vuln/detail/CVE-2023-32201 https://nvd.nist.gov/vuln/detail/CVE-2023-32270 https://nvd.nist.gov/vuln/detail/CVE-2023-32273 https://nvd.nist.gov/vuln/detail/CVE-2023-32276 https://nvd.nist.gov/vuln/detail/CVE-2023-32288 https://nvd.nist.gov/vuln/detail/CVE-2023-32538 https://nvd.nist.gov/vuln/detail/CVE-2023-32542 https://cwe.mitre.org/data/definitions/121.html https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/788.html cpe:/a:fujielectric:tellus cpe:/a:fujielectric:tellus_lite cpe:/a:fujielectric:v-server 2024-05-23T15:33+09:00 2023-06-09T12:23+09:00 2024-05-23T15:33+09:00 Multiple vulnerabilities in KbDevice digital video recorders https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002055.html Multiple digital video recorders provided by KbDevice,Inc. contain multiple vulnerabilities listed below. * Improper authentication (CWE-287) - CVE-2023-30762 * OS command injection (CWE-78) - CVE-2023-30764 * Hidden functionality (CWE-912) - CVE-2023-30766 Yoshiki Mori, Ushimaru Hayato, Hiromu Kubiura and Masaki Kubo of National Institute of Information and Communications Technology Cybersecurity Research Institute reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-002055 https://jvn.jp/en/vu/JVNVU90812349/index.html https://www.cve.org/CVERecord?id=CVE-2023-30762 https://www.cve.org/CVERecord?id=CVE-2023-30764 https://www.cve.org/CVERecord?id=CVE-2023-30766 https://nvd.nist.gov/vuln/detail/CVE-2023-30762 https://nvd.nist.gov/vuln/detail/CVE-2023-30764 https://nvd.nist.gov/vuln/detail/CVE-2023-30766 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/912.html cpe:/o:kbdevice:kb-ahr04d_firmware cpe:/o:kbdevice:kb-ahr08d_firmware cpe:/o:kbdevice:kb-ahr16d_firmware cpe:/o:kbdevice:kb-irip04a_firmware cpe:/o:kbdevice:kb-irip08a_firmware cpe:/o:kbdevice:kb-irip16a_firmware 2024-05-24T15:57+09:00 2023-06-07T11:52+09:00 2024-05-24T15:57+09:00 Multiple vulnerabilities in FUJI ELECTRIC FRENIC RHC Loader https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002022.html FRENIC RHC Loader provided by FUJI ELECTRIC CO., LTD. contains multiple vulnerabilities listed below. * Stack-based buffer overflow (CWE-121) - CVE-2023-29160 * Out-of-bounds read (CWE-125) - CVE-2023-29167 * Improper restriction of XML external entity reference (CWE-611) - CVE-2023-29498 Michael Heinzl reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-002022 https://jvn.jp/en/vu/JVNVU97809354/index.html https://www.cve.org/CVERecord?id=CVE-2023-29160 https://www.cve.org/CVERecord?id=CVE-2023-29167 https://www.cve.org/CVERecord?id=CVE-2023-29498 https://nvd.nist.gov/vuln/detail/CVE-2023-29160 https://nvd.nist.gov/vuln/detail/CVE-2023-29167 https://nvd.nist.gov/vuln/detail/CVE-2023-29498 https://cwe.mitre.org/data/definitions/121.html https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/611.html cpe:/a:fujielectric:frenic_rhc_loader 2024-04-18T17:40+09:00 2023-06-05T15:55+09:00 2024-04-18T17:40+09:00 "Jiyu Kukan Toku-Toku coupon" App vulnerable to improper server certificate verification https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000057.html "Jiyu Kukan Toku-Toku coupon" App provided by RUNSYSTEM CO.,LTD. is vulnerable to improper server certificate verification (CWE-295). Ryo Nihonyanagi of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000057 http://jvn.jp/en/jp/JVN33836375/index.html https://www.cve.org/CVERecord?id=CVE-2023-29501 https://nvd.nist.gov/vuln/detail/CVE-2023-29501 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:runsystem:jiyu_kukan_toku-toku_coupon 2024-05-23T17:19+09:00 2023-06-01T14:51+09:00 2024-05-23T17:19+09:00 Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002002.html CONPROSYS HMI System (CHS) provided by Contec Co., Ltd. contains multiple vulnerabilities listed below. * Plaintext storage of a password (CWE-256) - CVE-2023-28713 * Incorrect permission assignment for critical resource (CWE-732) - CVE-2023-28399 * Improper access control (CWE-284) - CVE-2023-28657 * Cross-site scripting (CWE-79) - CVE-2023-28651 * Server-side request forgery (CWE-918)- CVE-2023-28824 * SQL injection (CWE-89) - CVE-2023-29154 * Improper control of interaction frequency (CWE-799) - CVE-2023-2758 Michael Heinzl reported the vulnerabilities listed below to JPCERT/CC, and JPCERT/CC coordinated with the developer. CVE-2023-28713, CVE-2023-28399, CVE-2023-28657, CVE-2023-28651, CVE-2023-28824, CVE-2023-29154 Tenable, Inc. reported CVE-2023-2758 vulnerability to the developer, and based on the coordination request made by the developer, JPCERT/CC coordinated with Tenable, Inc. and the developer. JVNDB-2023-002002 https://jvn.jp/en/vu/JVNVU93372935/index.html https://www.cve.org/CVERecord?id=CVE-2023-28713 https://www.cve.org/CVERecord?id=CVE-2023-28399 https://www.cve.org/CVERecord?id=CVE-2023-28657 https://www.cve.org/CVERecord?id=CVE-2023-28651 https://www.cve.org/CVERecord?id=CVE-2023-28824 https://www.cve.org/CVERecord?id=CVE-2023-29154 https://www.cve.org/CVERecord?id=CVE-2023-2758 https://nvd.nist.gov/vuln/detail/CVE-2023-2758 https://nvd.nist.gov/vuln/detail/CVE-2023-28399 https://nvd.nist.gov/vuln/detail/CVE-2023-28651 https://nvd.nist.gov/vuln/detail/CVE-2023-28657 https://nvd.nist.gov/vuln/detail/CVE-2023-28713 https://nvd.nist.gov/vuln/detail/CVE-2023-28824 https://nvd.nist.gov/vuln/detail/CVE-2023-29154 https://cwe.mitre.org/data/definitions/256.html https://cwe.mitre.org/data/definitions/284.html https://cwe.mitre.org/data/definitions/732.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/799.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/918.html cpe:/a:contec:conprosys_hmi_system 2024-03-19T18:13+09:00 2023-06-01T13:48+09:00 2024-03-19T18:13+09:00 DataSpider Servista uses a hard-coded cryptographic key https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000052.html DataSpider Servista provided by SAISON INFORMATION SYSTEMS CO.,LTD. is a data integration software. ScriptRunner and ScriptRunner for Amazon SQS are used to start the configured processes on DataSpider Servista. The cryptographic key is embedded in ScriptRunner and ScriptRunner for Amazon SQS, which is common to all users (CWE-321). Sato Nobuhiro of Suzuki Motor Corporation and You Okuma of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000052 https://jvn.jp/en/jp/JVN38222042/index.html https://www.cve.org/CVERecord?id=CVE-2023-28937 https://nvd.nist.gov/vuln/detail/CVE-2023-28937 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:saison:dataspider_servista 2024-03-19T17:44+09:00 2023-05-31T15:34+09:00 2024-03-19T17:44+09:00 Pleasanter vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000058.html Pleasanter provided by Implem Inc. contains a cross-site scripting vulnerability (CWE-79). Kentaro Ishii of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to Implem Inc. and Implem Inc. reported it to IPA. JPCERT/CC and Implem Inc. coordinated under the Information Security Early Warning Partnership. JVNDB-2023-000058 http://jvn.jp/en/jp/JVN62111727/index.html https://www.cve.org/CVERecord?id=CVE-2023-30758 https://nvd.nist.gov/vuln/detail/CVE-2023-30758 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:pleasanter:pleasanter 2024-03-19T18:17+09:00 2023-05-31T15:34+09:00 2024-03-19T18:17+09:00 Starlette vulnerable to directory traversal https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000056.html Starlette provided by Encode contains a directory traversal vulnerability (CWE-22). Masashi Yamane of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000056 http://jvn.jp/en/jp/JVN95981715/index.html https://www.cve.org/CVERecord?id=CVE-2023-29159 https://nvd.nist.gov/vuln/detail/CVE-2023-29159 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:encode:starlette 2024-03-19T18:08+09:00 2023-05-30T13:34+09:00 2024-03-19T18:08+09:00 ESS REC Agent Server Edition for Linux etc. vulnerable to directory traversal https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000055.html ESS REC Agent Server Edition for Linux etc. provided by Encourage Technologies Co.,Ltd. contain a directory traversal vulnerability (CWE-23). Hayato Ushimaru of Cyber Defense Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000055 https://jvn.jp/en/jp/JVN19243534/index.html https://www.cve.org/CVERecord?id=CVE-2023-28382 https://nvd.nist.gov/vuln/detail/CVE-2023-28382 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:et-x:ess_rec 2024-03-21T17:15+09:00 2023-05-26T13:58+09:00 2024-03-21T17:15+09:00 Wacom Tablet Driver installer for macOS vulnerable to improper link resolution before file access https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000054.html Wacom Tablet Driver installer for macOS provided by Wacom contains an improper link resolution before file access vulnerability (CWE-59). Koh M. Nakagawa reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000054 https://jvn.jp/en/jp/JVN90278893/index.html https://www.cve.org/CVERecord?id=CVE-2023-27529 https://nvd.nist.gov/vuln/detail/CVE-2023-27529 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:wacom:wacom_tablet_driver 2023-05-25T13:40+09:00 2023-05-25T13:40+09:00 2023-05-25T13:40+09:00 Cross-site Scripting Vulnerability in Hitachi Ops Center Analyzer https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001926.html A Cross-site Scripting Vulnerability exists in Hitachi Ops Center Analyzer. JVNDB-2023-001926 https://www.cve.org/CVERecord?id=CVE-2023-30469 https://nvd.nist.gov/vuln/detail/CVE-2023-30469 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:ops_center_analyzer 2024-05-24T17:01+09:00 2023-05-24T11:40+09:00 2024-05-24T17:01+09:00 Tornado vulnerable to open redirect https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000053.html Tornado provided by tornadoweb contains a vulnerability that triggers open redirect (CWE-601) under certain non-default configurations. Masashi Yamane of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000053 https://jvn.jp/en/jp/JVN45127776/index.html https://www.cve.org/CVERecord?id=CVE-2023-28370 https://nvd.nist.gov/vuln/detail/CVE-2023-28370 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:tornadoweb:tornado 2024-03-21T17:05+09:00 2023-05-22T13:30+09:00 2024-03-21T17:05+09:00 Android App "Brother iPrint&Scan" vulnerable to improper access control https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001894.html Android App "Brother iPrint&Scan" provided by BROTHER INDUSTRIES, LTD. contains an improper access control vulnerability (CWE-284, CVE-2023-28369). Johan Francsics reported this vulnerability to BROTHER INDUSTRIES, LTD. and coordinated. After the coordination, BROTHER INDUSTRIES, LTD. reported this case to JPCERT/CC to notify users of its solution through JVN. JVNDB-2023-001894 https://jvn.jp/en/vu/JVNVU97891206/ https://www.cve.org/CVERecord?id=CVE-2023-28369 https://nvd.nist.gov/vuln/detail/CVE-2023-28369 https://cwe.mitre.org/data/definitions/284.html cpe:/a:brother:iprint%26scan 2023-05-19T15:40+09:00 2023-05-19T15:40+09:00 2023-05-19T15:40+09:00 Multiple vulnerabilities in T&D and ESPEC MIC data logger products https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000051.html Multiple data logger products provided by T&D Corporation and ESPEC MIC CORP. contain multiple vulnerabilities listed below. * Client-side enforcement of server-side security (CWE-602) - CVE-2023-22654 * Improper authentication (CWE-287) - CVE-2023-27388 * Missing authentication for critical function (CWE-306) - CVE-2023-23545 * Cross-site request forgery (CWE-352) - CVE-2023-27387 CVE-2023-22654 Takaya Noma, Tomoya Inazawa, Yudai Morii, Junnosuke Kushibiki, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-27388 Tomoya Inazawa, Takaya Noma, Yudai Morii, Junnosuke Kushibiki, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-23545 Yudai Morii, Takaya Noma, Tomoya Inazawa, Junnosuke Kushibiki, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-27387 Junnosuke Kushibiki, Takaya Noma, Tomoya Inazawa, Yudai Morii, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000051 https://jvn.jp/en/jp/JVN14778242/index.html https://www.cve.org/CVERecord?id=CVE-2023-23545 https://www.cve.org/CVERecord?id=CVE-2023-22654 https://www.cve.org/CVERecord?id=CVE-2023-27387 https://www.cve.org/CVERecord?id=CVE-2023-27388 https://nvd.nist.gov/vuln/detail/CVE-2023-22654 https://nvd.nist.gov/vuln/detail/CVE-2023-23545 https://nvd.nist.gov/vuln/detail/CVE-2023-27387 https://nvd.nist.gov/vuln/detail/CVE-2023-27388 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:especmic:rs-12n_firmware cpe:/o:especmic:rt-12n_firmware cpe:/o:especmic:rt-22bn_firmware cpe:/o:especmic:teu-12n_firmware cpe:/o:tandd:rtr-5w_firmware cpe:/o:tandd:tr-71w_firmware cpe:/o:tandd:tr-72w_firmware cpe:/o:tandd:wdr-3_firmware cpe:/o:tandd:wdr-7_firmware cpe:/o:tandd:ws-2_firmware 2024-05-23T17:03+09:00 2023-05-19T15:21+09:00 2024-05-23T17:03+09:00 Qrio Smart Lock Q-SL2 vulnerable to authentication bypass by capture-replay https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000026.html Qrio Smart Lock Q-SL2 provided by Qrio, inc. contains an authentication bypass by capture-replay vulnerability (CWE-294). Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000026 https://jvn.jp/en/jp/JVN48687031/index.html https://www.cve.org/CVERecord?id=CVE-2023-25946 https://nvd.nist.gov/vuln/detail/CVE-2023-25946 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:qrio:q-sl2_firmware 2024-05-23T17:18+09:00 2023-05-18T14:13+09:00 2024-05-23T17:18+09:00 OS command injection vulnerability in Inaba Denki Sangyo Wi-Fi AP UNIT https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001852.html Wi-Fi AP UNIT provided by Inaba Denki Sangyo Co., Ltd. contains an OS command injection vulnerability (CWE-78). Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-001852 https://jvn.jp/en/vu/JVNVU98968780/index.html https://www.cve.org/CVERecord?id=CVE-2023-28392 https://nvd.nist.gov/vuln/detail/CVE-2023-28392 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:inaba:ac-wapu-300-p_firmware cpe:/o:inaba:ac-wapu-300_firmware cpe:/o:inaba:ac-wapum-300-p_firmware cpe:/o:inaba:ac-wapum-300_firmware 2023-05-17T15:09+09:00 2023-05-17T15:09+09:00 2023-05-17T15:09+09:00 Multiple vulnerabilities in Cybozu Garoon https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000049.html Cybozu Garoon provided by Cybozu, Inc. contains multiple vulnerabilities listed below. * [CyVDB-3122] Denial-of-service (DoS) in Message (CWE-400) - CVE-2023-26595 * [CyVDB-3142] Operation restriction bypass vulnerability in Message and Bulletin (CWE-285) - CVE-2023-27304 * [CyVDB-3165] Operation restriction bypass vulnerability in MultiReport (CWE-284) - CVE-2023-27384 CVE-2023-27384 Yuji Tounai reported this vulnerability to Cybozu, Inc. and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN. CVE-2023-26595, CVE-2023-27304 Cybozu, Inc. reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2023-000049 https://jvn.jp/en/jp/JVN41694426/index.html https://www.cve.org/CVERecord?id=CVE-2023-26595 https://www.cve.org/CVERecord?id=CVE-2023-27304 https://www.cve.org/CVERecord?id=CVE-2023-27384 https://nvd.nist.gov/vuln/detail/CVE-2023-26595 https://nvd.nist.gov/vuln/detail/CVE-2023-27304 https://nvd.nist.gov/vuln/detail/CVE-2023-27384 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:cybozu:garoon 2024-05-24T15:26+09:00 2023-05-15T14:29+09:00 2024-05-24T15:26+09:00 Multiple vulnerabilities in WordPress Plugin "MW WP Form" and "Snow Monkey Forms" https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000050.html WordPress Plugin "MW WP Form" and "Snow Monkey Forms" provided by Monkey Wrench Inc. contain multiple vulnerabilities listed below. * Directory traversal (CWE-22) - CVE-2023-28408 * Unrestricted upload of file with dangerous type (CWE-434) - CVE-2023-28409 * Directory traversal (CWE-22) - CVE-2023-28413 CVE-2023-28408 Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-28409 Shuya Ota of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-28413 Monkey Wrench Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2023-000050 https://jvn.jp/en/jp/JVN01093915/index.html https://www.cve.org/CVERecord?id=CVE-2023-28408 https://www.cve.org/CVERecord?id=CVE-2023-28409 https://www.cve.org/CVERecord?id=CVE-2023-28413 https://nvd.nist.gov/vuln/detail/CVE-2023-28408 https://nvd.nist.gov/vuln/detail/CVE-2023-28409 https://nvd.nist.gov/vuln/detail/CVE-2023-28413 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:2inc:mw_wp_form cpe:/a:2inc:snow_monkey_forms 2024-05-29T16:27+09:00 2023-05-15T14:29+09:00 2024-05-29T16:27+09:00 Beekeeper Studio vulnerable to code injection https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000047.html Beekeeper Studio provided by Beekeeper Studio, Inc. contains a code injection vulnerability (CWE-74). Eiji Mori of Flatt Security Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000047 https://jvn.jp/en/jp/JVN11705010/index.html https://www.cve.org/CVERecord?id=CVE-2023-28394 https://nvd.nist.gov/vuln/detail/CVE-2023-28394 https://cwe.mitre.org/data/definitions/74.html cpe:/a:beekeeperstudio:beekeeper-studio 2024-05-24T16:17+09:00 2023-05-12T16:42+09:00 2024-05-24T16:17+09:00 Multiple vulnerabilities in MicroEngine Mailform https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000043.html MicroEngine Mailform provided by MicroEngine Inc. contains multiple vulnerabilities listed below.<ul><li>Unrestricted upload of file with dangerous type (CWE-434) - CVE-2023-27397</li><li>Path traversal (CWE-22) - CVE-2023-27507</li></ul>Yuji Tounai of Mitsui Bussan Secure Directions, Inc. and hibiki moriyama of STNet, Incorporated reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000043 http://jvn.jp/en/jp/JVN31701509/index.html https://www.cve.org/CVERecord?id=CVE-2023-27397 https://www.cve.org/CVERecord?id=CVE-2023-27507 https://nvd.nist.gov/vuln/detail/CVE-2023-27397 https://nvd.nist.gov/vuln/detail/CVE-2023-27507 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:microengine:mailform 2024-05-24T17:07+09:00 2023-05-10T13:57+09:00 2024-05-24T17:07+09:00 Multiple vulnerabilities in SolarView Compact https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001774.html SolarView Compact provided by CONTEC CO.,LTD. contains multiple vulnerabilities listed below. * Use of hard-coded credentials (CWE-798) - CVE-2023-27512 * OS command injection in the download page (CWE-78) - CVE-2023-27514 * Buffer overflow in the multiple setting pages (CWE-120) - CVE-2023-27518 * OS command injection in the mail setting page (CWE-78) - CVE-2023-27521 * Improper access control in the system date/time setting page (CWE-284) - CVE-2023-27920 CVE-2023-27512, CVE-2023-27514, CVE-2023-27518, CVE-2023-27521 Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. CVE-2023-27920 CONTEC CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solutions through JVN. JVNDB-2023-001774 https://jvn.jp/en/vu/JVNVU92106300/index.html https://www.cve.org/CVERecord?id=CVE-2023-27512 https://www.cve.org/CVERecord?id=CVE-2023-27514 https://www.cve.org/CVERecord?id=CVE-2023-27518 https://www.cve.org/CVERecord?id=CVE-2023-27521 https://www.cve.org/CVERecord?id=CVE-2023-27920 https://nvd.nist.gov/vuln/detail/CVE-2023-27512 https://nvd.nist.gov/vuln/detail/CVE-2023-27514 https://nvd.nist.gov/vuln/detail/CVE-2023-27518 https://nvd.nist.gov/vuln/detail/CVE-2023-27521 https://nvd.nist.gov/vuln/detail/CVE-2023-27920 https://cwe.mitre.org/data/definitions/120.html https://cwe.mitre.org/data/definitions/284.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/798.html cpe:/o:contec:sv-cpt-mc310f_firmware cpe:/o:contec:sv-cpt-mc310_firmware 2024-06-27T13:30+09:00 2023-05-09T16:09+09:00 2024-06-27T13:30+09:00 WordPress Plugin "VK Blocks" and "VK All in One Expansion Unit" vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000045.html WordPress Plugin "VK Blocks" and "VK All in One Expansion Unit" provided by Vektor,Inc. contain multiple cross-site scripting vulnerabilities (CWE-79) listed below.<ul><li>Cross-site scripting vulnerability in Tag edit function - CVE-2023-27923</li><li>Cross-site scripting vulnerability in Post function - CVE-2023-27925</li><li>Cross-site scripting vulnerability in Profile setting function - CVE-2023-27926</li><li>Cross-site scripting vulnerability in CTA post function - CVE-2023-28367</li></ul>apple502j reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000045 http://jvn.jp/en/jp/JVN95792402/index.html https://www.cve.org/CVERecord?id=CVE-2023-27923 https://www.cve.org/CVERecord?id=CVE-2023-27925 https://www.cve.org/CVERecord?id=CVE-2023-27926 https://www.cve.org/CVERecord?id=CVE-2023-28367 https://nvd.nist.gov/vuln/detail/CVE-2023-27923 https://nvd.nist.gov/vuln/detail/CVE-2023-27925 https://nvd.nist.gov/vuln/detail/CVE-2023-27926 https://nvd.nist.gov/vuln/detail/CVE-2023-28367 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:vektor-inc:vk_all_in_one_expansion_unit cpe:/a:vektor-inc:vk_blocks cpe:/a:vektor-inc:vk_blocks_pro 2024-05-24T17:05+09:00 2023-05-09T15:14+09:00 2024-05-24T17:05+09:00 WordPress Plugin "Newsletter" vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000042.html WordPress Plugin "Newsletter" provided by Stefano Lissa & The Newsletter Team contains a cross-site scripting vulnerability (CWE-79). Gen Sato of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to the developer and coordinated. JPCERT/CC published respective advisories in order to notify users of this vulnerability. JVNDB-2023-000042 http://jvn.jp/en/jp/JVN59341308/index.html https://www.cve.org/CVERecord?id=CVE-2023-27922 https://nvd.nist.gov/vuln/detail/CVE-2023-27922 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:thenewsletterplugin:newsletter 2024-06-13T16:14+09:00 2023-05-09T14:42+09:00 2024-06-13T16:14+09:00 SR-7100VN vulnerable to privilege escalation https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000046.html SR-7100VN provided by ICOM INCORPORATED contains a privilege escalation vulnerability (CWE-268). HAMANO Kiyoto of SOUM Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000046 http://jvn.jp/en/jp/JVN80476232/index.html https://www.cve.org/CVERecord?id=CVE-2023-28390 https://nvd.nist.gov/vuln/detail/CVE-2023-28390 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:icom:sr-7100vn%2331_firmware cpe:/o:icom:sr-7100vn_firmware 2024-05-24T16:13+09:00 2023-05-09T13:58+09:00 2024-05-24T16:13+09:00 LINE WORKS Drive Explorer vulnerable to code injection https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000041.html LINE WORKS Drive Explorer provided by WORKS MOBILE Japan Corp. contains a code injection vulnerability (CWE-94). Koh M. Nakagawa reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000041 http://jvn.jp/en/jp/JVN01937209/index.html https://www.cve.org/CVERecord?id=CVE-2023-25953 https://nvd.nist.gov/vuln/detail/CVE-2023-25953 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:worksmobile:drive_explorer 2024-05-23T17:03+09:00 2023-05-08T15:16+09:00 2024-05-23T17:03+09:00 JINS MEME CORE uses a hard-coded cryptographic key https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000044.html JINS MEME CORE provided by JINS Inc. is a nose pad type sensor attached to a glass frame. JINS MEME CORE uses a hard-coded cryptographic key (CWE-321). MASAHIRO IIDA of LAC Co.,Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000044 http://jvn.jp/en/jp/JVN13306058/index.html https://www.cve.org/CVERecord?id=CVE-2023-27921 https://nvd.nist.gov/vuln/detail/CVE-2023-27921 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:jins:jins_meme_firmware 2024-06-13T16:19+09:00 2023-05-08T15:13+09:00 2024-06-13T16:19+09:00 Heap-based buffer overflow vulnerability in OMRON CX-Drive https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001639.html CX-Drive provided by OMRON Corporation contains a heap-based buffer overflow vulnerability (CWE-122, CVE-2023-27385). Michael Heinzl reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-001639 http://jvn.jp/en/vu/JVNVU97372625/index.html https://www.cve.org/CVERecord?id=CVE-2023-27385 https://nvd.nist.gov/vuln/detail/CVE-2023-27385 https://cwe.mitre.org/data/definitions/122.html cpe:/a:omron:cx-drive 2024-05-27T18:11+09:00 2023-04-25T14:31+09:00 2024-05-27T18:11+09:00 WordPress Plugin "Appointment and Event Booking Calendar for WordPress - Amelia" vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000040.html WordPress Plugin "Appointment and Event Booking Calendar for WordPress - Amelia" provided by TMS contains a cross-site scripting vulnerability (CWE-79). Gen Sato of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to the developer and coordinated. The developer and JPCERT/CC published respective advisories in order to notify users of this vulnerability. JVNDB-2023-000040 http://jvn.jp/en/jp/JVN00971105/index.html https://www.cve.org/CVERecord?id=CVE-2023-27918 https://nvd.nist.gov/vuln/detail/CVE-2023-27918 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:tms-outsource:amelia 2024-05-28T16:59+09:00 2023-04-24T13:41+09:00 2024-05-28T16:59+09:00 Improper restriction of XML external entity references (XXE) in Shinseiyo Sogo Soft https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000035.html Shinseiyo Sogo Soft provided by The Ministry of Justice improperly restricts XML external entity references (XXE) (CWE-611). Taku Toyama of NEC Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000035 https://jvn.jp/en/jp/JVN73178249/index.html https://www.cve.org/CVERecord?id=CVE-2023-27527 https://nvd.nist.gov/vuln/detail/CVE-2023-27527 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:moj:shinseiyo_sogo_soft 2024-05-29T16:58+09:00 2023-04-19T14:49+09:00 2024-05-29T16:58+09:00 WordPress plugin "LIQUID SPEECH BALLOON" vulnerable to cross-site request forgery https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000039.html WordPress plugin "LIQUID SPEECH BALLOON" provided by LIQUID DESIGN Ltd. contains a cross-site request forgery vulnerability (CWE-352). Ryo Sato of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000039 https://jvn.jp/en/jp/JVN99657911/index.html https://www.cve.org/CVERecord?id=CVE-2023-27889 https://nvd.nist.gov/vuln/detail/CVE-2023-27889 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:lqd:liquid_speech_balloon 2024-05-28T16:56+09:00 2023-04-19T14:24+09:00 2024-05-28T16:56+09:00 EC-CUBE plugin "NEXT ENGINE Integration Plugin (for EC-CUBE 2.0 series)" vulnerable to authentication bypass https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000038.html EC-CUBE plugin "NEXT ENGINE Integration Plugin (for EC-CUBE 2.0 series)" provided by NE Inc. contains an authentication bypass vulnerability (CWE-287). TSUKADA Nobuhisa of Seasoft reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000038 https://jvn.jp/en/jp/JVN50862842/index.html https://www.cve.org/CVERecord?id=CVE-2023-27919 https://nvd.nist.gov/vuln/detail/CVE-2023-27919 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:next-engine:next_engine_integration 2024-05-30T15:11+09:00 2023-04-19T14:06+09:00 2024-05-30T15:11+09:00 Security Issues in FINS protocol https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001534.html FINS (Factory Interface Network Service) is a message communication protocol, which is designed to be used in closed FA (Factory Automation) networks, and is used in FA networks composed of Omron products. FINS commands enable to read/write information, conduct various operations and set the configuration on FINS-compliant devices. The supported FINS commands vary depending on the products. * I/O memory area read/write * Parameter area read/write * Program area read/write * Manage operation mode * System configuration read * CPU unit status read * Time information access * Message read/delete * Manage access privileges * Read fault history report, etc. * File operation * Forced set/reset FINS message consists of "FINS header", "FINS command code" and "parameter". When receiving a FINS command message, the entity conducts the operation corresponding to the "FINS command code", and sends the result as a response message to the destinations listed in "FINS header" of the command message. FINS protocol is designed with the assumptions that the network is closed inside the device, the production lines, or within the factory, and does not provide any encryption, data verification, nor authentication functions. Recent security researches show multiple issues on FINS protocol, under the conditions which FINS protocol does not consider, e.g., a FINS network is connected to other outside networks, FINS network can be physically accessed, etc. The following issues on FINS protocol have been reported: 1. Plaintext communication Encrypted communication is not defined in FINS protocol. FINS messages are transmitted unencrypted and the contents can be seen easily when intercepted. Also alterations of FINS messages cannot be detected. * Clear-text Transmission of Sensitive Information (CWE-319) * Insufficient Verification of Data Authenticity (CWE-345) 2. No authentication required Authentication is not defined in FINS protocol. Attacks from malicious devices cannot be detected. * Authentication Bypass by Spoofing (CWE-290) * Authentication Bypass by Capture-replay (CWE-294) * Missing Authentication for Critical Function (CWE-306) * Insufficient Verification of Data Authenticity (CWE-345) * Uncontrolled Resource Consumption (CWE-400) * Unrestricted Externally Accessible Lock(CWE-412) * Improper Control of Interaction Frequency (CWE-799) This document is written by Omron and JPCERT/CC. JVNDB-2023-001534 https://jvn.jp/en/ta/JVNTA91513661/ https://www.cve.org/CVERecord?id=CVE-2023-27396 https://nvd.nist.gov/vuln/detail/CVE-2023-27396 https://www.cisa.gov/news-events/ics-advisories/icsa-20-063-03 https://www.cisa.gov/news-events/ics-advisories/icsa-19-346-02 https://www.cisa.gov/news-events/ics-advisories/icsa-22-179-02 https://cwe.mitre.org/data/definitions/290.html https://cwe.mitre.org/data/definitions/294.html https://cwe.mitre.org/data/definitions/306.html https://cwe.mitre.org/data/definitions/319.html https://cwe.mitre.org/data/definitions/345.html https://cwe.mitre.org/data/definitions/400.html https://cwe.mitre.org/data/definitions/412.html https://cwe.mitre.org/data/definitions/799.html cpe:/o:omron:sysmac_cj_series_cpu_unit cpe:/o:omron:sysmac_cp_series_cpu_unit cpe:/o:omron:sysmac_cs_series_cpu_unit cpe:/o:omron:sysmac_nj_series_cpu_unit cpe:/o:omron:sysmac_nx102_series_cpu_unit cpe:/o:omron:sysmac_nx1p_series_cpu_unit cpe:/o:omron:sysmac_nx7_database_connection_cpu_unit 2024-05-23T17:35+09:00 2023-04-18T13:58+09:00 2024-05-23T17:35+09:00 Joruri Gw vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000037.html Joruri Gw provided by SiteBridge Inc. is groupware. Message Memo function of Joruri Gw contains a cross-site scripting vulnerability (CWE-79). Tsutomu Aramaki of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000037 https://jvn.jp/en/jp/JVN87559956/index.html https://www.cve.org/CVERecord?id=CVE-2023-27888 https://nvd.nist.gov/vuln/detail/CVE-2023-27888 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:sitebridge:joruri_gw 2024-05-30T16:19+09:00 2023-04-17T14:19+09:00 2024-05-30T16:19+09:00 API server of TONE Family vulnerable to authentication bypass using an alternate path https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000036.html API server of TONE Family provided by DREAM TRAIN INTERNET INC. contains an authentication bypass vulnerability using an alternate path (CWE-288). Kodai Karakawa reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000036 https://jvn.jp/en/jp/JVN14492006/index.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:dream_train_internet_tone_family 2023-04-17T14:04+09:00 2023-04-17T14:04+09:00 2023-04-17T14:04+09:00 JB Inquiry form vulnerable to exposure of private personal information to an unauthorized actor https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000034.html JB Inquiry form provided by Jubei Inc. contains an exposure of private personal information to an unauthorized actor vulnerability (CWE-359). Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000034 https://jvn.jp/en/jp/JVN36340790/index.html https://www.cve.org/CVERecord?id=CVE-2023-27510 https://nvd.nist.gov/vuln/detail/CVE-2023-27510 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:jubei:jb_inquiry_form cpe:/a:jubei:jb_inquiry_form cpe:/a:jubei:jb_inquiry_form cpe:/a:jubei:jb_inquiry_form 2024-05-29T16:44+09:00 2023-04-14T15:48+09:00 2024-05-29T16:44+09:00 Trend Micro Security may insecurely load Dynamic Link Libraries https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000033.html Trend Micro Security provided by Trend Micro Incorporated contains an insecure DLL loading issue (CWE-427). While the affected version of Trend Micro Security is installed and a malicious DLL is placed in a directory where some application executable resides, invoking the application executable may result in Trend Micro Security loading the malicious DLL. Rintaro Fujita of Nippon Telegraph and Telephone Corporation, Hiroki Hada of NTT Security (Japan) KK and Hiroki Mashiko of NTT DATA Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000033 https://jvn.jp/en/jp/JVN76257155/index.html https://jvn.jp/en/ta/JVNTA91240916/ https://www.cve.org/CVERecord?id=CVE-2023-28929 https://nvd.nist.gov/vuln/detail/CVE-2023-28929 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:trendmicro:security 2024-04-26T17:48+09:00 2023-04-14T15:44+09:00 2024-04-26T17:48+09:00 Multiple mobile printing apps for Android vulnerable to improper intent handling https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001493.html Multiple mobile printing apps for Android are vulnerable to improper intent handling (CWE-668). Johan Francsics reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-001493 https://jvn.jp/en/vu/JVNVU98434809/ https://www.cve.org/CVERecord?id=CVE-2023-25954 https://nvd.nist.gov/vuln/detail/CVE-2023-25954 https://cwe.mitre.org/data/definitions/668.html cpe:/a:misc:kyocera_document_solutions_android_kyocera_mobile_print cpe:/a:olivetti:mobile_print cpe:/a:triumph-adler:mobile_print 2024-05-30T15:48+09:00 2023-04-13T11:09+09:00 2024-05-30T15:48+09:00 Vulnerability in JP1/VERITAS https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001492.html A vulnerability (VTS23-003) exists in JP1/VERITAS. JVNDB-2023-001492 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:jp1_veritas_netbackup cpe:/a:veritas:netbackup 2023-04-12T15:01+09:00 2023-04-12T15:01+09:00 2023-04-12T15:01+09:00 Yokogawa Electric CENTUM series vulnerable to cleartext storage of sensitive information https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001411.html CENTUM series provided by Yokogawa Electric Corporation are vulnerable to cleartext storage of sensitive information (CWE-312, CVE-2023-26593). Yokogawa Electric Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2023-001411 https://jvn.jp/en/vu/JVNVU98775218/index.html https://www.cve.org/CVERecord?id=CVE-2023-26593 https://nvd.nist.gov/vuln/detail/CVE-2023-26593 https://cwe.mitre.org/data/definitions/312.html cpe:/a:yokogawa:b%2fm9000cs cpe:/a:yokogawa:b%2fm9000_vp cpe:/a:yokogawa:centum_cs_1000 cpe:/a:yokogawa:centum_cs_3000 cpe:/a:yokogawa:centum_vp 2024-05-29T18:23+09:00 2023-04-06T14:59+09:00 2024-05-29T18:23+09:00 Multiple vulnerabilities in JustSystems products https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000031.html Multiple products provided by JustSystems Corporation contain multiple vulnerabilities listed below. <ul><li>Use After Free (CWE-416) - CVE-2022-43664</li> <li>Heap-based Buffer Overflow (CWE-122) - CVE-2022-45115</li> <li>Free of Memory not on the Heap (CWE-590) - CVE-2023-22291</li> <li>Heap-based Buffer Overflow (CWE-122) - CVE-2023-22660</li></ul> Cisco Talos Security Intelligence & Research Group reported these vulnerabilities to JustSystems Corporation and coordinated. JustSystems Corporation and JPCERT/CC published respective advisories in order to notify users of the solutions through JVN. JVNDB-2023-000031 http://jvn.jp/en/jp/JVN79149117/index.html https://www.cve.org/CVERecord?id=CVE-2022-43664 https://www.cve.org/CVERecord?id=CVE-2022-45115 https://www.cve.org/CVERecord?id=CVE-2023-22291 https://www.cve.org/CVERecord?id=CVE-2023-22660 https://nvd.nist.gov/vuln/detail/CVE-2022-43664 https://nvd.nist.gov/vuln/detail/CVE-2022-45115 https://nvd.nist.gov/vuln/detail/CVE-2023-22291 https://nvd.nist.gov/vuln/detail/CVE-2023-22660 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:justsystems:hanako cpe:/a:justsystems:homepage_builder_21 cpe:/a:justsystems:ichitaro cpe:/a:justsystems:just_government cpe:/a:justsystems:just_office cpe:/a:justsystems:just_police cpe:/a:justsystems:label_mighty cpe:/a:justsystems:rakuraku_hagaki 2024-05-29T17:32+09:00 2023-04-04T15:22+09:00 2024-05-29T17:32+09:00 Improper restriction of XML external entity references (XXE) in National land numerical information data conversion tool https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000032.html National land numerical information data conversion tool provided by MLIT improperly restricts XML external entity references (XXE) (CWE-611). Taku Toyama and Kohei Matsumoto of NEC Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000032 http://jvn.jp/en/jp/JVN75742861/index.html https://www.cve.org/CVERecord?id=CVE-2023-25955 https://nvd.nist.gov/vuln/detail/CVE-2023-25955 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:mlit:national_land_numerical_information_data_conversion_tool 2024-06-04T15:56+09:00 2023-04-04T15:22+09:00 2024-06-04T15:56+09:00 JTEKT ELECTRONIC Screen Creator Advance 2 vulnerable to improper restriction of operations within the bounds of a memory buffer https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001402.html Screen Creator Advance 2 provided by JTEKT ELECTRONICS CORPORATION is vulnerable to improper restriction of operations within the bounds of a memory buffer (CWE-119) due to improper check of its data size when processing a project file. Michael Heinzl reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-001402 https://jvn.jp/en/vu/JVNVU99710864/index.html https://www.cve.org/CVERecord?id=CVE-2023-25755 https://nvd.nist.gov/vuln/detail/CVE-2023-25755 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:jtekt:screen_creator_advance_2 2024-06-04T17:15+09:00 2023-04-03T16:24+09:00 2024-06-04T17:15+09:00 CONPROSYS HMI System(CHS) vulnerable to SQL injection https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001400.html CONPROSYS HMI System(CHS) provided by Contec Co., Ltd. contains an SQL injection vulnerability (CWE-89, CVE-2023-1658). Tenable Network Security reported this vulnerability to the developer. JPCERT/CC coordinated with the reporter and the developer. JVNDB-2023-001400 https://jvn.jp/en/vu/JVNVU92145493/index.html https://www.cve.org/CVERecord?id=CVE-2023-1658 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:contec:conprosys_hmi_system 2023-04-03T16:19+09:00 2023-04-03T16:19+09:00 2023-04-03T16:19+09:00 Multiple vulnerabilities in Seiko Solutions SkyBridge MB-A100/A110/A200/A130 SkySpider MB-R210 https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000029.html SkyBridge MB-A100/A110/A200/A130 SkySpider MB-R210 provided by Seiko Solutions Inc. contain multiple vulnerabilities listed below. <ul> <li>Exposure of sensitive information to an unauthorized actor (CWE-200) - CVE-2016-2183 <li>Command injection (CWE-77) - CVE-2022-36556 <li>Unrestricted upload of file with dangerous type (CWE-434) - CVE-2022-36557 <li>Use of hard-coded credentials (CWE-798) - CVE-2022-36558 <li>Command injection (CWE-77) - CVE-2022-36559 <li>Use of hard-coded credentials (CWE-798) - CVE-2022-36560 <li>Improper privilege management (CWE-269) - CVE-2023-22361 <li>Missing authentication for critical function (CWE-306) - CVE-2023-22441 <li>Improper access control (CWE-284) - CVE-2023-23578 <li>Improper following of a certificate's chain of trust (CWE-296) - CVE-2023-23901 <li>Missing authentication for critical function (CWE-306) - CVE-2023-23906 <li>Cleartext storage of sensitive information (CWE-312) - CVE-2023-24586 <li>Cleartext transmission of sensitive information (CWE-319) - CVE-2023-25070 <li>Use of weak credentials (CWE-1391) - CVE-2023-25072 <li>Use of weak credentials (CWE-1391) - CVE-2023-25184 </ul> The developer states that attacks exploiting CVE-2022-36556 have been observed. CVE-2023-22441 MASAHIRO IIDA of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2016-2183, CVE-2022-36556, CVE-2022-36557, CVE-2022-36558, CVE-2022-36559, CVE-2022-36560, CVE-2023-22361, CVE-2023-23578, CVE-2023-23901, CVE-2023-23906, CVE-2023-24586, CVE-2023-25070, CVE-2023-25072, CVE-2023-25184 Thomas J. Knudsen and Samy Younsi of NeroTeam Security Labs reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-000029 http://jvn.jp/en/jp/JVN40604023/index.html https://www.cve.org/CVERecord?id=CVE-2023-22361 https://www.cve.org/CVERecord?id=CVE-2023-22441 https://www.cve.org/CVERecord?id=CVE-2023-23578 https://www.cve.org/CVERecord?id=CVE-2023-23901 https://www.cve.org/CVERecord?id=CVE-2023-23906 https://www.cve.org/CVERecord?id=CVE-2023-24586 https://www.cve.org/CVERecord?id=CVE-2023-25070 https://www.cve.org/CVERecord?id=CVE-2023-25072 https://www.cve.org/CVERecord?id=CVE-2023-25184 https://www.cve.org/CVERecord?id=CVE-2016-2183 https://www.cve.org/CVERecord?id=CVE-2022-36556 https://www.cve.org/CVERecord?id=CVE-2022-36557 https://www.cve.org/CVERecord?id=CVE-2022-36558 https://www.cve.org/CVERecord?id=CVE-2022-36559 https://www.cve.org/CVERecord?id=CVE-2022-36560 https://nvd.nist.gov/vuln/detail/CVE-2016-2183 https://nvd.nist.gov/vuln/detail/CVE-2022-36556 https://nvd.nist.gov/vuln/detail/CVE-2022-36557 https://nvd.nist.gov/vuln/detail/CVE-2022-36558 https://nvd.nist.gov/vuln/detail/CVE-2022-36559 https://nvd.nist.gov/vuln/detail/CVE-2022-36560 https://nvd.nist.gov/vuln/detail/CVE-2023-22361 https://nvd.nist.gov/vuln/detail/CVE-2023-22441 https://nvd.nist.gov/vuln/detail/CVE-2023-23578 https://nvd.nist.gov/vuln/detail/CVE-2023-23901 https://nvd.nist.gov/vuln/detail/CVE-2023-23906 https://nvd.nist.gov/vuln/detail/CVE-2023-24586 https://nvd.nist.gov/vuln/detail/CVE-2023-25070 https://nvd.nist.gov/vuln/detail/CVE-2023-25072 https://nvd.nist.gov/vuln/detail/CVE-2023-25184 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:seiko-sol:skybridge_basic_mb-a130_firmware cpe:/o:seiko-sol:skybridge_mb-a100_firmware cpe:/o:seiko-sol:skybridge_mb-a110_firmware cpe:/o:seiko-sol:skybridge_mb-a200_firmware cpe:/o:seiko-sol:skyspider_mb-r210_firmware 2024-05-27T17:08+09:00 2023-03-31T15:54+09:00 2024-05-27T17:08+09:00 HAProxy vulnerable to HTTP request/response smuggling https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000030.html HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name, and when deployed in front of a server that incorrectly process this malformed header, it may be used to conduct an HTTP request/response smuggling attack (CWE-444). Yuki Mogi of FFRI Security, Inc. reported this vulnerability to the developer and coordinated. The developer and JPCERT/CC published this advisory in order to notify users of this vulnerability. JVNDB-2023-000030 http://jvn.jp/en/jp/JVN38170084/index.html https://www.cve.org/CVERecord?id=CVE-2023-25950 https://nvd.nist.gov/vuln/detail/CVE-2023-25950 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:haproxy:haproxy 2024-06-04T16:17+09:00 2023-03-31T15:54+09:00 2024-06-04T16:17+09:00 baserCMS vulnerable to arbitrary file uploads https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000028.html baserCMS provided by baserCMS Users Community allows an authenticated user to upload arbitrary files (CWE-434). Taisei Inoue of GMO Cybersecurity by Ierae, Inc. and Yusuke Akagi of Mitsui Bussan Secure Directions, Inc., Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000028 http://jvn.jp/en/jp/JVN61105618/index.html https://www.cve.org/CVERecord?id=CVE-2023-25655 https://nvd.nist.gov/vuln/detail/CVE-2023-25655 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:basercms:basercms 2024-06-06T17:31+09:00 2023-03-27T13:39+09:00 2024-06-06T17:31+09:00 ELECOM WAB-MAT registers its windows service executable with an unquoted file path https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000027.html WAB-MAT provided by ELECOM CO.,LTD. is Access Point Management Tool for corporate users. WAB-MAT registers its windows service executable with an unquoted file path (CWE-428). Tomohisa Hasegawa of Canon IT Solutions Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000027 https://jvn.jp/en/jp/JVN35246979/index.html https://www.cve.org/CVERecord?id=CVE-2023-22282 https://nvd.nist.gov/vuln/detail/CVE-2023-22282 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:elecom:wab-mat 2024-06-03T17:36+09:00 2023-03-24T14:35+09:00 2024-06-03T17:36+09:00 Multiple vulnerabilities in Contec CONPROSYS IoT Gateway products https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001320.html CONPROSYS IoT Gateway products provided by Contec CO.,LTD. contain multiple vulnerabilities listed below. * OS Command Injection (CWE-78) - CVE-2023-27917 Network Maintenance page validates input values improperly, resulting in OS command injection. * Inadequate Encryption Strength (CWE-326) - CVE-2023-27389 Firmware update file contains a firmware image encrypted, which can be decrypted by examining the bundled install script and a little more work. * Improper Access Control (CWE-284) - CVE-2023-23575 Network Maintenance page should be available only to administrative users, but the device fails to restrict access. JVNDB-2023-001320 http://jvn.jp/en/vu/JVNVU96198617/index.html https://www.cve.org/CVERecord?id=CVE-2023-27917 https://www.cve.org/CVERecord?id=CVE-2023-27389 https://www.cve.org/CVERecord?id=CVE-2023-23575 https://nvd.nist.gov/vuln/detail/CVE-2023-23575 https://nvd.nist.gov/vuln/detail/CVE-2023-27389 https://nvd.nist.gov/vuln/detail/CVE-2023-27917 https://cwe.mitre.org/data/definitions/284.html https://cwe.mitre.org/data/definitions/326.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:contec:cps-mc341-a1-111_firmware cpe:/o:contec:cps-mc341-adsc1-111_firmware cpe:/o:contec:cps-mc341-adsc1-931_firmware cpe:/o:contec:cps-mc341-adsc2-111_firmware cpe:/o:contec:cps-mc341-ds1-111_firmware cpe:/o:contec:cps-mc341-ds11-111_firmware cpe:/o:contec:cps-mc341-ds2-911_firmware cpe:/o:contec:cps-mc341g-adsc1-110_firmwar cpe:/o:contec:cps-mc341q-adsc1-111_firmware cpe:/o:contec:cps-mcs341-ds1-111_firmware cpe:/o:contec:cps-mcs341-ds1-131_firmware cpe:/o:contec:cps-mcs341g-ds1-130_firmware cpe:/o:contec:cps-mcs341g5-ds1-130_firmware cpe:/o:contec:cps-mcs341q-ds1-131_firmware cpe:/o:contec:cps-mg341-adsc1-111_firmware cpe:/o:contec:cps-mg341-adsc1-931_firmware cpe:/o:contec:cps-mg341g-adsc1-111_firmware cpe:/o:contec:cps-mg341g-adsc1-930_firmware cpe:/o:contec:cps-mg341g5-adsc1-931_firmware 2024-06-04T17:00+09:00 2023-03-22T13:41+09:00 2024-06-04T17:00+09:00 TP-Link T2600G-28SQ uses vulnerable SSH host keys https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000025.html TP-Link layer-2 switch T2600G-28SQ uses vulnerable SSH host keys (CWE-1391). Kuniyuki Hasegawa of VeriServe Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000025 https://jvn.jp/en/jp/JVN62420378/index.html https://www.cve.org/CVERecord?id=CVE-2023-28368 https://nvd.nist.gov/vuln/detail/CVE-2023-28368 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:tp-link:t2600g-28sq_firmware 2024-06-04T16:58+09:00 2023-03-17T12:27+09:00 2024-06-04T16:58+09:00 Android App "Wolt Delivery: Food and more" uses a hard-coded API key for an external service https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000024.html Android App "Wolt Delivery: Food and more" provided by Wolt uses a hard-coded API key for an external service (CWE-798). Naoya Kurosawa of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000024 https://jvn.jp/en/jp/JVN64453490/index.html https://www.cve.org/CVERecord?id=CVE-2023-22429 https://nvd.nist.gov/vuln/detail/CVE-2023-22429 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:wolt:wolt_delivery 2024-06-03T17:15+09:00 2023-03-13T12:28+09:00 2024-06-03T17:15+09:00 Multiple vulnerabilities in Buffalo network devices https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001308.html Multiple network devices provided by BUFFALO INC. contain multiple vulnerabilities listed below. * Use of hard-coded credentials (CWE-798) - CVE-2023-26588 * Improper access control (CWE-284) - CVE-2023-24544 * Stored cross-site scripting (CWE-79) - CVE-2023-24464 JVNDB-2023-001308 https://jvn.jp/en/vu/JVNVU96824262/index.html https://www.cve.org/CVERecord?id=CVE-2022-26588 https://www.cve.org/CVERecord?id=CVE-2022-24544 https://www.cve.org/CVERecord?id=CVE-2022-24464 https://nvd.nist.gov/vuln/detail/CVE-2023-26588 https://nvd.nist.gov/vuln/detail/CVE-2023-24544 https://nvd.nist.gov/vuln/detail/CVE-2023-24464 https://cwe.mitre.org/data/definitions/284.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/798.html cpe:/o:buffalo_inc:bs-gs2008p_firmware cpe:/o:buffalo_inc:bs-gs2008_firmware cpe:/o:buffalo_inc:bs-gs2016p_firmware cpe:/o:buffalo_inc:bs-gs2016_firmware cpe:/o:buffalo_inc:bs-gs2024p_firmware cpe:/o:buffalo_inc:bs-gs2024_firmware cpe:/o:buffalo_inc:bs-gs2048_firmware cpe:/o:buffalo_inc:bs-gsl2016p_firmware cpe:/o:buffalo_inc:bs-gsl2016_firmware cpe:/o:buffalo_inc:bs-gsl2024_firmware 2024-06-04T16:42+09:00 2023-03-08T15:12+09:00 2024-06-04T16:42+09:00 Multiple vulnerabilities in SEIKO EPSON printers/network interface Web Config https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000022.html Web Config for printers/network interface provided by SEIKO EPSON CORPORATION contains multiple vulnerabilities listed below. <li>Stored cross-site Scripting (CWE-79) - CVE-2023-23572 <li>Cross-Site Request Forgery (CWE-352) - CVE-2023-27520 Takaya Noma, Yudai Morii, Hiroki Yasui, Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000022 http://jvn.jp/en/jp/JVN82424996/index.html https://www.cve.org/CVERecord?id=CVE-2023-27520 https://www.cve.org/CVERecord?id=CVE-2023-23572 https://nvd.nist.gov/vuln/detail/CVE-2023-23572 https://nvd.nist.gov/vuln/detail/CVE-2023-27520 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:epson:web_config 2024-06-03T17:36+09:00 2023-03-08T15:09+09:00 2024-06-03T17:36+09:00 Multiple vulnerabilities in JTEKT ELECTRONICS Kostac PLC Programming Software https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001304.html Kostac PLC Programming Software provided by JTEKT ELECTRONICS CORPORATION contains multiple vulnerabilities listed below. * Out-of-bounds read (CWE-125) - CVE-2023-22419, CVE-2023-22421 * Use-after-free (CWE-416) - CVE-2023-22424 Michael Heinzl reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-001304 http://jvn.jp/en/vu/JVNVU94966432/index.html https://www.cve.org/CVERecord?id=CVE-2023-22419 https://www.cve.org/CVERecord?id=CVE-2023-22421 https://www.cve.org/CVERecord?id=CVE-2023-22424 https://nvd.nist.gov/vuln/detail/CVE-2023-22419 https://nvd.nist.gov/vuln/detail/CVE-2023-22421 https://nvd.nist.gov/vuln/detail/CVE-2023-22424 https://www.cisa.gov/news-events/ics-advisories/icsa-23-096-03 https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/416.html cpe:/a:jtekt:kostac_plc 2024-06-07T16:39+09:00 2023-03-06T15:31+09:00 2024-06-07T16:39+09:00 Multiple vulnerabilities in PostgreSQL extension module pg_ivm https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000023.html pg_ivm provided by IVM Development Group is a PostgreSQL extension module that provides incremental view maintenance functionality of materialized views. pg_ivm contains multiple vulnerabilities listed below. <ul><li>Exposure of sensitive information to an unauthorized actor (CWE-200) - CVE-2023-22847 An Incrementally Maintainable Materialized View (IMMV) created by pg_ivm may reflect rows with Row-Level Security that the owner of the IMMV should not have access to.</ul> <ul><li>Uncontrolled search path element (CWE-427) - CVE-2023-23554 When refreshing an IMMV, pg_ivm executes functions without specifying schema names. Under certain conditions, pg_ivm may be tricked to execute unexpected functions from other schemas with the IMMV owner's privilege.</ul> IVM Development Group reported these vulnerabilities to IPA to notify users of its solution through JVN. JPCERT/CC and IVM Development Group coordinated under the Information Security Early Warning Partnership. JVNDB-2023-000023 http://jvn.jp/en/jp/JVN19872280/index.html https://www.cve.org/CVERecord?id=CVE-2023-22847 https://www.cve.org/CVERecord?id=CVE-2023-23554 https://nvd.nist.gov/vuln/detail/CVE-2023-22847 https://nvd.nist.gov/vuln/detail/CVE-2023-23554 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:sraoss:pg_ivm 2024-06-10T16:41+09:00 2023-03-06T15:22+09:00 2024-06-10T16:41+09:00 Multiple vulnerabilities in Trend Micro Maximum Security https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001291.html Trend Micro Incorporated has released security updates for Trend Micro Maximum Security. Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2023-001291 http://jvn.jp/en/vu/JVNVU96882769/index.html https://www.cve.org/CVERecord?id=CVE-2022-30687 https://www.cve.org/CVERecord?id=CVE-2022-34893 https://www.cve.org/CVERecord?id=CVE-2022-35234 https://www.cve.org/CVERecord?id=CVE-2022-37347 https://www.cve.org/CVERecord?id=CVE-2022-37348 https://www.cve.org/CVERecord?id=CVE-2022-48191 https://nvd.nist.gov/vuln/detail/CVE-2022-30687 https://nvd.nist.gov/vuln/detail/CVE-2022-34893 https://nvd.nist.gov/vuln/detail/CVE-2022-35234 https://nvd.nist.gov/vuln/detail/CVE-2022-37347 https://nvd.nist.gov/vuln/detail/CVE-2022-37348 https://nvd.nist.gov/vuln/detail/CVE-2022-48191 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/367.html cpe:/a:trendmicro:maximum_security_2022 cpe:/a:trendmicro:security 2024-06-13T17:06+09:00 2023-03-03T11:10+09:00 2024-06-13T17:06+09:00 Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001292.html Trend Micro Incorporated has released security updates for Apex One and Apex One as a Service. Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2023-001292 http://jvn.jp/en/vu/JVNVU96221942/index.html https://www.cve.org/CVERecord?id=CVE-2023-0587 https://www.cve.org/CVERecord?id=CVE-2023-25143 https://www.cve.org/CVERecord?id=CVE-2023-25144 https://www.cve.org/CVERecord?id=CVE-2023-25145 https://www.cve.org/CVERecord?id=CVE-2023-25146 https://www.cve.org/CVERecord?id=CVE-2023-25147 https://www.cve.org/CVERecord?id=CVE-2023-25148 https://nvd.nist.gov/vuln/detail/CVE-2023-0587 https://nvd.nist.gov/vuln/detail/CVE-2023-25143 https://nvd.nist.gov/vuln/detail/CVE-2023-25144 https://nvd.nist.gov/vuln/detail/CVE-2023-25145 https://nvd.nist.gov/vuln/detail/CVE-2023-25146 https://nvd.nist.gov/vuln/detail/CVE-2023-25147 https://nvd.nist.gov/vuln/detail/CVE-2023-25148 https://cwe.mitre.org/data/definitions/434.html https://cwe.mitre.org/data/definitions/427.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:trendmicro:apex_one 2024-06-07T16:59+09:00 2023-03-02T17:33+09:00 2024-06-07T16:59+09:00 File and Directory Permissions Vulnerability in Hitachi Automation Director, Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001269.html A File and Directory Permissions Vulnerability (CVE-2020-36652) exists in Hitachi Automation Director, Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center. JVNDB-2023-001269 https://www.cve.org/CVERecord?id=CVE-2020-36652 https://nvd.nist.gov/vuln/detail/CVE-2020-36652 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/276.html cpe:/a:hitachi:automation_director cpe:/a:hitachi:infrastructure_analytics_advisor cpe:/a:hitachi:ops_center_analyzer cpe:/a:hitachi:ops_center_automator cpe:/a:hitachi:ops_center_viewpoint 2024-06-11T16:42+09:00 2023-03-01T16:59+09:00 2024-06-11T16:42+09:00 Multiple vulnerabilities in SS1 and Rakuraku PC Cloud https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000021.html SS1 is asset management software and Rakuraku PC Cloud is cloud-based asset management service. SS1 and Rakuraku PC Cloud Agent contain multiple vulnerabilities listed below. <ul><li>Improper Access Control (CWE-284) - CVE-2023-22335</li><li>Path Traversal (CWE-22) - CVE-2023-22336</li><li>Use of Hard-coded Credentials (CWE-798) - CVE-2023-22344</li></ul> Denis Faiustov, and Ruslan Sayfiev of GMO Cyber Security by IERAE reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000021 http://jvn.jp/en/jp/JVN57224029/index.html https://www.cve.org/CVERecord?id=CVE-2023-22335 https://www.cve.org/CVERecord?id=CVE-2023-22336 https://www.cve.org/CVERecord?id=CVE-2023-22344 https://nvd.nist.gov/vuln/detail/CVE-2023-22335 https://nvd.nist.gov/vuln/detail/CVE-2023-22336 https://nvd.nist.gov/vuln/detail/CVE-2023-22344 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:dos-osaka:rakuraku_pc_cloud_agent cpe:/a:dos-osaka:ss1 2024-06-06T18:02+09:00 2023-03-01T15:57+09:00 2024-06-06T18:02+09:00 Multiple cross-site scripting vulnerabilities in EC-CUBE https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000019.html EC-CUBE provided by EC-CUBE CO.,LTD. contains multiple cross-site scripting vulnerabilities listed below. * Cross-site scripting vulnerability in Contents Management (CWE-79) - CVE-2023-22438 * Cross-site scripting vulnerability in Authentication Key Settings (CWE-79) - CVE-2023-25077 * Cross-site scripting vulnerability in Product List Screen and Product Detail Screen (CWE-79) - CVE-2023-22838 CVE-2023-22438 Gaku Mochizuki, Taiga Shirakura of Mitsui Bussan Secure Directions, Inc. and Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-25077 Noriaki Iwasaki of Cyber Defense Institute, Inc. reported this vulnerability to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. Inc. reported it to JPCERT/CC to notify users of its solution through JVN. CVE-2023-22838 Rei TAKAHASHI of Hashiura Lab., Dept. of Data Science, Nippon Institute of Technology reported this vulnerability to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. reported it to JPCERT/CC to notify users of its solution through JVN. JVNDB-2023-000019 http://jvn.jp/en/jp/JVN04785663/index.html https://www.cve.org/CVERecord?id=CVE-2023-22438 https://www.cve.org/CVERecord?id=CVE-2023-25077 https://www.cve.org/CVERecord?id=CVE-2023-22838 https://nvd.nist.gov/vuln/detail/CVE-2023-22438 https://nvd.nist.gov/vuln/detail/CVE-2023-22838 https://nvd.nist.gov/vuln/detail/CVE-2023-25077 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ec-cube:ec-cube 2024-06-10T17:28+09:00 2023-02-28T16:38+09:00 2024-06-10T17:28+09:00 web2py development tool vulnerable to open redirect https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000020.html The admin development tool included in the web2py source code contains an open redirect vulnerability (CWE-601). According to the developer, they do not recommend using the tool in operational environment or disclosing it on the Internet. Takuto Yoshikai of Aeye Security Lab reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000020 http://jvn.jp/en/jp/JVN78253670/index.html https://www.cve.org/CVERecord?id=CVE-2023-22432 https://nvd.nist.gov/vuln/detail/CVE-2023-22432 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:web2py:web2py 2024-06-07T16:31+09:00 2023-02-28T15:00+09:00 2024-06-07T16:31+09:00 Multiple cross-site scripting vulnerabilities in SHIRASAGI https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000018.html SHIRASAGI provided by SHIRASAGI Project contains multiple vulnerabilities listed below. * Stored cross-site scripting vulnerability on Schedule function (CWE-79) - CVE-2023-22425 * Stored cross-site scripting vulnerability on Theme switching function (CWE-79) - CVE-2023-22427 CVE-2023-22425 Ren Toda of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-22427 SHIRASAGI Project reported this vulnerability to JPCERT/CC to notify users of the solution through JVN. JVNDB-2023-000018 http://jvn.jp/en/jp/JVN18765463/index.html https://www.cve.org/CVERecord?id=CVE-2023-22425 https://www.cve.org/CVERecord?id=CVE-2023-22427 https://nvd.nist.gov/vuln/detail/CVE-2023-22425 https://nvd.nist.gov/vuln/detail/CVE-2023-22427 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ss-proj:shirasagi 2024-06-10T17:18+09:00 2023-02-22T15:16+09:00 2024-06-10T17:18+09:00 The installers of ELECOM Camera Assistant and QuickFileDealer may insecurely load Dynamic Link Libraries https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000016.html The installers of ELECOM Camera Assistant and QuickFileDealer provided by ELECOM CO.,LTD. contain an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427). Tomohisa Hasegawa of Canon IT Solutions Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000016 http://jvn.jp/en/jp/JVN60263237/index.html https://jvn.jp/en/ta/JVNTA91240916/ https://www.cve.org/CVERecord?id=CVE-2023-22368 https://nvd.nist.gov/vuln/detail/CVE-2023-22368 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:elecom:camera_assistant cpe:/a:elecom:quickfiledealer 2023-02-14T17:00+09:00 2023-02-14T17:00+09:00 2023-02-14T17:00+09:00 Improper restriction of XML external entity reference (XXE) vulnerability in tsClinical Define.xml Generator and tsClinical Metadata Desktop Tools https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000017.html tsClinical Define.xml Generator and tsClinical Metadata Desktop Tools provided by FUJITSU LIMITED contain an improper restriction of XML external entity reference (XXE) vulnerability (CWE-611). Toyama Taku and Sakaki Ryutaro of NEC Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000017 http://jvn.jp/en/jp/JVN00712821/index.html https://www.cve.org/CVERecord?id=CVE-2023-22377 https://nvd.nist.gov/vuln/detail/CVE-2023-22377 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:fujitsu:tsclinical_define.xml_generator cpe:/a:fujitsu:tsclinical_metadata_desktop_tools 2024-06-12T11:15+09:00 2023-02-14T17:00+09:00 2024-06-12T11:15+09:00 Multiple vulnerabilities in PLANEX COMMUNICATIONS Network Camera CS-WMV02G https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000015.html Wired/Wireless LAN Pan/Tilt Network Camera CS-WMV02G provided by PLANEX COMMUNICATIONS INC. contains multiple vulnerabilities listed below. <ul><li>Stored cross-site scripting (CWE-79) - CVE-2023-22370</li><li>Cross-site request forgery (CWE-352) - CVE-2023-22375</li><li>Reflected cross-site scripting (CWE-79) - CVE-2023-22376</li> CVE-2023-22370 Yudai Morii, Takaya Noma, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2023-22375, CE-2023-22376 Takayuki Sasaki, Yudai Morii, Takaya Noma and Katsunari Yoshioka of Yokohama National University reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000015 http://jvn.jp/en/jp/JVN98612206/index.html https://www.cve.org/CVERecord?id=CVE-2023-22370 https://www.cve.org/CVERecord?id=CVE-2023-22375 https://www.cve.org/CVERecord?id=CVE-2023-22376 https://nvd.nist.gov/vuln/detail/CVE-2023-22370 https://nvd.nist.gov/vuln/detail/CVE-2023-22375 https://nvd.nist.gov/vuln/detail/CVE-2023-22376 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:planex:cs-wmv02g_firmware 2024-06-12T17:03+09:00 2023-02-13T14:48+09:00 2024-06-12T17:03+09:00 Zuken Elmic KASAGO uses insufficient random values for TCP Initial Sequence Numbers https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001215.html Zuken Elmic KASAGO, TCP/IP protocol stack for embedded systems, uses its own random number generator function when generating TCP initial sequence numbers, which leads to use insufficient random values (CWE-330). Zuken Elmic reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2023-001215 http://jvn.jp/en/vu/JVNVU99551468/index.html https://www.cve.org/CVERecord?id=CVE-2022-43501 https://nvd.nist.gov/vuln/detail/CVE-2022-43501 https://cwe.mitre.org/data/definitions/330.html cpe:/a:elwsc:kasago_ipv4 cpe:/a:elwsc:kasago_ipv4_light cpe:/a:elwsc:kasago_ipv6%2fv4_dual cpe:/a:elwsc:kasago_mobile_ipv6 2024-06-14T15:45+09:00 2023-02-13T14:18+09:00 2024-06-14T15:45+09:00 NEC PC Settings Tool vulnerable to missing authentication for critical function https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000014.html PC Settings Tool is an application pre-installed on computers provided by NEC by default. PC Settings Tool Library contained in the application is vulnerable to missing authentication for critical function (CWE-306). Haruki Yadani of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000014 https://jvn.jp/en/jp/JVN60320736/index.html https://www.cve.org/CVERecord?id=CVE-2023-25011 https://nvd.nist.gov/vuln/detail/CVE-2023-25011 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:nec:pc_settings_tool 2024-06-10T18:13+09:00 2023-02-10T14:43+09:00 2024-06-10T18:13+09:00 Multiple vulnerabilities in JTEKT ELECTRONICS Screen Creator Advance 2 https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001212.html Screen Creator Advance 2 provided by JTEKT ELECTRONICS CORPORATION contains multiple vulnerabilities listed below. * Out-of-bound write (CWE-787) - CVE-2023-22345 * Out-of-bound read (CWE-125) - CVE-2023-22346, CVE-2023-22347, CVE-2023-22349, CVE-2023-22350, CVE-2023-22353 * Use-after-free (CWE-416) - CVE-2023-22360 Michael Heinzl reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-001212 https://jvn.jp/en/vu/JVNVU98917488/ https://www.cve.org/CVERecord?id=CVE-2023-22345 https://www.cve.org/CVERecord?id=CVE-2023-22346 https://www.cve.org/CVERecord?id=CVE-2023-22347 https://www.cve.org/CVERecord?id=CVE-2023-22349 https://www.cve.org/CVERecord?id=CVE-2023-22350 https://www.cve.org/CVERecord?id=CVE-2023-22353 https://www.cve.org/CVERecord?id=CVE-2023-22360 https://nvd.nist.gov/vuln/detail/CVE-2023-22345 https://nvd.nist.gov/vuln/detail/CVE-2023-22346 https://nvd.nist.gov/vuln/detail/CVE-2023-22347 https://nvd.nist.gov/vuln/detail/CVE-2023-22349 https://nvd.nist.gov/vuln/detail/CVE-2023-22350 https://nvd.nist.gov/vuln/detail/CVE-2023-22353 https://nvd.nist.gov/vuln/detail/CVE-2023-22360 https://www.cisa.gov/news-events/ics-advisories/icsa-23-096-02 https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/416.html https://cwe.mitre.org/data/definitions/787.html cpe:/a:jtekt:screen_creator_advance_2 2024-06-10T17:25+09:00 2023-02-08T12:46+09:00 2024-06-10T17:25+09:00 Ichiran App vulnerable to improper server certificate verification https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000013.html Ichiran App developed by Betrend Corporation and provided by ICHIRAN INC. is vulnerable to improper server certificate verification (CWE-295). Ryo Nihonyanagi of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000013 https://jvn.jp/en/jp/JVN11257333/index.html https://www.cve.org/CVERecord?id=CVE-2023-22367 https://nvd.nist.gov/vuln/detail/CVE-2023-22367 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ichiranusa:ichiran 2024-06-12T14:25+09:00 2023-02-06T14:31+09:00 2024-06-12T14:25+09:00 Vulnerability in Driver Distributor where passwords are stored in a recoverable format https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000012.html Driver Distributor provided by FUJIFILM Business Innovation Corp. contains a vulnerability where passwords are stored in a recoverable format (CWE-257). Sato Ryo, Yokoi Hiroshi, and Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000012 http://jvn.jp/en/jp/JVN22830348/index.html https://www.cve.org/CVERecord?id=CVE-2022-43460 https://nvd.nist.gov/vuln/detail/CVE-2022-43460 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:fuji_xerox:driver_distributor 2024-06-12T11:07+09:00 2023-01-31T14:14+09:00 2024-06-12T11:07+09:00 SUSHIRO App for Android outputs sensitive information to the log file https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000011.html SUSHIRO App for Android provided by AKINDO SUSHIRO CO., LTD. outputs sensitive information to the log file (CWE-532). JVNDB-2023-000011 http://jvn.jp/en/jp/JVN84642320/index.html https://www.cve.org/CVERecord?id=CVE-2023-22362 https://nvd.nist.gov/vuln/detail/CVE-2023-22362 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:akindo-sushiro:hong_kong_sushiro cpe:/a:akindo-sushiro:singapore_sushiro cpe:/a:akindo-sushiro:sushiro cpe:/a:akindo-sushiro:taiwan_sushiro cpe:/a:akindo-sushiro:thailand_sushiro 2024-06-11T17:35+09:00 2023-01-31T14:10+09:00 2024-06-11T17:35+09:00 Improper restriction of XML external entity reference (XXE) vulnerability in OMRON CX-Motion Pro https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001110.html CX-Motion Pro provided by OMRON Corporation contains an improper restriction of XML external entity reference (XXE) vulnerability (CWE-611). Michael Heinzl reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-001110 https://jvn.jp/en/vu/JVNVU94200979/index.html https://www.cve.org/CVERecord?id=CVE-2023-22322 https://nvd.nist.gov/vuln/detail/CVE-2023-22322 https://cwe.mitre.org/data/definitions/611.html cpe:/a:omron:cx-motion_pro 2023-01-25T14:28+09:00 2023-01-25T14:28+09:00 2023-01-25T14:28+09:00 EasyMail vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000009.html EasyMail provided by First Net Japan Inc. contains a stored cross-site scripting vulnerability (CWE-79). Toyama Taku reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000009 http://jvn.jp/en/jp/JVN05288621/index.html https://www.cve.org/CVERecord?id=CVE-2023-22333 https://nvd.nist.gov/vuln/detail/CVE-2023-22333 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:mubag:easymail 2023-01-24T16:00+09:00 2023-01-24T16:00+09:00 2023-01-24T16:00+09:00 pgAdmin 4 vulnerable to directory traversal https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000010.html PostgreSQL management tool pgAdmin 4 contains a directory traversal vulnerability (CWE-22). Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000010 http://jvn.jp/en/jp/JVN01398015/index.html https://www.cve.org/CVERecord?id=CVE-2023-0241 https://nvd.nist.gov/vuln/detail/CVE-2023-0241 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:pgadmin:pgadmin 2024-06-05T16:22+09:00 2023-01-24T16:00+09:00 2024-06-05T16:22+09:00 Contec CONPROSYS HMI System (CHS) vulnerable to multiple SQL injections https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001108.html CONPROSYS HMI System (CHS) provided by CONTEC CO.,LTD. contains multiple SQL injection vulnerabilities (CWE-89). Mosin from ELEX FEIGONG RESEARCH INSTITUTE of Elex CyberSecurity, Inc., reported these vulnerabilities to Contec Co., Ltd. Contec Co., Ltd. reported the issues to JPCERT/CC in order to notify the solutions to the users through JVN. JVNDB-2023-001108 https://jvn.jp/en/vu/JVNVU97195023/index.html https://www.cve.org/CVERecord?id=CVE-2023-22324 https://nvd.nist.gov/vuln/detail/CVE-2023-22324 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:contec:conprosys_hmi_system 2023-01-24T13:38+09:00 2023-01-24T13:38+09:00 2023-01-24T13:38+09:00 Pgpool-II vulnerable to information disclosure https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000008.html Pgpool-II is cluster management tool. Pgpool-II contains an information disclosure vulnerability (CWE-200) in its watchdog function. Note that, only systems that meet all of the following setting requirements are affected by this vulnerability. <ul> <li>Watchdog function is enabled (use_watchdog = on) <li>"query mode" is used for the alive monitoring of watchdog (wd_lifecheck_method = 'query') <li>Plain text password is set for wd_lifecheck_password </ul> PgPool Global Development Group reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and PgPool Global Development Group coordinated under the Information Security Early Warning Partnership. JVNDB-2023-000008 http://jvn.jp/en/jp/JVN72418815/index.html https://www.cve.org/CVERecord?id=CVE-2023-22332 https://nvd.nist.gov/vuln/detail/CVE-2023-22332 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:pgpool:pgpool-ii 2024-06-20T17:54+09:00 2023-01-23T16:35+09:00 2024-06-20T17:54+09:00 File and Directory Permissions Vulnerability in Hitachi Tuning Manager https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001008.html A File and Directory Permissions Vulnerability (CVE-2020-36611) exists in Hitachi Tuning Manager. JVNDB-2023-001008 https://www.cve.org/CVERecord?id=CVE-2020-36611 https://nvd.nist.gov/vuln/detail/CVE-2020-36611 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:tuning_manager 2023-01-18T13:51+09:00 2023-01-18T13:51+09:00 2023-01-18T13:51+09:00 WordPress plugin "Welcart e-Commerce" vulnerable to directory traversal https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000007.html WordPress plugin "Welcart e-Commerce" provided by Collne Inc. contains a directory traversal vulnerability (CWE-22). Masato Ikeda of Mitsui Bussan Secure Directions, Inc. and Takeshi Suzuki reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000007 https://jvn.jp/en/jp/JVN31073333/index.html https://www.cve.org/CVERecord?id=CVE-2022-4140 https://nvd.nist.gov/vuln/detail/CVE-2022-4140 https://wpscan.com/vulnerability/0d649a7e-3334-48f7-abca-fff0856e12c7 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:collne:welcart_e-commerce 2023-01-17T14:17+09:00 2023-01-17T14:17+09:00 2023-01-17T14:17+09:00 Active debug code vulnerability in OMRON CP1L-EL20DR-D https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001005.html Active debug code (CWE-489) exists in CP1L-EL20DR-D provided by OMRON Corporation, which may lead to a command that is not specified in FINS protocol being executed without authentication. Georgy Kiguradze of Positive Technologies reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-001005 http://jvn.jp/en/vu/JVNVU97575890/index.html https://www.cve.org/CVERecord?id=CVE-2023-22357 https://nvd.nist.gov/vuln/detail/CVE-2023-22357 https://cwe.mitre.org/data/definitions/489.html cpe:/o:omron:cp1l-el20dr-d_firmware 2023-01-12T15:53+09:00 2023-01-12T15:53+09:00 2023-01-12T15:53+09:00 Access of uninitialized pointer vulnerability in OMRON CX-Motion-MCH https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001003.html CX-Motion-MCH provided by OMRON Corporation contains an access of uninitialized pointer vulnerability (CWE-824, CVE-2023-22366). Michael Heinzl reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2023-001003 https://jvn.jp/en/vu/JVNVU91744508/index.html https://www.cve.org/CVERecord?id=CVE-2023-22366 https://nvd.nist.gov/vuln/detail/CVE-2023-22366 https://cwe.mitre.org/data/definitions/824.html cpe:/o:omron:cx-motion-mch_firmware 2023-01-12T15:06+09:00 2023-01-12T15:06+09:00 2023-01-12T15:06+09:00 Multiple vulnerabilities in PIXELA PIX-RT100 https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000006.html PIX-RT100 provided by PIXELA CORPORATION contains multiple vulnerabilities listed below. <ul> <li>OS command injection (CWE-78) - CVE-2023-22304 <li>Backdoor access issue (CWE-912) - CVE-2023-22316 </ul> MASAHIRO IIDA of LAC Co.,Ltd. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000006 https://jvn.jp/en/jp/JVN57296685/index.html https://www.cve.org/CVERecord?id=CVE-2023-22304 https://www.cve.org/CVERecord?id=CVE-2023-22316 https://nvd.nist.gov/vuln/detail/CVE-2023-22304 https://nvd.nist.gov/vuln/detail/CVE-2023-22316 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:pixela:pix-rt100_firmware 2023-01-12T14:50+09:00 2023-01-12T14:50+09:00 2023-01-12T14:50+09:00 OpenAM Web Policy Agent (OpenAM Consortium Edition) vulnerable to path traversal https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001002.html OpenAM Web Policy Agent (OpenAM Consortium Edition) provided by OpenAM Consortium parses URLs improperly, leading to a path traversal vulnerability (CWE-22). Furthermore, a crafted URL may be evaluated incorrectly. OpenAM Consortium reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and OpenAM Consortium coordinated under the Information Security Early Warning Partnership. JVNDB-2023-001002 https://jvn.jp/en/vu/JVNVU91740661/index.html https://www.cve.org/CVERecord?id=CVE-2023-22320 https://nvd.nist.gov/vuln/detail/CVE-2023-22320 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:osstech:openam 2023-01-11T17:07+09:00 2023-01-11T17:07+09:00 2023-01-11T17:07+09:00 Multiple vulnerabilities in MAHO-PBX NetDevancer series https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000005.html There are multiple vulnerabilities in the Management screen of MAHO-PBX NetDevancer series provided by Mahoroba Kobo, Inc. OS Command Injection (CWE-78) - CVE-2023-22279 OS Command Injection (CWE-78) - CVE-2023-22280 Cross-Site Request Forgery (CWE-352) - CVE-2023-22286 Reflected Cross-site Scripting (CWE-79) - CVE-2023-22296 </ul> Masamu Asato of GMO Cyber Security by IERAE reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000005 https://jvn.jp/en/jp/JVN99957889/index.html https://www.cve.org/CVERecord?id=CVE-2023-22279 https://www.cve.org/CVERecord?id=CVE-2023-22280 https://www.cve.org/CVERecord?id=CVE-2023-22286 https://www.cve.org/CVERecord?id=CVE-2023-22296 https://nvd.nist.gov/vuln/detail/CVE-2023-22279 https://nvd.nist.gov/vuln/detail/CVE-2023-22280 https://nvd.nist.gov/vuln/detail/CVE-2023-22286 https://nvd.nist.gov/vuln/detail/CVE-2023-22296 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:ate-mahoroba:maho-pbx_netdevancer_firmware cpe:/o:ate-mahoroba:maho-pbx_netdevancer_mobilegate_firmware cpe:/o:ate-mahoroba:maho-pbx_netdevancer_vsg_firmware 2023-01-11T16:11+09:00 2023-01-11T16:11+09:00 2023-01-11T16:11+09:00 TP-Link SG105PE vulnerable to authentication bypass https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000003.html TP-Link SG105PE contains an authentication bypass vulnerability (CWE-287). Baba Takao of BPS Co., Ltd reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000003 https://jvn.jp/en/jp/JVN78481846/index.html https://www.cve.org/CVERecord?id=CVE-2023-22303 https://nvd.nist.gov/vuln/detail/CVE-2023-22303 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:tp-link:tl-sg105pe_firmware 2023-01-11T15:04+09:00 2023-01-11T15:04+09:00 2023-01-11T15:04+09:00 pgAdmin 4 vulnerable to open redirect https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000004.html pgAdmin 4 provided by pgAdmin Project contains an open redirect vulnerability (CWE-601). SHIGA TAKUMA of BroadBand Security, Inc. and Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000004 https://jvn.jp/en/jp/JVN03832974/index.html https://www.cve.org/CVERecord?id=CVE-2023-22298 https://nvd.nist.gov/vuln/detail/CVE-2023-22298 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:pgadmin:pgadmin 2023-01-11T14:23+09:00 2023-01-11T14:23+09:00 2023-01-11T14:23+09:00 Digital Arts m-FILTER vulnerable to improper authentication https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000002.html m-FILTER provided by Digital Arts Inc. is an emaill security product. m-FILTER contains an improper authentication vulnerability (CWE-287) when emails are being sent under certain conditions, and unintended emails may be sent by a remote attacker. Digital Arts Inc. states that attacks exploiting this vulnerability have been observed. Digital Arts Inc. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Digital Arts Inc. coordinated under the Information Security Early Warning Partnership. JVNDB-2023-000002 http://jvn.jp/en/jp/JVN55675303/index.html https://www.cve.org/CVERecord?id=CVE-2023-22278 https://nvd.nist.gov/vuln/detail/CVE-2023-22278 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:daj:m-filter 2023-01-06T14:57+09:00 2023-01-06T14:57+09:00 2023-01-06T14:57+09:00 Multiple code injection vulnerabilities in ruby-git https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000001.html ruby-git is a Ruby library that can be used to create, read and operate Git repositories. ruby-git contains multiple code injection vulnerabilities (CWE-94). Yuki Kokubun of DeNA Co., Ltd. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2023-000001 https://jvn.jp/en/jp/JVN16765254/index.html https://www.cve.org/CVERecord?id=CVE-2022-46648 https://www.cve.org/CVERecord?id=CVE-2022-47318 https://nvd.nist.gov/vuln/detail/CVE-2022-46648 https://nvd.nist.gov/vuln/detail/CVE-2022-47318 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ruby-git_project:ruby-git 2023-01-05T15:51+09:00 2023-01-05T15:51+09:00 2023-01-05T15:51+09:00 Multiple vulnerabilities in Fuji Electric V-Server https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002838.html V-Server provided by FUJI ELECTRIC CO., LTD. contains multiple vulnerabilities listed below. * Stack-based Buffer ovewflow (CWE-121) - CVE-2022-47908 * Out-of-bounds Read (CWE-125) - CVE-2022-41645 * Out-of-bounds Write (CWE-787) - CVE-2022-47317 Michael Heinzl reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2022-002838 http://jvn.jp/en/vu/JVNVU92811888/index.html https://www.cve.org/CVERecord?id=CVE-2022-47908 https://www.cve.org/CVERecord?id=CVE-2022-41645 https://www.cve.org/CVERecord?id=CVE-2022-47317 https://nvd.nist.gov/vuln/detail/CVE-2022-41645 https://nvd.nist.gov/vuln/detail/CVE-2022-47317 https://nvd.nist.gov/vuln/detail/CVE-2022-47908 https://cwe.mitre.org/data/definitions/121.html https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/787.html cpe:/a:fujielectric:v-server 2023-01-04T14:21+09:00 2023-01-04T14:21+09:00 2023-01-04T14:21+09:00 Multiple vulnerabilities in Fuji Electric V-SFT and TELLUS https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002837.html V-SFT and TELLUS provided by FUJI ELECTRIC CO., LTD. contain multiple vulnerabilities listed below. * Out-of-bounds Read (CWE-125) - CVE-2022-46360 * Out-of-bounds Write (CWE-787) - CVE-2022-43448 Michael Heinzl reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2022-002837 http://jvn.jp/en/vu/JVNVU90679513/index.html https://www.cve.org/CVERecord?id=CVE-2022-46360 https://www.cve.org/CVERecord?id=CVE-2022-43448 https://nvd.nist.gov/vuln/detail/CVE-2022-43448 https://nvd.nist.gov/vuln/detail/CVE-2022-46360 https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/787.html cpe:/a:fujielectric:tellus cpe:/a:fujielectric:v-sft 2023-01-04T14:16+09:00 2023-01-04T14:16+09:00 2023-01-04T14:16+09:00 Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002836.html Trend Micro Incorporated has released security updates for Apex One and Apex One as a Service. Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2022-002836 https://jvn.jp/en/vu/JVNVU96679793/index.html http://jvn.jp/en/vu/JVNVU91848962/index.html https://www.cve.org/CVERecord?id=CVE-2022-45797 https://www.cve.org/CVERecord?id=CVE-2022-45798 https://nvd.nist.gov/vuln/detail/CVE-2022-45797 https://nvd.nist.gov/vuln/detail/CVE-2022-45798 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:trendmicro:apex_one 2024-05-30T17:47+09:00 2022-12-26T16:21+09:00 2024-05-30T17:47+09:00 Installers generated by Squirrel.Windows may insecurely load Dynamic Link Libraries https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000102.html Squirrel.Windows is both a toolset and a library that provides installation and update functionality for Windows desktop applications. Installers generated by Squirrel.Windows contain an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427). Koh You Liang of Sompo Holdings, Inc. reported this vulnerability to the developer first, and to IPA later. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000102 https://jvn.jp/en/jp/JVN29902403/index.html https://jvn.jp/en/ta/JVNTA91240916/ https://www.cve.org/CVERecord?id=CVE-2022-46330 https://nvd.nist.gov/vuln/detail/CVE-2022-46330 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:squirrel.windows_project:squirrel.windows 2022-12-21T14:23+09:00 2022-12-21T14:23+09:00 2022-12-21T14:23+09:00 +Message App improper handling of Unicode control characters https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000101.html +Message App displays text unprocessed, even when control characters are contained, and the text is shown based on Unicode control character's specifications. Therefore, a crafted text may display misleading web links (CWE-451). Akaki Tsunoda reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000101 https://jvn.jp/en/jp/JVN43561812/index.html https://www.cve.org/CVERecord?id=CVE-2022-43543 https://nvd.nist.gov/vuln/detail/CVE-2022-43543 https://unicode.org/reports/tr36/ https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:kddi:%2b_message cpe:/a:nttdocomo:%2b_message cpe:/a:softbank:%2b_message 2022-12-21T14:13+09:00 2022-12-21T14:13+09:00 2022-12-21T14:13+09:00 Use-after-free vulnerability in Omron CX-Drive https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002783.html CX-Drive provided by Omron Corporation contains a use-after-free vulnerability (CWE-416). Michael Heinzl reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2022-002783 https://jvn.jp/en/vu/JVNVU92689335/ https://www.cve.org/CVERecord?id=CVE-2022-46282 https://nvd.nist.gov/vuln/detail/CVE-2022-46282 https://cwe.mitre.org/data/definitions/416.html cpe:/a:omron:cx-drive 2022-12-20T15:32+09:00 2022-12-20T15:32+09:00 2022-12-20T15:32+09:00 Command injection vulnerability in SHARP Multifunctional Products (MFP) https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002780.html SHARP Multifunctional Products (MFP) contain a command injection vulnerability (CWE-77, CVE-2022-45796). The OS layer is affected beyond the web application component, however treating the web application component as separate from the OS layer, 'Scope' is analyzed as 'S:C'. Sharp reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JVNDB-2022-002780 http://jvn.jp/en/vu/JVNVU96195138/index.html https://www.cve.org/CVERecord?id=CVE-2022-45796 https://nvd.nist.gov/vuln/detail/CVE-2022-45796 https://zuso.ai/Advisory/ZA-2022-01.html https://cwe.mitre.org/data/definitions/77.html cpe:/a:sharp:multiple_product 2022-12-20T12:12+09:00 2022-12-20T12:12+09:00 2022-12-20T12:12+09:00 Corel Roxio Creator LJB starts a program with an unquoted file path https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000099.html Roxio Creator LJB provided by Corel Corporation starts another program with an unquoted file path (CWE-428). Haruka Hino of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000099 https://jvn.jp/en/jp/JVN13075438/index.html https://www.cve.org/CVERecord?id=CVE-2022-46662 https://nvd.nist.gov/vuln/detail/CVE-2022-46662 https://kb.corel.com/en/129393 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:corel:roxio_creator_ljb 2022-12-19T13:47+09:00 2022-12-19T13:47+09:00 2022-12-19T13:47+09:00 Zenphoto vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000098.html Zenphoto contains a stored cross-site scripting vulnerability (CWE-79). Terada Yu of Fujitsu System Integration Laboratories reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000098 https://jvn.jp/en/jp/JVN06093462/index.html https://www.cve.org/CVERecord?id=CVE-2022-44449 https://nvd.nist.gov/vuln/detail/CVE-2022-44449 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:zenphoto:zenphoto 2022-12-19T13:39+09:00 2022-12-19T13:39+09:00 2022-12-19T13:39+09:00 Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002779.html CONPROSYS HMI System (CHS) provided by Contec Co., Ltd. contains multiple vulnerabilities listed below. * OS Command Injection (CWE-78) - CVE-2022-44456 * Use of Default Credentials (CWE-1392) - CVE-2023-22331 * Use of Password Hash Instead of Password for Authentication (CWE-836) - CVE-2023-22334 * Cross-site Scripting (CWE-79) - CVE-2023-22373 * Improper Access Control (CWE-284) - CVE-2023-22339 Floris Hendriks and Jeroen Wijenbergh of Radboud University reported these vulnerabilities to Contec Co., Ltd. and coordinated. Contec Co., Ltd. and JPCERT/CC published respective advisories in order to notify users of its solution. JVNDB-2022-002779 https://jvn.jp/en/vu/JVNVU96873821/index.html https://www.cve.org/CVERecord?id=CVE-2022-44456 https://www.cve.org/CVERecord?id=CVE-2023-22331 https://www.cve.org/CVERecord?id=CVE-2023-22334 https://www.cve.org/CVERecord?id=CVE-2023-22373 https://www.cve.org/CVERecord?id=CVE-2023-22339 https://nvd.nist.gov/vuln/detail/CVE-2022-44456 https://nvd.nist.gov/vuln/detail/CVE-2023-22331 https://nvd.nist.gov/vuln/detail/CVE-2023-22334 https://nvd.nist.gov/vuln/detail/CVE-2023-22339 https://nvd.nist.gov/vuln/detail/CVE-2023-22373 https://www.cisa.gov/uscert/ics/advisories/icsa-22-347-03 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/836.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/284.html https://cwe.mitre.org/data/definitions/1392.html cpe:/a:contec:conprosys_hmi_system 2023-01-11T16:55+09:00 2022-12-16T13:29+09:00 2023-01-11T16:55+09:00 Multiple vulnerabilities in DENSHI NYUSATSU CORE SYSTEM https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000097.html DENSHI NYUSATSU CORE SYSTEM provided by Japan Construction Information Center contains multiple vulnerabilities listed below. * Cross-site scripting vulnerability (CWE-79) - CVE-2022-41993 * Cross-site scripting vulnerability (CWE-79) - CVE-2022-46287 * Open redirect vulnerability (CWE-601) - CVE-2022-46288 JVNDB-2022-000097 https://jvn.jp/en/jp/JVN96321933/index.html https://www.cve.org/CVERecord?id=CVE-2022-41993 https://www.cve.org/CVERecord?id=CVE-2022-46287 https://www.cve.org/CVERecord?id=CVE-2022-46288 https://nvd.nist.gov/vuln/detail/CVE-2022-41993 https://nvd.nist.gov/vuln/detail/CVE-2022-46287 https://nvd.nist.gov/vuln/detail/CVE-2022-46288 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:jacic:electronic_bidding_core_system 2024-05-29T17:40+09:00 2022-12-15T15:18+09:00 2024-05-29T17:40+09:00 Redmine vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000096.html Redmine contains a cross-site scripting vulnerability (CWE-79) caused by improper Textile processing. Shiga Takuma of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000096 https://jvn.jp/en/jp/JVN60211811/index.html https://www.cve.org/CVERecord?id=CVE-2022-44637 https://nvd.nist.gov/vuln/detail/CVE-2022-44637 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:redmine:redmine 2024-06-03T16:47+09:00 2022-12-13T14:05+09:00 2024-06-03T16:47+09:00 Multiple vulnerabilities in Buffalo network devices https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002775.html Multiple network devices provided by BUFFALO INC. contain multiple vulnerabilities listed below. * OS Command Injection (CWE-78) - CVE-2022-43466 * OS Command Injection (CWE-78) - CVE-2022-43443 * Hidden Functionality (CWE-912) - CVE-2022-43486 Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2022-002775 http://jvn.jp/en/vu/JVNVU97099584/index.html https://www.cve.org/CVERecord?id=CVE-2022-43466 https://www.cve.org/CVERecord?id=CVE-2022-43443 https://www.cve.org/CVERecord?id=CVE-2022-43486 https://nvd.nist.gov/vuln/detail/CVE-2022-43443 https://nvd.nist.gov/vuln/detail/CVE-2022-43466 https://nvd.nist.gov/vuln/detail/CVE-2022-43486 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/912.html cpe:/o:buffalo_inc:wcr-1166ds_firmware cpe:/o:buffalo_inc:wcr-1166ds_firmware cpe:/o:buffalo_inc:wex-1800ax4ea_firmware cpe:/o:buffalo_inc:wex-1800ax4_firmware cpe:/o:buffalo_inc:wsr-1166dhp2_firmware cpe:/o:buffalo_inc:wsr-1166dhp_firmware cpe:/o:buffalo_inc:wsr-2533dhp2_firmware cpe:/o:buffalo_inc:wsr-2533dhp3-bk_firmware cpe:/o:buffalo_inc:wsr-2533dhpl2-bk_firmware cpe:/o:buffalo_inc:wsr-2533dhplb_firmware cpe:/o:buffalo_inc:wsr-2533dhpls_firmware cpe:/o:buffalo_inc:wsr-2533dhpl_firmware cpe:/o:buffalo_inc:wsr-2533dhp_firmware cpe:/o:buffalo_inc:wsr-3200ax4b_firmware cpe:/o:buffalo_inc:wsr-3200ax4s_firmware cpe:/o:buffalo_inc:wsr-a2533dhp2_firmware cpe:/o:buffalo_inc:wsr-a2533dhp3_firmware cpe:/o:buffalo_inc:wxr-11000xe12_firmware cpe:/o:buffalo_inc:wxr-5700ax7b_firmware cpe:/o:buffalo_inc:wxr-5700ax7s_firmware 2024-02-14T15:45+09:00 2022-12-12T15:28+09:00 2024-02-14T15:45+09:00 Information Exposure Vulnerability in JP1/Automatic Operation https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002771.html An information exposure vulnerability (CVE-2022-34881) exists in JP1/Automatic Operation. JVNDB-2022-002771 https://www.cve.org/CVERecord?id=CVE-2022-34881 https://nvd.nist.gov/vuln/detail/CVE-2022-34881 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:jp1%2fautomatic_operation 2022-12-07T17:30+09:00 2022-12-07T17:30+09:00 2022-12-07T17:30+09:00 Contec SolarView Compact vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002770.html SolarView Compact provided by Contec Co., Ltd. is PV Measurement System. SolarView Compact contains a cross-site scripting vulnerability (CWE-79, CVE-2022-44355) in Check Network Communication Page of the product's web server. As of 2022 December 5, a Proof-of-Concept (PoC) code exploiting this vulnerability has already been made public. JVNDB-2022-002770 http://jvn.jp/en/vu/JVNVU93526386/index.html https://www.cve.org/CVERecord?id=CVE-2022-44355 https://nvd.nist.gov/vuln/detail/CVE-2022-44355 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:contec:solarview_compact_firmware 2024-06-04T17:13+09:00 2022-12-06T15:08+09:00 2024-06-04T17:13+09:00 Multiple vulnerabilities in UNIMO Technology digital video recorders https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002768.html Multiple digital video recorders provided by UNIMO Technology Co., Ltd contain multiple vulnerabilities listed below. * Improper Authentication (CWE-287) - CVE-2022-44620 * OS Command Injection (CWE-78) - CVE-2022-44606 * Hidden Functionality (CWE-912) - CVE-2022-43464 The reporter states that attacks exploiting these vulnerabilities have been observed. Yoshiki Mori, Ushimaru Hayato, Hiromu Kubiura and Masaki Kubo of National Institute of Information and Communications Technology Cybersecurity Research Institute reported these vulnerabilities to the developer and coordinated. After coordination was completed, this case was reported to JPCERT/CC and JPCERT/CC coordinated with the developer for the publication. JVNDB-2022-002768 https://jvn.jp/en/vu/JVNVU94514762/index.html https://www.cve.org/CVERecord?id=CVE-2022-44620 https://www.cve.org/CVERecord?id=CVE-2022-44606 https://www.cve.org/CVERecord?id=CVE-2022-43464 https://nvd.nist.gov/vuln/detail/CVE-2022-43464 https://nvd.nist.gov/vuln/detail/CVE-2022-44606 https://nvd.nist.gov/vuln/detail/CVE-2022-44620 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/912.html cpe:/o:unimo:udr-ja1604_firmware cpe:/o:unimo:udr-ja1608_firmware cpe:/o:unimo:udr-ja1616_firmware 2024-06-03T16:55+09:00 2022-12-02T14:57+09:00 2024-06-03T16:55+09:00 Multiple vulnerabilities in OMRON CX-Programmer https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002765.html CX-Programmer provided by Omron Corporation contains multiple vulnerabilities listed below. * Use-after-free (CWE-416) - CVE-2022-43508, CVE-2023-22277, CVE-2023-22317, CVE-2023-22314 * Out-of-bounds Write (CWE-787) - CVE-2022-43509 * Stack-based Buffer Overflow (CWE-121) - CVE-2022-43667 Michael Heinzl reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2022-002765 https://jvn.jp/en/vu/JVNVU92877622/index.html https://www.cve.org/CVERecord?id=CVE-2022-43508 https://www.cve.org/CVERecord?id=CVE-2022-43509 https://www.cve.org/CVERecord?id=CVE-2022-43667 https://www.cve.org/CVERecord?id=CVE-2023-22277 https://www.cve.org/CVERecord?id=CVE-2023-22314 https://www.cve.org/CVERecord?id=CVE-2023-22317 https://nvd.nist.gov/vuln/detail/CVE-2022-43508 https://nvd.nist.gov/vuln/detail/CVE-2022-43509 https://nvd.nist.gov/vuln/detail/CVE-2022-43667 https://nvd.nist.gov/vuln/detail/CVE-2023-22277 https://nvd.nist.gov/vuln/detail/CVE-2023-22314 https://nvd.nist.gov/vuln/detail/CVE-2023-22317 https://www.cisa.gov/uscert/ics/advisories/icsa-22-356-04 https://cwe.mitre.org/data/definitions/121.html https://cwe.mitre.org/data/definitions/416.html https://cwe.mitre.org/data/definitions/787.html cpe:/a:omron:cx-programmer 2024-04-05T18:15+09:00 2022-11-28T15:40+09:00 2024-04-05T18:15+09:00 Cybozu Remote Service vulnerable to Uncontrolled Resource Consumption https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000095.html Cybozu Remote Service provided by Cybozu, Inc. is vulnerable to uncontrolled resource consumption (CWE-400). Cybozu, Inc. reported this vulnerability to JPCERT/CC to notify users of the solution through JVN. JVNDB-2022-000095 https://jvn.jp/en/jp/JVN87895771/index.html https://www.cve.org/CVERecord?id=CVE-2022-44608 https://nvd.nist.gov/vuln/detail/CVE-2022-44608 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:cybozu:cybozu_remote_service 2024-06-03T16:08+09:00 2022-11-25T14:15+09:00 2024-06-03T16:08+09:00 Multiple cross-site scripting vulnerabilities in baserCMS https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000094.html baserCMS provided by baserCMS Users Community contains multiple cross-site scripting vulnerabilities listed below. * Stored cross-site scripting vulnerability in User management (CWE-79) - CVE-2022-39325 * Stored cross-site scripting vulnerability in Permission Settings (CWE-79) - CVE-2022-41994 * Stored cross-site scripting vulnerability in User group management (CWE-79) - CVE-2022-42486 CVE-2022-39325 YUYA KOTAKE of CARTA HOLDINGS, INC. and Shogo Iyota of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2022-41994, CVE-2022-42486 Shogo Iyota of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000094 https://jvn.jp/en/jp/JVN53682526/index.html https://www.cve.org/CVERecord?id=CVE-2022-39325 https://www.cve.org/CVERecord?id=CVE-2022-41994 https://www.cve.org/CVERecord?id=CVE-2022-42486 https://nvd.nist.gov/vuln/detail/CVE-2022-39325 https://nvd.nist.gov/vuln/detail/CVE-2022-41994 https://nvd.nist.gov/vuln/detail/CVE-2022-42486 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:basercms:basercms 2024-05-31T18:17+09:00 2022-11-25T13:42+09:00 2024-05-31T18:17+09:00 TP-Link RE300 V1 tdpServer vulnerable to improper processing of its input https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000093.html tdpServer of TP-Link RE300 V1 improperly processes its input, possibly resulting to crash (CWE-228). Tomoya Kitagawa and Toshiki Takatera of Ricerca Security, Inc. reported this vulnerability to the developer and coordinated. After coordination was completed, this case was reported to JPCERT/CC and JPCERT/CC coordinated with the developer for the publication. JVNDB-2022-000093 https://jvn.jp/en/jp/JVN29657972/index.html https://www.cve.org/CVERecord?id=CVE-2022-41783 https://nvd.nist.gov/vuln/detail/CVE-2022-41783 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:tp-link:re300-v1_firmware 2024-06-03T16:41+09:00 2022-11-24T14:46+09:00 2024-06-03T16:41+09:00 Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002761.html Trend Micro Incorporated has released security updates for Apex One and Apex One as a Service. Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2022-002761 https://jvn.jp/en/vu/JVNVU90082799 http://jvn.jp/en/vu/JVNVU91848962/index.html https://www.cve.org/CVERecord?id=CVE-2022-44647 https://www.cve.org/CVERecord?id=CVE-2022-44648 https://www.cve.org/CVERecord?id=CVE-2022-44649 https://www.cve.org/CVERecord?id=CVE-2022-44650 https://www.cve.org/CVERecord?id=CVE-2022-44651 https://www.cve.org/CVERecord?id=CVE-2022-44652 https://www.cve.org/CVERecord?id=CVE-2022-44653 https://www.cve.org/CVERecord?id=CVE-2022-44654 https://nvd.nist.gov/vuln/detail/CVE-2022-44647 https://nvd.nist.gov/vuln/detail/CVE-2022-44648 https://nvd.nist.gov/vuln/detail/CVE-2022-44649 https://nvd.nist.gov/vuln/detail/CVE-2022-44650 https://nvd.nist.gov/vuln/detail/CVE-2022-44651 https://nvd.nist.gov/vuln/detail/CVE-2022-44652 https://nvd.nist.gov/vuln/detail/CVE-2022-44653 https://nvd.nist.gov/vuln/detail/CVE-2022-44654 https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/787.html https://cwe.mitre.org/data/definitions/367.html https://cwe.mitre.org/data/definitions/755.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:trendmicro:apex_one 2024-05-31T17:43+09:00 2022-11-21T18:25+09:00 2024-05-31T17:43+09:00 Typora fails to properly neutralize JavaScript code. https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000092.html Typora fails to properly neutralize JavaScript code (CWE-116). Eiji Mori of Flatt Security Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000092 https://jvn.jp/en/jp/JVN26044739/index.html https://www.cve.org/CVERecord?id=CVE-2022-43668 https://nvd.nist.gov/vuln/detail/CVE-2022-43668 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:typora:typora 2024-06-03T15:13+09:00 2022-11-21T15:31+09:00 2024-06-03T15:13+09:00 WordPress Plugin "WordPress Popular Posts" accepts untrusted external inputs to update certain internal variables https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000091.html WordPress Plugin "WordPress Popular Posts" provided by Hector Cabrera accepts untrusted external inputs to update certain internal variables (CWE-454). Tsubasa Iinuma of Origami Systems reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000091 https://jvn.jp/en/jp/JVN13927745/index.html https://www.cve.org/CVERecord?id=CVE-2022-43468 https://nvd.nist.gov/vuln/detail/CVE-2022-43468 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:wordpress_popular_posts_project:wordpress_popular_posts 2022-11-18T15:14+09:00 2022-11-18T15:14+09:00 2022-11-18T15:14+09:00 RICOH Aficio SP 4210N vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000089.html Aficio SP 4210N provided by RICOH COMPANY, LTD. contains a cross-site scripting vulnerability (CWE-79) in Web Image Monitor. Yudai Morii, Takaya Noma, Hiroki Yasui, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000089 https://jvn.jp/en/jp/JVN24659622/index.html https://www.cve.org/CVERecord?id=CVE-2022-37406 https://nvd.nist.gov/vuln/detail/CVE-2022-37406 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:ricoh:ipsio_sp_4210_firmware 2022-11-17T11:15+09:00 2022-11-17T11:15+09:00 2022-11-17T11:15+09:00 Multiple vulnerabilities in Movable Type https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000090.html Movable Type provided by Six Apart Ltd. contains multiple vulnerabilities listed below. * Improper Validation of Syntactic Correctness of Input (CWE-1286) - CVE-2022-45113 * Cross-site Scripting (CWE-79) - CVE-2022-45122 * Improper Neutralization of Server-Side Includes (SSI) Within a Web Page (CWE-97) - CVE-2022-4366 CVE-2022-45113, CVE-2022-45122 SHIGA TAKUMA of BroadBand Security, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2022-43660 Six Apart Ltd. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Six Apart Ltd. coordinated under the Information Security Early Warning Partnership. JVNDB-2022-000090 https://jvn.jp/en/jp/JVN37014768/index.html https://www.cve.org/CVERecord?id=CVE-2022-45113 https://www.cve.org/CVERecord?id=CVE-2022-45122 https://www.cve.org/CVERecord?id=CVE-2022-43660 https://nvd.nist.gov/vuln/detail/CVE-2022-43660 https://nvd.nist.gov/vuln/detail/CVE-2022-45113 https://nvd.nist.gov/vuln/detail/CVE-2022-45122 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:sixapart:movable_type 2024-06-03T15:31+09:00 2022-11-16T17:07+09:00 2024-06-03T15:31+09:00 TERASOLUNA Global Framework and TERASOLUNA Server Framework for Java (Rich) vulnerable to ClassLoader manipulation https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000088.html The past versions of TERASOLUNA Global Framework and TERASOLUNA Server Framework for Java (Rich) are vulnerable to a ClassLoader manipulation vulnerability due to using the old version of Spring Framework which contains the vulnerability. According to the developer, this vulnerability is caused by an improper input validation issue (CWE-20) in the binding mechanism of Spring MVC. NTT DATA Corporation reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and NTT DATA Corporation coordinated under the Information Security Early Warning Partnership. JVNDB-2022-000088 https://jvn.jp/en/jp/JVN54728399/index.html https://www.cve.org/CVERecord?id=CVE-2022-43484 https://nvd.nist.gov/vuln/detail/CVE-2022-43484 https://github.com/spring-projects/spring-framework/issues/15724 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:nttdata:terasoluna_global_framework cpe:/a:nttdata:terasoluna_server_framework_for_java_%28rich%29 2024-06-06T16:11+09:00 2022-11-14T16:45+09:00 2024-06-06T16:11+09:00 Aiphone Video Multi-Tenant System Entrance Stations vulnerable to information disclosure https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000086.html Video Multi-Tenant System Entrance Stations provided by AIPHONE CO., LTD. contain an information disclosure vulnerability (CWE-200). Cameron Palmer of PROMON reported this vulnerability to Aiphone Co., Ltd. and coordinated. Aiphone Co., Ltd. and JPCERT/CC published respective advisories in order to notify users of this vulnerability. JVNDB-2022-000086 http://jvn.jp/en/jp/JVN75437943/index.html https://www.cve.org/CVERecord?id=CVE-2022-40903 https://nvd.nist.gov/vuln/detail/CVE-2022-40903 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:aiphone:gt-db-vn_firmware cpe:/o:aiphone:gt-dmb-lvn_firmware cpe:/o:aiphone:gt-dmb-n_firmware cpe:/o:aiphone:gt-dmb_firmware 2024-06-06T17:37+09:00 2022-11-10T13:40+09:00 2024-06-06T17:37+09:00 Multiple vulnerabilities in OMRON products https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002691.html Machine automation controller NJ/NX series, Automation software "Sysmac Studio", and programmable terminal (PT) NA series provided by OMRON Corporation contain multiple vulnerabilities in the communication function. The vulnerabilities are as follows. * Use of Hard-coded Credentials (CWE-798) - CVE-2022-34151 * Authentication Bypass by Capture-replay (CWE-294) - CVE-2022-33208 * Active Debug Code (CWE-489) - CVE-2022-33971 OMRON Corporation reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2022-002691 https://jvn.jp/en/vu/JVNVU97050784/index.html https://www.cve.org/CVERecord?id=CVE-2022-34151 https://www.cve.org/CVERecord?id=CVE-2022-33208 https://www.cve.org/CVERecord?id=CVE-2022-33971 https://nvd.nist.gov/vuln/detail/CVE-2022-34151 https://nvd.nist.gov/vuln/detail/CVE-2022-33208 https://nvd.nist.gov/vuln/detail/CVE-2022-33971 https://www.cisa.gov/uscert/ncas/alerts/aa22-103a https://cwe.mitre.org/data/definitions/294.html https://cwe.mitre.org/data/definitions/489.html https://cwe.mitre.org/data/definitions/798.html cpe:/a:omron:automation_software_sysmac_studio cpe:/a:omron:machine_automation_controller_nj_series cpe:/a:omron:machine_automation_controller_nx_series cpe:/a:omron:programmable_terminal_na_series 2022-11-10T09:46+09:00 2022-11-10T09:46+09:00 2022-11-10T09:46+09:00 WordPress Plugin "Salon booking system" vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000085.html WordPress Plugin "Salon booking system" contains a cross-site scripting vulnerability (CWE-79). Gen Sato of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000085 http://jvn.jp/en/jp/JVN59663854/index.html https://www.cve.org/CVERecord?id=CVE-2022-43487 https://nvd.nist.gov/vuln/detail/CVE-2022-43487 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:salonbookingsystem:salon_booking_system 2024-06-05T18:07+09:00 2022-11-08T15:07+09:00 2024-06-05T18:07+09:00 Multiple vulnerabilities in WordPress https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000087.html WordPress contains multiple vulnerabilities listed below which are to the WordPress Post by Email Feature. <ul><li>Stored Cross-site scripting (CWE-79) - CVE-2022-43497</li><li>Stored Cross-site scripting (CWE-79) - CVE-2022-43500</li><li>Improper authentication (CWE-287) - CVE-2022-43504</li></ul> Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000087 http://jvn.jp/en/jp/JVN09409909/index.html https://www.cve.org/CVERecord?id=CVE-2022-43497 https://www.cve.org/CVERecord?id=CVE-2022-43500 https://www.cve.org/CVERecord?id=CVE-2022-43504 https://nvd.nist.gov/vuln/detail/CVE-2022-43497 https://nvd.nist.gov/vuln/detail/CVE-2022-43500 https://nvd.nist.gov/vuln/detail/CVE-2022-43504 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:wordpress:wordpress 2024-06-06T16:27+09:00 2022-11-08T14:59+09:00 2024-06-06T16:27+09:00 Multiple vulnerabilities in the web interfaces of Kyocera Document Solutions MFPs and printers https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000079.html The web interface "Command Center" of multiple MFPs and printers provided by KYOCERA Document Solutions Inc. contain multiple vulnerabilities listed below. <ul> <li><b>Session Information Easily Guessable (CWE-287)</b> - CVE-2022-41798</li> <li><b>Missing authorization (CWE-425)</b> - CVE-2022-41807</li> <li><b>Stored cross-site scripting (CWE-79)</b> - CVE-2022-41830</li> </ul> Takayuki Sasaki, Takaya Noma and Katsunari Yoshioka of Yokohama National University reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000079 https://jvn.jp/en/jp/JVN46345126/index.html https://www.cve.org/CVERecord?id=CVE-2022-41798 https://www.cve.org/CVERecord?id=CVE-2022-41807 https://www.cve.org/CVERecord?id=CVE-2022-41830 https://nvd.nist.gov/vuln/detail/CVE-2022-41798 https://nvd.nist.gov/vuln/detail/CVE-2022-41807 https://nvd.nist.gov/vuln/detail/CVE-2022-41830 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:kyocera_document_solutions_multiple_product 2024-06-06T17:01+09:00 2022-11-01T14:51+09:00 2024-06-06T17:01+09:00 Multiple vulnerabilities in FUJI SOFT network devices https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000084.html USB dongle +F FS040U and mobile routers +F FS020W/+F FS030W/+F FS040W provided by FUJI SOFT INCORPORATED contain multiple vulnerabilities listed below. <ul><li>Plaintext Storage of a Password (CWE-256) - CVE-2022-43442<li>Cross-Site Request Forgery (CWE-352) - CVE-2022-43470</ul> Tomohisa Hasegawa of Canon IT Solutions Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000084 http://jvn.jp/en/jp/JVN74285622/index.html https://www.cve.org/CVERecord?id=CVE-2022-43442 https://www.cve.org/CVERecord?id=CVE-2022-43470 https://nvd.nist.gov/vuln/detail/CVE-2022-43442 https://nvd.nist.gov/vuln/detail/CVE-2022-43470 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:fsi:fs020w_firmware cpe:/o:fsi:fs030w_firmware cpe:/o:fsi:fs040u_firmware cpe:/o:fsi:fs040w_firmware 2024-06-06T16:48+09:00 2022-10-28T15:12+09:00 2024-06-06T16:48+09:00 Multiple vulnerabilities in SHIRASAGI https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000083.html SHIRASAGI provided by SHIRASAGI Project contains multiple vulnerabilities listed below. <ul> <li>Open Redirect (CWE-601) - CVE-2022-43479 <li>Stored Cross-site Scripting (CWE-79) - CVE-2022-43499</ul> SHIGA TAKUMA of BroadBand Security, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000083 http://jvn.jp/en/jp/JVN86350682/index.html https://www.cve.org/CVERecord?id=CVE-2022-43479 https://www.cve.org/CVERecord?id=CVE-2022-43499 https://nvd.nist.gov/vuln/detail/CVE-2022-43479 https://nvd.nist.gov/vuln/detail/CVE-2022-43499 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ss-proj:shirasagi cpe:/a:ss-proj:shirasagi 2024-06-05T16:06+09:00 2022-10-25T15:10+09:00 2024-06-05T16:06+09:00 Multiple vulnerabilities in nadesiko3 https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000082.html Nadesiko3 provided by kujirahand contains multiple vulnerabilities listed below. <ul> <li>OS command injection vulnerability in processing compression and decompression (CWE-78) - CVE-2022-41642 </li> <li>Improper check or handling of exceptional conditions in nako3edit (CWE-703) - CVE-2022-41777 </li> <li>OS command injection vulnerability via &quot;file&quot; parameter in nako3edit (CWE-78) - CVE-2022-42496 </li> </ul> Satoki Tsuji reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000082 https://jvn.jp/en/jp/JVN56968681/index.html https://www.cve.org/CVERecord?id=CVE-2022-41642 https://www.cve.org/CVERecord?id=CVE-2022-41777 https://www.cve.org/CVERecord?id=CVE-2022-42496 https://nvd.nist.gov/vuln/detail/CVE-2022-41642 https://nvd.nist.gov/vuln/detail/CVE-2022-41777 https://nvd.nist.gov/vuln/detail/CVE-2022-42496 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:kujirahand:nadesiko3 2024-06-05T17:28+09:00 2022-10-20T16:58+09:00 2024-06-05T17:28+09:00 Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002544.html Trend Micro Incorporated has released security updates for Apex One and Apex One as a Service. Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2022-002544 http://jvn.jp/en/vu/JVNVU97131578/index.html https://www.cve.org/CVERecord?id=CVE-2022-41744 https://www.cve.org/CVERecord?id=CVE-2022-41745 https://www.cve.org/CVERecord?id=CVE-2022-41746 https://www.cve.org/CVERecord?id=CVE-2022-41747 https://www.cve.org/CVERecord?id=CVE-2022-41748 https://www.cve.org/CVERecord?id=CVE-2022-41749 https://nvd.nist.gov/vuln/detail/CVE-2022-41744 https://nvd.nist.gov/vuln/detail/CVE-2022-41745 https://nvd.nist.gov/vuln/detail/CVE-2022-41746 https://nvd.nist.gov/vuln/detail/CVE-2022-41747 https://nvd.nist.gov/vuln/detail/CVE-2022-41748 https://nvd.nist.gov/vuln/detail/CVE-2022-41749 https://cwe.mitre.org/data/definitions/367.html https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/425.html https://cwe.mitre.org/data/definitions/295.html https://cwe.mitre.org/data/definitions/276.html https://cwe.mitre.org/data/definitions/346.html cpe:/a:trendmicro:apex_one 2024-06-13T13:58+09:00 2022-10-20T16:18+09:00 2024-06-13T13:58+09:00 Stack-based buffer overflow vulnerability in Yokogawa Test & Measurement WTViewerE https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002537.html WTViewerE provided by Yokogawa Test & Measurement Corporation contains a stack-based buffer overflow vulnerability (CWE-121). Michael Heinzl reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2022-002537 http://jvn.jp/en/vu/JVNVU99955870/index.html https://www.cve.org/CVERecord?id=CVE-2022-40984 https://nvd.nist.gov/vuln/detail/CVE-2022-40984 https://cwe.mitre.org/data/definitions/121.html cpe:/a:misc:yokogawa_test_wtviewerefree cpe:/a:misc:yokogawa_test_wtviewere_761941 2024-06-12T16:54+09:00 2022-10-19T16:23+09:00 2024-06-12T16:54+09:00 Lemon8 App fails to restrict access permissions https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000081.html Lemon8 by ByteDance K.K. provides the function to access a requested URL using Custom URL Scheme/DeepLink. The App does not restrict access to the function properly (CWE-939) which may be exploited to direct the App to access any sites. Ryo Sato of BroadBand Security,Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000081 https://jvn.jp/en/jp/JVN10921428/index.html https://www.cve.org/CVERecord?id=CVE-2022-41797 https://nvd.nist.gov/vuln/detail/CVE-2022-41797 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:bytedance_lemon8 2024-06-12T16:39+09:00 2022-10-19T14:08+09:00 2024-06-12T16:39+09:00 Android App "IIJ SmartKey" vulnerable to information disclosure https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000080.html Android App "IIJ SmartKey" provided by Internet Initiative Japan Inc. contains an information disclosure vulnerability (CWE-200). Naoaki Iwakiri reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000080 https://jvn.jp/en/jp/JVN74534998/index.html https://www.cve.org/CVERecord?id=CVE-2022-41986 https://nvd.nist.gov/vuln/detail/CVE-2022-41986 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:iij:iij_smartkey 2024-06-27T13:40+09:00 2022-10-14T13:57+09:00 2024-06-27T13:40+09:00 Multiple vulnerabilities in SVMPC1 and SVMPC2 https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002451.html SVMPC1 and SVMPC2 provided by Daikin Holdings Singapore Pte Ltd. contain multiple vulnerabilities listed below. * Use of hard-coded password (CWE-259) - CVE-2022-41653 * Improper access control (CWE-284) - CVE-2022-38355 JVNDB-2022-002451 https://jvn.jp/en/vu/JVNVU93424017/index.html https://www.cve.org/CVERecord?id=CVE-2022-41653 https://www.cve.org/CVERecord?id=CVE-2022-38355 https://nvd.nist.gov/vuln/detail/CVE-2022-38355 https://nvd.nist.gov/vuln/detail/CVE-2022-41653 https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-02 https://cwe.mitre.org/data/definitions/259.html https://cwe.mitre.org/data/definitions/284.html cpe:/a:daikinlatam:svmpc1 cpe:/a:daikinlatam:svmpc2 2024-05-30T16:38+09:00 2022-10-13T17:27+09:00 2024-05-30T16:38+09:00 bingo!CMS vulnerable to authentication bypass https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000078.html bingo!CMS provided by Shift Tech Inc. contains an authentication bypass vulnerability (CWE-288) in some of the management functions. Shift Tech Inc. states that attacks exploiting this vulnerability have been observed. Shift Tech Inc. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Shift Tech Inc. coordinated under the Information Security Early Warning Partnership. JVNDB-2022-000078 http://jvn.jp/en/jp/JVN74592196/index.html https://www.cve.org/CVERecord?id=CVE-2022-42458 https://nvd.nist.gov/vuln/detail/CVE-2022-42458 https://www.ipa.go.jp/security/ciadr/vul/20221011-jvn.html https://www.jpcert.or.jp/english/at/2022/at220026.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:shift-tech:bingo%21cms 2024-05-30T17:57+09:00 2022-10-11T17:49+09:00 2024-05-30T17:57+09:00 Multiple vulnerabilities in Trend Micro Deep Security and Cloud One - Workload Security agents for Windows https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002448.html Trend Micro Incorporated has released a security update for Trend Micro Deep Security and Cloud One - Workload Security agents for Windows. Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2022-002448 https://jvn.jp/en/vu/JVNVU99960963/index.html https://www.cve.org/CVERecord?id=CVE-2022-40707 https://www.cve.org/CVERecord?id=CVE-2022-40708 https://www.cve.org/CVERecord?id=CVE-2022-40709 https://www.cve.org/CVERecord?id=CVE-2022-40710 https://nvd.nist.gov/vuln/detail/CVE-2022-40707 https://nvd.nist.gov/vuln/detail/CVE-2022-40708 https://nvd.nist.gov/vuln/detail/CVE-2022-40709 https://nvd.nist.gov/vuln/detail/CVE-2022-40710 https://cwe.mitre.org/data/definitions/125.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:trendmicro:cloud_one_workload_security cpe:/a:trendmicro:deep_security_agent 2024-06-13T14:30+09:00 2022-10-11T17:02+09:00 2024-06-13T14:30+09:00 The installer of Sony Content Transfer may insecurely load Dynamic Link Libraries https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000077.html The installer of Content Transfer (for Windows) provided by Sony Corporation contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427). Tomohisa Hasegawa of Canon IT Solutions Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000077 https://jvn.jp/en/jp/JVN40620121/index.html https://jvn.jp/en/ta/JVNTA91240916/ https://www.cve.org/CVERecord?id=CVE-2022-41796 https://nvd.nist.gov/vuln/detail/CVE-2022-41796 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:sony:content_transfer 2024-06-12T12:12+09:00 2022-10-11T15:08+09:00 2024-06-12T12:12+09:00 Growi vulnerable to improper access control https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000076.html GROWI provided by WESEEK, Inc. contains an improper access control vulnerability (CWE-284). Kenta Yamamoto of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000076 http://jvn.jp/en/jp/JVN00845253/index.html https://www.cve.org/CVERecord?id=CVE-2022-41799 https://nvd.nist.gov/vuln/detail/CVE-2022-41799 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:weseek:growi 2024-06-12T12:04+09:00 2022-10-07T14:30+09:00 2024-06-12T12:04+09:00 IPFire WebUI vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000075.html The web user interface of IPFire provided by IPFire Project contains multiple stored cross-site scripting vulnerabilities (CWE-79). This analysis assumes a scenario where one administrative user prepares malicious content, and then another administrative user accesses this content, resulting in a cross-site scripting attack. Satoshi Horikoshi reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000075 http://jvn.jp/en/jp/JVN15411362/index.html https://www.cve.org/CVERecord?id=CVE-2022-36368 https://nvd.nist.gov/vuln/detail/CVE-2022-36368 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ipfire:ipfire 2024-06-12T14:28+09:00 2022-10-06T13:05+09:00 2024-06-12T14:28+09:00 Multiple vulnerabilities in Buffalo network devices https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002444.html Multiple network devices provided by Buffalo Inc. contain multiple vulnerabilities listed below. * Hidden Functionality (CWE-912) - CVE-2022-39044 * Use of Hard-coded Credentials (CWE-798) - CVE-2022-34840 * Authentication Bypass (CWE-288) - CVE-2022-4096 Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2022-002444 https://jvn.jp/en/vu/JVNVU92805279/index.html https://www.cve.org/CVERecord?id=CVE-2022-39044 https://www.cve.org/CVERecord?id=CVE-2022-34840 https://www.cve.org/CVERecord?id=CVE-2022-40966 https://nvd.nist.gov/vuln/detail/CVE-2022-34840 https://nvd.nist.gov/vuln/detail/CVE-2022-39044 https://nvd.nist.gov/vuln/detail/CVE-2022-40966 https://cwe.mitre.org/data/definitions/288.html https://cwe.mitre.org/data/definitions/798.html https://cwe.mitre.org/data/definitions/912.html cpe:/o:buffalo_inc:bhr-4grv_firmware cpe:/o:buffalo_inc:bhr-4grv_firmware cpe:/o:buffalo_inc:dwr-hp-g300nh_firmware cpe:/o:buffalo_inc:dwr-pg_firmware cpe:/o:buffalo_inc:fs-600dhp_firmware cpe:/o:buffalo_inc:fs-600dhp_firmware cpe:/o:buffalo_inc:fs-g300n_firmware cpe:/o:buffalo_inc:fs-g300n_firmware cpe:/o:buffalo_inc:fs-hp-g300n_firmware cpe:/o:buffalo_inc:fs-hp-g300n_firmware cpe:/o:buffalo_inc:fs-r600dhp_firmware cpe:/o:buffalo_inc:fs-r600dhp_firmware cpe:/o:buffalo_inc:hw-450hp-zwe_firmware cpe:/o:buffalo_inc:wcr-300_firmware cpe:/o:buffalo_inc:wem-1266_firmware cpe:/o:buffalo_inc:wem-1266_firmwpware cpe:/o:buffalo_inc:wer-a54g54_firmware cpe:/o:buffalo_inc:wer-ag54_firmware cpe:/o:buffalo_inc:wer-am54g54_firmware cpe:/o:buffalo_inc:wer-amg54_firmware cpe:/o:buffalo_inc:whr-300hp_firmware cpe:/o:buffalo_inc:whr-300_firmware cpe:/o:buffalo_inc:whr-am54g54_firmware cpe:/o:buffalo_inc:whr-amg54_firmware cpe:/o:buffalo_inc:whr-ampg_firmware cpe:/o:buffalo_inc:whr-g300n_firmware cpe:/o:buffalo_inc:whr-g301n_firmware cpe:/o:buffalo_inc:whr-g54s-ni_firmware cpe:/o:buffalo_inc:whr-g54s_firmware cpe:/o:buffalo_inc:whr-g_firmware cpe:/o:buffalo_inc:whr-hp-ampg_firmware cpe:/o:buffalo_inc:whr-hp-g300n_firmware cpe:/o:buffalo_inc:whr-hp-g54_firmware cpe:/o:buffalo_inc:whr-hp-gn_firmware cpe:/o:buffalo_inc:whr-hp-g_firmware cpe:/o:buffalo_inc:wlae-ag300n_firmware cpe:/o:buffalo_inc:wlae-ag300n_firmware cpe:/o:buffalo_inc:wli-h4-d600_firmware cpe:/o:buffalo_inc:wli-tx4-ag300n_firmware cpe:/o:buffalo_inc:wpl-05g300_firmware cpe:/o:buffalo_inc:wrm-d2133hp_firmware cpe:/o:buffalo_inc:wrm-d2133hs_firmware cpe:/o:buffalo_inc:ws024bf-nw_firmware cpe:/o:buffalo_inc:ws024bf_firmware cpe:/o:buffalo_inc:wtr-m2133hp_firmware cpe:/o:buffalo_inc:wtr-m2133hs_firmware cpe:/o:buffalo_inc:wxr-1750dhp2_firmware cpe:/o:buffalo_inc:wxr-1750dhp_firmware cpe:/o:buffalo_inc:wxr-1900dhp2_firmware cpe:/o:buffalo_inc:wxr-1900dhp3_firmware cpe:/o:buffalo_inc:wxr-1900dhp_firmware cpe:/o:buffalo_inc:wxr-5950ax12_firmware cpe:/o:buffalo_inc:wxr-6000ax12b_firmware cpe:/o:buffalo_inc:wxr-6000ax12s_firmware cpe:/o:buffalo_inc:wzr-1166dhp2_firmware cpe:/o:buffalo_inc:wzr-1166dhp_firmware cpe:/o:buffalo_inc:wzr-1750dhp2_firmware cpe:/o:buffalo_inc:wzr-1750dhp_firmware cpe:/o:buffalo_inc:wzr-300hp_firmware cpe:/o:buffalo_inc:wzr-300hp_firmware cpe:/o:buffalo_inc:wzr-450hp-cwt_firmware cpe:/o:buffalo_inc:wzr-450hp-ub_firmware cpe:/o:buffalo_inc:wzr-450hp_firmware cpe:/o:buffalo_inc:wzr-450hp_firmware cpe:/o:buffalo_inc:wzr-600dhp2_firmware cpe:/o:buffalo_inc:wzr-600dhp3_firmware cpe:/o:buffalo_inc:wzr-600dhp_firmware cpe:/o:buffalo_inc:wzr-600dhp_firmware cpe:/o:buffalo_inc:wzr-900dhp2_firmware cpe:/o:buffalo_inc:wzr-900dhp_firmware cpe:/o:buffalo_inc:wzr-900dhp_firmware cpe:/o:buffalo_inc:wzr-agl300nh_firmware cpe:/o:buffalo_inc:wzr-ampg144nh_firmware cpe:/o:buffalo_inc:wzr-ampg300nh_firmware cpe:/o:buffalo_inc:wzr-d1100h_firmware cpe:/o:buffalo_inc:wzr-g144nh_firmware cpe:/o:buffalo_inc:wzr-g144n_firmware cpe:/o:buffalo_inc:wzr-hp-ag300h_firmware cpe:/o:buffalo_inc:wzr-hp-ag300h_firmware cpe:/o:buffalo_inc:wzr-hp-g300nh_firmware cpe:/o:buffalo_inc:wzr-hp-g301nh_firmware cpe:/o:buffalo_inc:wzr-hp-g302h_firmware cpe:/o:buffalo_inc:wzr-hp-g302h_firmware cpe:/o:buffalo_inc:wzr-hp-g450h_firmware cpe:/o:buffalo_inc:wzr-s1750dhp_firmware cpe:/o:buffalo_inc:wzr-s600dhp_firmware cpe:/o:buffalo_inc:wzr-s900dhp_firmware cpe:/o:buffalo_inc:wzr2-g108_firmware cpe:/o:buffalo_inc:wzr2-g300n_firmware 2022-10-13T16:28+09:00 2022-10-05T17:44+09:00 2022-10-13T16:28+09:00 Privilege Escalation Vulnerability in Hitachi Storage Plug-in for VMware vCenter https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002443.html A privilege escalation vulnerability (CVE-2022-2637) exists in Hitachi Storage Plug-in for VMware vCenter. JVNDB-2022-002443 https://www.cve.org/CVERecord?id=CVE-2022-2637 https://nvd.nist.gov/vuln/detail/CVE-2022-2637 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:storage_plug-in 2022-10-05T17:28+09:00 2022-10-05T17:28+09:00 2022-10-05T17:28+09:00 BookStack vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000074.html BookStack contains a cross-site scripting vulnerability (CWE-79). Kenichi Okuno of Mitsui Bussan Secure Directions, Inc reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000074 http://jvn.jp/en/jp/JVN78862034/index.html https://www.cve.org/CVERecord?id=CVE-2022-40690 https://nvd.nist.gov/vuln/detail/CVE-2022-40690 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:bookstackapp:bookstack 2024-06-12T14:07+09:00 2022-09-30T14:48+09:00 2024-06-12T14:07+09:00 OpenAM (OpenAM Consortium Edition) vulnerable to open redirect https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002367.html OpenAM (OpenAM Consortium Edition) provided by OpenAM Consortium contains an open redirect vulnerability (CWE-601). OpenAM Consortium reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and OpenAM Consortium coordinated under the Information Security Early Warning Partnership. JVNDB-2022-002367 http://jvn.jp/en/vu/JVNVU99326969/index.html https://www.cve.org/CVERecord?id=CVE-2022-31735 https://nvd.nist.gov/vuln/detail/CVE-2022-31735 https://cwe.mitre.org/data/definitions/601.html cpe:/a:osstech:openam 2024-06-13T11:39+09:00 2022-09-16T15:30+09:00 2024-06-13T11:39+09:00 Multiple vulnerabilities in EC-CUBE https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000073.html EC-CUBE provided by EC-CUBE CO.,LTD. contains multiple vulnerabilities listed below. * Directory traversal vulnerability (CWE-22) - CVE-2022-40199 * DOM-based cross-site scripting vulnerability (CWE-79) - CVE-2022-38975 Noriaki Iwasaki of Cyber Defense Institute, Inc. reported these vulnerabilities to EC-CUBE CO.,LTD. and EC-CUBE CO.,LTD. reported them to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2022-000073 http://jvn.jp/en/jp/JVN21213852/index.html https://www.cve.org/CVERecord?id=CVE-2022-40199 https://www.cve.org/CVERecord?id=CVE-2022-38975 https://nvd.nist.gov/vuln/detail/CVE-2022-40199 https://nvd.nist.gov/vuln/detail/CVE-2022-38975 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ec-cube:ec-cube 2024-06-13T11:09+09:00 2022-09-15T16:30+09:00 2024-06-13T11:09+09:00 EC-CUBE plugin "Product Image Bulk Upload Plugin" vulnerable to insufficient verification in uploading files https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000072.html EC-CUBE plugin "Product Image Bulk Upload Plugin", a plugin that enables to upload image files, provided by EC-CUBE CO.,LTD. contains an insufficient verification vulnerability when uploading files (CWE-20). Exploiting this vulnerability allows a remote unauthenticated attacker to upload arbitrary files other than image files. EC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership. JVNDB-2022-000072 http://jvn.jp/en/jp/JVN30900552/index.html https://www.cve.org/CVERecord?id=CVE-2022-37346 https://nvd.nist.gov/vuln/detail/CVE-2022-37346 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ec-cube:product_image_bulk_upload 2024-06-13T11:03+09:00 2022-09-15T16:13+09:00 2024-06-13T11:03+09:00 Multiple vulnerabilities in Trend Micro Apex One and Trend Micro Apex One as a Service https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000071.html Trend Micro Apex One and Trend Micro Apex One as a Service provided by Trend Micro Incorporated contain multiple vulnerabilities listed below. * Improper validation in some components of the rollback mechanism (CWE-20) - CVE-2022-40139 * Improper access control (CWE-284) - CVE-2022-40140 * Information exposure (CWE-200) - CVE-2022-40141 * Improper link resolution before file access (CWE-59) - CVE-2022-40142 * Improper link resolution before file access (CWE-59) - CVE-2022-40143 * Improper authentication (CWE-287) - CVE-2022-40144 Trend Micro Incorporated states that attacks exploiting CVE-2022-40139 have been observed. CVE-2022-40139, CVE-2022-40140, CVE-2022-40141, CVE-2022-40142, CVE-2022-40143 Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. CVE-2022-40144 Akinori Takeuchi of Cyber Defense Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000071 https://jvn.jp/en/jp/JVN36454862/index.html https://www.cve.org/CVERecord?id=CVE-2022-40139 https://www.cve.org/CVERecord?id=CVE-2022-40140 https://www.cve.org/CVERecord?id=CVE-2022-40141 https://www.cve.org/CVERecord?id=CVE-2022-40142 https://www.cve.org/CVERecord?id=CVE-2022-40143 https://www.cve.org/CVERecord?id=CVE-2022-40144 https://nvd.nist.gov/vuln/detail/CVE-2022-40139 https://nvd.nist.gov/vuln/detail/CVE-2022-40140 https://nvd.nist.gov/vuln/detail/CVE-2022-40141 https://nvd.nist.gov/vuln/detail/CVE-2022-40142 https://nvd.nist.gov/vuln/detail/CVE-2022-40143 https://nvd.nist.gov/vuln/detail/CVE-2022-40144 https://www.ipa.go.jp/security/ciadr/vul/20220913-jvn.html https://www.jpcert.or.jp/english/at/2022/at220023.html https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:trendmicro:apex_one 2024-06-13T11:34+09:00 2022-09-14T18:15+09:00 2024-06-13T11:34+09:00 DoS Vulnerability in uCosminexus TP1/Client/J and Cosminexus Service Coordinator https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002364.html DoS Vulnerability have been found in uCosminexus TP1/Client/J and Cosminexus Service Coordinator. JVNDB-2022-002364 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:ucosminexus_service_architect cpe:/a:hitachi:ucosminexus_service_platform cpe:/a:hitachi:ucosminexus_service_platform_64 cpe:/a:hitachi:ucosminexus_tp1_client_j 2022-09-14T11:34+09:00 2022-09-14T11:34+09:00 2022-09-14T11:34+09:00 Movable Type plugin A-Form vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000070.html Movable Type plugin A-Form provided by ARK-Web co., ltd. contains a cross-site scripting vulnerability (CWE-79). hibiki moriyama of STNet, Incorporated reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000070 http://jvn.jp/en/jp/JVN48120704/index.html https://www.cve.org/CVERecord?id=CVE-2022-38972 https://nvd.nist.gov/vuln/detail/CVE-2022-38972 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ark-web:a-form cpe:/a:ark-web:a-form 2024-06-13T13:49+09:00 2022-09-09T15:01+09:00 2024-06-13T13:49+09:00 SYNCK GRAPHICA Mailform Pro CGI vulnerable to information disclosure https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000068.html Mailform Pro CGI provided by SYNCK GRAPHICA contains an information disclosure vulnerability (CWE-200). Thanks module of this product saves user input data for a certain period of time. The time is set to 30 seconds by default in configs/thanks.cgi file. To exploit this vulerability, it is requireid for an attacker to access the affected product within in 30 seconds. Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000068 http://jvn.jp/en/jp/JVN34205166/index.html https://www.cve.org/CVERecord?id=CVE-2022-38400 https://nvd.nist.gov/vuln/detail/CVE-2022-38400 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:synck_graphica:mailform_pro_cgi 2024-06-13T16:00+09:00 2022-09-05T15:22+09:00 2024-06-13T16:00+09:00 Multiple vulnerabilities in Contec FLEXLAN FX3000 and FX2000 series https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002346.html FLEXLAN FX3000 and FX2000 series provided by Contec Co., Ltd. contain multiple vulnerabilities listed below. * Hidden Functionality (CWE-912) - CVE-2022-36158 * Use of Hard-coded Credentials (CWE-798) - CVE-2022-36159 Thomas J. Knudsen and Samy Younsi of Necrum Security Labs reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2022-002346 http://jvn.jp/en/vu/JVNVU98305100/index.html https://www.cve.org/CVERecord?id=CVE-2022-36158 https://www.cve.org/CVERecord?id=CVE-2022-36159 https://nvd.nist.gov/vuln/detail/CVE-2022-36158 https://nvd.nist.gov/vuln/detail/CVE-2022-36159 https://cwe.mitre.org/data/definitions/798.html https://cwe.mitre.org/data/definitions/912.html cpe:/o:contec:flexlan_fx2000_firmware cpe:/o:contec:flexlan_fx3000_firmware 2022-09-02T18:08+09:00 2022-09-02T18:08+09:00 2022-09-02T18:08+09:00 PowerCMS XMLRPC API vulnerable to command injection https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000069.html PowerCMS XMLRPC API provided by Alfasado Inc. contains a command injection vulnerability (CWE-74). Sending a specially crafted message by POST method to PowerCMS XMLRPC API may allow arbitrary Perl script execution, and an arbitrary OS command may be executed through it. According to the developer, it is unable to execute a command with an arbitrary value added to its argument, even if the vulnerability is exploited. Alfasado Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Alfasado Inc. coordinated under the Information Security Early Warning Partnership. JVNDB-2022-000069 https://jvn.jp/en/jp/JVN76024879/index.html https://www.cve.org/CVERecord?id=CVE-2022-33941 https://nvd.nist.gov/vuln/detail/CVE-2022-33941 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:alfasado:powercms 2024-06-13T11:44+09:00 2022-09-02T15:49+09:00 2024-06-13T11:44+09:00 Multiple vulnerabilities in CentreCOM AR260S V2 https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000066.html CentreCOM AR260S V2 provided by Allied Telesis K.K. contains multiple vulnerabilities listed below. * OS command injection vulnerability in GUI setting page (CWE-78) - CVE-2022-35273 * Use of hard-coded credentials for the telnet server (CWE-798) - CVE-2022-38394 * Undocumented hidden command that can be excuted from the telnet function (CWE-912) - CVE-2022-34869 * OS command injection vulnerability in the telnet function (CWE-78) - CVE-2022-38094 Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000066 https://jvn.jp/en/jp/JVN45473612/index.html https://www.cve.org/CVERecord?id=CVE-2022-35273 https://www.cve.org/CVERecord?id=CVE-2022-38394 https://www.cve.org/CVERecord?id=CVE-2022-34869 https://www.cve.org/CVERecord?id=CVE-2022-38094 https://nvd.nist.gov/vuln/detail/CVE-2022-34869 https://nvd.nist.gov/vuln/detail/CVE-2022-35273 https://nvd.nist.gov/vuln/detail/CVE-2022-38094 https://nvd.nist.gov/vuln/detail/CVE-2022-38394 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:allied_telesis_k.k.:centrecom_ar260s_firmware 2024-06-13T16:21+09:00 2022-08-29T17:37+09:00 2024-06-13T16:21+09:00 Installer of Ricoh Device Software Manager may insecurely load Dynamic Link Libraries https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000067.html Installer of Device Software Manager provided by RICOH COMPANY, LTD. contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427). Tomohisa Hasegawa of Canon IT Solutions Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000067 https://jvn.jp/en/jp/JVN44721267/index.html https://jvn.jp/en/ta/JVNTA91240916/ https://www.cve.org/CVERecord?id=CVE-2022-36403 https://nvd.nist.gov/vuln/detail/CVE-2022-36403 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ricoh:device_software_manager 2024-06-13T13:53+09:00 2022-08-29T15:57+09:00 2024-06-13T13:53+09:00 Movable Type XMLRPC API vulnerable to command injection https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000064.html Movable Type XMLRPC API provided by Six Apart Ltd. contains a command injection vulnerability (CWE-74). Sending a specially crafted message by POST method to Movable Type XMLRPC API may allow arbitrary Perl script execution, and an arbitrary OS command may be executed through it. According to the developer, it is unable to execute a command with an arbitrary value added to its argument, even if the vulnerability is exploited. Osaka University of Economics reported this vulnerability to Six Apart Ltd. and coordinated. Six Apart Ltd. and JPCERT/CC published respective advisories in order to notify users of this vulnerability. And almost at the same time, SHIGA TAKUMA of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with Six Apart Ltd. under Information Security Early Warning Partnership. JVNDB-2022-000064 https://jvn.jp/en/jp/JVN57728859/index.html https://www.cve.org/CVERecord?id=CVE-2022-38078 https://nvd.nist.gov/vuln/detail/CVE-2022-38078 https://www.ipa.go.jp/security/ciadr/vul/20220824-jvn.html https://www.jpcert.or.jp/english/at/2022/at220022.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:sixapart:movable_type 2024-06-13T18:11+09:00 2022-08-24T15:58+09:00 2024-06-13T18:11+09:00 Multiple vulnerabilities in Exment https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000065.html Exment provided by Kajitori Co.,Ltd contains multiple vulnerabilities listed below. * Reflected cross-site scripting (CWE-79) - CVE-2022-38080 * SQL injection (CWE-89) - CVE-2022-37333 * Stored cross-site scripting (CWE-79) - CVE-2022-38089 CVE-2022-38080, CVE-2022-37333 Hibiki Moriyama of STNet, Incorporated reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2022-38089 Yuya Chudo of N.F.Laboratories Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000065 https://jvn.jp/en/jp/JVN46239102/index.html https://www.cve.org/CVERecord?id=CVE-2022-38080 https://www.cve.org/CVERecord?id=CVE-2022-37333 https://www.cve.org/CVERecord?id=CVE-2022-38089 https://nvd.nist.gov/vuln/detail/CVE-2022-37333 https://nvd.nist.gov/vuln/detail/CVE-2022-38080 https://nvd.nist.gov/vuln/detail/CVE-2022-38089 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:exceedone:kajitori_exceedone_exment cpe:/a:exceedone:laravel-admin 2024-06-14T11:09+09:00 2022-08-24T14:23+09:00 2024-06-14T11:09+09:00 Multiple vulnerabilities in PukiWiki https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002339.html PukiWiki provided by PukiWiki Development Team contains multiple vulnerabilities listed below. * Path Traversal (CWE-22) - CVE-2022-34486 * Reflected Cross-site Scripting (CWE-79) - CVE-2022-27637 Harold Kim reported these vulnerabilities to the developer and coordinated. After coordination was completed, this case was reported to JPCERT/CC and JPCERT/CC coordinated with the developer for the publication. JVNDB-2022-002339 http://jvn.jp/en/vu/JVNVU96002401/index.html https://www.cve.org/CVERecord?id=CVE-2022-34486 https://www.cve.org/CVERecord?id=CVE-2022-27637 https://nvd.nist.gov/vuln/detail/CVE-2022-27637 https://nvd.nist.gov/vuln/detail/CVE-2022-34486 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:pukiwiki:pukiwiki 2024-06-14T11:55+09:00 2022-08-24T14:17+09:00 2024-06-14T11:55+09:00 PLANEX MZK-DP150N contains hidden administrative functionality https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002338.html MZK-DP150N provided by PLANEX COMMUNICATIONS INC. contains a hidden administrative screen (CVE-2021-37289, CWE-912). In the initial settings of the product, the login account for the configuration screen is common to all products. Please change the account information from the initial settings before using it. Thomas J. Knudsen and Samy Younsi of Necrum Security Labs reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2022-002338 http://jvn.jp/en/vu/JVNVU98291763/index.html https://www.cve.org/CVERecord?id=CVE-2021-37289 https://nvd.nist.gov/vuln/detail/CVE-2021-37289 https://cwe.mitre.org/data/definitions/912.html cpe:/o:planex:mzk-dp150n_firmware 2024-06-14T14:06+09:00 2022-08-23T15:02+09:00 2024-06-14T14:06+09:00 PukiWiki vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000063.html PukiWiki provided by PukiWiki Developers Team contains a stored cross-site scripting vulnerability (CWE-79). Ryuhoh Ide of Department of Applied Physics, School of Engineering, The University of Tokyo reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000063 https://jvn.jp/en/jp/JVN43979089/index.html https://www.cve.org/CVERecord?id=CVE-2022-36350 https://nvd.nist.gov/vuln/detail/CVE-2022-36350 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:pukiwiki:pukiwiki 2024-06-14T12:00+09:00 2022-08-23T14:40+09:00 2024-06-14T12:00+09:00 UNIMO Technology digital video recorders vulnerable to missing authentication for critical functions https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002337.html Multiple digital video recorders provided by UNIMO Technology Co., Ltd do not perform authentication for some critical functions (CWE-306) in the device management web interface. The reporter states that attacks exploiting this vulnerability have been observed. Yoshiki Mori, Ushimaru Hayato and Masaki Kubo of National Institute of Information and Communications Technology Cybersecurity Research Institute reported this vulnerability to the developer and coordinated. After coordination was completed, this case was reported to JPCERT/CC and JPCERT/CC coordinated with the developer for the publication. JVNDB-2022-002337 http://jvn.jp/en/vu/JVNVU90821877/index.html https://www.cve.org/CVERecord?id=CVE-2022-35733 https://nvd.nist.gov/vuln/detail/CVE-2022-35733 https://cwe.mitre.org/data/definitions/306.html cpe:/o:unimo:udr-ja1004_firmware cpe:/o:unimo:udr-ja1008_firmware cpe:/o:unimo:udr-ja1016_firmware 2024-06-14T10:24+09:00 2022-08-23T14:31+09:00 2024-06-14T10:24+09:00 Multiple vulnerabilities in Trend Micro Security https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002295.html Trend Micro Incorporated has released security updates for Trend Micro Security. Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2022-002295 https://jvn.jp/en/vu/JVNVU93109244/index.html https://www.cve.org/CVERecord?id=CVE-2022-30702 https://www.cve.org/CVERecord?id=CVE-2022-30703 https://nvd.nist.gov/vuln/detail/CVE-2022-30702 https://nvd.nist.gov/vuln/detail/CVE-2022-30703 https://cwe.mitre.org/data/definitions/125.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:trendmicro:security 2022-08-19T11:42+09:00 2022-08-19T11:42+09:00 2022-08-19T11:42+09:00 Trend Micro Endpoint security products for enterprises vulnerable to Link Following Local Privilege Escalation https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002265.html Trend Micro Incorporated has released security updates for Endpoint security products for enterprises. Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2022-002265 http://jvn.jp/en/vu/JVNVU96643038/index.html https://www.cve.org/CVERecord?id=CVE-2022-36336 https://nvd.nist.gov/vuln/detail/CVE-2022-36336 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:trendmicro:apex_one cpe:/a:trendmicro:business_security cpe:/a:trendmicro:business_security_services 2024-06-14T17:11+09:00 2022-08-18T15:45+09:00 2024-06-14T17:11+09:00 Kaitai Struct: compiler vulnerable to denial-of-service (DoS) https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000062.html Kaitai Struct: compiler provided by Kaitai team contains SnakeYAML library version 1.25, which is used in parsing .ksy files. SnakeYAML version 1.25 expands recursive aliases unlimitedly (CWE-674), hence Katai Struct: compiler is vulnerable to a denial-of-service (DoS) attack by Billion Laughs Attack. Taichi Kotake of Sterra Security Co.,Ltd. / Akatsuki Games Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000062 https://jvn.jp/en/jp/JVN42883072/index.html https://www.cve.org/CVERecord?id=CVE-2017-18640 https://nvd.nist.gov/vuln/detail/CVE-2017-18640 https://snyk.io/blog/java-yaml-parser-with-snakeyaml/ https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:kaitai_team_kaitai_struct_compiler 2022-08-04T15:14+09:00 2022-08-04T15:14+09:00 2022-08-04T15:14+09:00 CONTEC SolarView Compact vulnerable to insufficient verification in uploading files https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002112.html SolarView Compact provided by CONTEC CO., LTD. is PV Measurement System. The image file management page of SolarView Compact contains an insufficient verification vulnerability when uploadi webray reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer.ng files (CWE-20). JVNDB-2022-002112 https://jvn.jp/en/vu/JVNVU93696585/ https://www.cve.org/CVERecord?id=CVE-2022-35239 https://nvd.nist.gov/vuln/detail/CVE-2022-35239 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:contec:sv-cpt-mc310f_firmware cpe:/o:contec:sv-cpt-mc310_firmware 2024-06-14T15:21+09:00 2022-08-03T17:40+09:00 2024-06-14T15:21+09:00 Information Disclosure Vulnerability in Hitachi Automation Director and Hitachi Ops Center Automator https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002143.html Information Disclosure Vulnerability have been found in Hitachi Automation Director and Hitachi Ops Center Automator. JVNDB-2022-002143 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hitachi:automation_director cpe:/a:hitachi:ops_center_automator 2022-08-01T17:10+09:00 2022-08-01T17:10+09:00 2022-08-01T17:10+09:00 Multiple vulnerabilities in Nintendo Wi-Fi Network Adaptor WAP-001 https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000056.html Nintendo Wi-Fi Network Adaptor provided by Nintendo Co.,Ltd. contains multiple vulnerabilities listed below. * OS command injection (CWE-78) - CVE-2022-36381 * Buffer overflow (CWE-121) - CVE-2022-36293 Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000056 http://jvn.jp/en/jp/JVN17625382/index.html https://www.cve.org/CVERecord?id=CVE-2022-36381 https://www.cve.org/CVERecord?id=CVE-2022-36293 https://nvd.nist.gov/vuln/detail/CVE-2022-36381 https://nvd.nist.gov/vuln/detail/CVE-2022-36293 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:nintendo:wi-fi_network_adaptor_wap_001_firmware 2024-06-14T16:27+09:00 2022-07-29T13:43+09:00 2024-06-14T16:27+09:00 "JustSystems JUST Online Update for J-License" starts a program with an unquoted file path https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000061.html "JustSystems JUST Online Update for J-License" is bundled with multiple products for corporate users provided by JustSystems Corporation, as in Ichitaro through Pro5 and others, and it is registered as a Windows service. "JustSystems JUST Online Update for J-License" starts another program with an unquoted file path (CWE-428). Hiroki MATSUKUMA of Cyber Defense Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000061 http://jvn.jp/en/jp/JVN57073973/index.html https://www.cve.org/CVERecord?id=CVE-2022-36344 https://nvd.nist.gov/vuln/detail/CVE-2022-36344 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:justsystems:just_online_update 2022-07-28T13:40+09:00 2022-07-28T13:40+09:00 2022-07-28T13:40+09:00 "Hulu" App for iOS vulnerable to improper server certificate verification https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000060.html "Hulu" App for iOS provided by HJ Holdings, Inc. is vulnerable to improper server certificate verification (CWE-295). Shungo Kumasaka of GMO Cyber Security by IERAE reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000060 http://jvn.jp/en/jp/JVN81563390/index.html https://www.cve.org/CVERecord?id=CVE-2022-34156 https://nvd.nist.gov/vuln/detail/CVE-2022-34156 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hjholdings:hulu 2024-06-14T12:25+09:00 2022-07-28T09:51+09:00 2024-06-14T12:25+09:00 "Hulu" App for Android uses a hard-coded API key for an external service https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000059.html "Hulu" App for Android provided by HJ Holdings, Inc. uses a hard-coded API key for an external service (CWE-798). Ryo Sato of BroadBand Security, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000059 http://jvn.jp/en/jp/JVN40907489/index.html https://www.cve.org/CVERecord?id=CVE-2022-35734 https://nvd.nist.gov/vuln/detail/CVE-2022-35734 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:hjholdings:hulu 2024-06-14T14:42+09:00 2022-07-28T09:14+09:00 2024-06-14T14:42+09:00 WordPress Plugin "Newsletter" vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000057.html WordPress Plugin "Newsletter" provided by Stefano Lissa & The Newsletter Team contains a cross-site scripting vulnerability (CWE-79). Gen Sato of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000057 http://jvn.jp/en/jp/JVN77850327/index.html https://www.cve.org/CVERecord?id=CVE-2022-1756 https://nvd.nist.gov/vuln/detail/CVE-2022-1756 https://wpscan.com/vulnerability/6ad407fe-db2b-41fb-834b-dd8c4f62b072 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:thenewsletterplugin:newsletter 2024-06-18T11:21+09:00 2022-07-25T14:30+09:00 2024-06-18T11:21+09:00 Multiple vulnerabilities in untangle https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000058.html untangle provided by Christian Stefanescu is a Python library for processing XML documents. untangle contains multiple vulnerabilities listed below. * Improper Restriction of Recursive Entity References in DTDs (CWE-776) - CVE-2022-33977 * Improper Restriction of XML External Entity Reference (CWE-611) - CVE-2022-31471</li></ul> Taichi Kotake of Sterra Security Co.,Ltd. / Akatsuki Games Inc. reported these vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000058 http://jvn.jp/en/jp/JVN30454777/index.html https://www.cve.org/CVERecord?id=CVE-2022-33977 https://www.cve.org/CVERecord?id=CVE-2022-31471 https://nvd.nist.gov/vuln/detail/CVE-2022-33977 https://nvd.nist.gov/vuln/detail/CVE-2022-31471 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:misc:christian_stefanescu_untangle 2024-06-17T11:03+09:00 2022-07-25T14:18+09:00 2024-06-17T11:03+09:00 Booked vulnerable to open redirect https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000055.html Booked provided by Twinkle Toes Software contains an open redirect vulnerability (CWE-601). Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000055 https://jvn.jp/en/jp/JVN75063798/index.html https://www.cve.org/CVERecord?id=CVE-2022-30706 https://nvd.nist.gov/vuln/detail/CVE-2022-30706 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:twinkletoessoftware:booked 2024-06-14T17:43+09:00 2022-07-22T13:40+09:00 2024-06-14T17:43+09:00 Multiple vulnerabilities in Cybozu Office https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000054.html Cybozu Office provided by Cybozu, Inc. contains multiple vulnerabilities listed below. * [CyVDB-839][CyVDB-2300][CyVDB-3109] Browse restriction bypass vulnerability in Cabinet (CWE-284) - CVE-2022-32283 * [CyVDB-1795] Operation restriction bypass vulnerability in Project (CWE-285) - CVE-2022-32544 * [CyVDB-1800][CyVDB-2798][CyVDB-2927] Browse restriction bypass vulnerability in Custom App (CWE-284) - CVE-2022-29891 * [CyVDB-1849] Cross-site scripting vulnerability in the specific parameters (CWE-79) - CVE-2022-33151 * [CyVDB-1851][CyVDB-1856][CyVDB-1873][CyVDB-1944][CyVDB-2173] Cross-site scripting vulnerability in the specific parameters (CWE-79) - CVE-2022-28715 * [CyVDB-1859] Cross-site scripting vulnerability in the specific parameters (CWE-79) - CVE-2022-30604 * [CyVDB-2030] HTTP header injection vulnerability (CWE-113) - CVE-2022-32453 * [CyVDB-2152][CyVDB-2153][CyVDB-2154][CyVDB-2155] Information disclosure vulnerability in the system configuration (CWE-200) - CVE-2022-30693 * [CyVDB-2693] Operation restriction bypass vulnerability in Scheduler (CWE-285) - CVE-2022-32583 * [CyVDB-2695][CyVDB-2819] Browse restriction bypass vulnerability in Scheduler (CWE-284) - CVE-2022-25986 * [CyVDB-2770] Browse restriction bypass vulnerability in Address Book (CWE-284) - CVE-2022-33311 * [CyVDB-2939] Cross-site scripting vulnerability in the specific parameters (CWE-79) - CVE-2022-29487 CVE-2022-28715, CVE-2022-30604, CVE-2022-32453, CVE-2022-33151 Masato Kinugawa reported these vulnerabilities to Cybozu, Inc. and Cybozu, Inc. reported them to JPCERT/CC to notify users of the solutions through JVN. CVE-2022-29891, CVE-2022-32544, CVE-2022-32583 Yuji Tounai reported these vulnerabilities to Cybozu, Inc. and Cybozu, Inc. reported them to JPCERT/CC to notify users of the solutions through JVN. CVE-2022-30693 Kanta Nishitani of Ierae Security Inc. reported this vulnerability to Cybozu, Inc. and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN. CVE-2022-29487, CVE-2022-25986, CVE-2022-32283, CVE-2022-33311 Cybozu, Inc. reported these vulnerabilities to JPCERT/CC to notify users of the solution through JVN. JVNDB-2022-000054 https://jvn.jp/en/jp/JVN20573662/index.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25986 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28715 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29487 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29891 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30693 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32453 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32583 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33151 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33311 https://nvd.nist.gov/vuln/detail/CVE-2022-25986 https://nvd.nist.gov/vuln/detail/CVE-2022-28715 https://nvd.nist.gov/vuln/detail/CVE-2022-29487 https://nvd.nist.gov/vuln/detail/CVE-2022-29891 https://nvd.nist.gov/vuln/detail/CVE-2022-30604 https://nvd.nist.gov/vuln/detail/CVE-2022-30693 https://nvd.nist.gov/vuln/detail/CVE-2022-32283 https://nvd.nist.gov/vuln/detail/CVE-2022-32453 https://nvd.nist.gov/vuln/detail/CVE-2022-32544 https://nvd.nist.gov/vuln/detail/CVE-2022-32583 https://nvd.nist.gov/vuln/detail/CVE-2022-33151 https://nvd.nist.gov/vuln/detail/CVE-2022-33311 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:cybozu:office 2024-06-14T14:02+09:00 2022-07-20T17:28+09:00 2024-06-14T14:02+09:00 U-Boot squashfs filesystem implementation vulnerable to heap-based buffer overflow https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002017.html U-Boot is a boot loader for multiple platforms, and squashfs filesystem feature is provided since v2020.10-rc2 (commit c5100613). squashfs filesystem implementation of U-Boot contains a heap-based buffer overflow vulnerability (CWE-122) due to a defect in the metadata reading process. Tatsuhiko Yasumatsu of Sony Corporation reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated between the reporter and the developer. JVNDB-2022-002017 https://jvn.jp/en/vu/JVNVU97846460/index.html https://www.cve.org/CVERecord?id=CVE-2022-33967 https://nvd.nist.gov/vuln/detail/CVE-2022-33967 https://cwe.mitre.org/data/definitions/122.html cpe:/a:denx:u-boot 2024-06-14T17:53+09:00 2022-07-14T15:59+09:00 2024-06-14T17:53+09:00 Django Extract and Trunc functions vulnerable to SQL injection https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000053.html Django provided by Django Software Foundation is a Web application framework. Extract and Trunc functions of Django used to treat date data contain an SQL injection vulnerability(CWE-89). Takuto Yoshikai of Aeye Security Lab reported this vulnerability to the developer and coordinated. After coordination was completed, this case was reported to IPA, and JPCERT/CC coordinated with the developer for the publication under Information Security Early Warning Partnership. JVNDB-2022-000053 https://jvn.jp/en/jp/JVN12610194/index.html https://www.cve.org/CVERecord?id=CVE-2022-34265 https://nvd.nist.gov/vuln/detail/CVE-2022-34265 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:djangoproject:django 2024-06-18T11:57+09:00 2022-07-12T13:47+09:00 2024-06-18T11:57+09:00 Passage Drive vulnerable to insufficient data verification https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000052.html Passage Drive provided by Yokogawa Rental & Lease Corporation contains an insufficient data verification vulnerability for interprocess communication (CWE-20). Yokogawa Rental & Lease Corporation reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Yokogawa Rental & Lease Corporation coordinated under the Information Security Early Warning Partnership. JVNDB-2022-000052 http://jvn.jp/en/jp/JVN23766146/index.html https://www.cve.org/CVERecord?id=CVE-2022-34866 https://nvd.nist.gov/vuln/detail/CVE-2022-34866 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:yrl:passage_drive cpe:/a:yrl:passage_drive_for_box 2024-06-14T17:48+09:00 2022-07-08T13:42+09:00 2024-06-14T17:48+09:00 Multiple vulnerabilities in Cybozu Garoon https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000051.html Cybozu Garoon provided by Cybozu, Inc. contains multiple vulnerabilities listed below. * [CyVDB-2909] Operation restriction bypass in multiple applications (CWE-285) - CVE-2022-30602 * [CyVDB-3042] Information disclosure in multiple applications (CWE-200) - CVE-2022-29512 <s>* [CyVDB-3111] Improper input validation in multiple applications (CWE-20) - CVE-2022-29926</s> * [CyVDB-3143] Browsing restriction bypass vulnerability in Bulletin (CWE-284) - CVE-2022-30943 CVE-2022-30602 Shuichi Uruma reported this vulnerability to Cybozu, Inc. and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN. CVE-2022-30943 Yuji Tounai reported this vulnerability to Cybozu, Inc. and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN. CVE-2022-29512 Cybozu, Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. [Updated on 2022 July 6] The developer identified that [CyVDB-3111] was not a vulnerability after the further investigation. Therefore the JVN advisory was updated by crossing out the description regarding [CyVDB-3111]. JVNDB-2022-000051 http://jvn.jp/en/jp/JVN14077132/index.html https://www.cve.org/CVERecord?id=CVE-2022-30602 https://www.cve.org/CVERecord?id=CVE-2022-29512 https://www.cve.org/CVERecord?id=CVE-2022-29926 https://www.cve.org/CVERecord?id=CVE-2022-30943 https://nvd.nist.gov/vuln/detail/CVE-2022-30602 https://nvd.nist.gov/vuln/detail/CVE-2022-29512 https://nvd.nist.gov/vuln/detail/CVE-2022-29926 https://nvd.nist.gov/vuln/detail/CVE-2022-30943 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:cybozu:garoon 2024-06-17T16:49+09:00 2022-07-04T14:17+09:00 2024-06-17T16:49+09:00 LiteCart vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000050.html LiteCart contains a cross-site scripting vulnerability (CWE-79). Satoshi Horikoshi reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000050 http://jvn.jp/en/jp/JVN32625020/index.html https://www.cve.org/CVERecord?id=CVE-2022-27168 https://nvd.nist.gov/vuln/detail/CVE-2022-27168 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:litecart:litecart 2024-06-17T10:39+09:00 2022-07-04T14:12+09:00 2024-06-17T10:39+09:00 HOME SPOT CUBE2 vulnerable to OS command injection https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000049.html HOME SPOT CUBE2 provided by KDDI CORPORATION contains an OS command injection vulnerability (CWE-78) due to improper processing of data received from DHCP server. Alice Rose reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000049 http://jvn.jp/en/jp/JVN41017328/index.html https://www.cve.org/CVERecord?id=CVE-2022-33948 https://nvd.nist.gov/vuln/detail/CVE-2022-33948 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/h:kddi:home_spot_cube_2 2024-06-17T10:45+09:00 2022-06-29T13:42+09:00 2024-06-17T10:45+09:00 L2Blocker Sensor setup screen vulnerable to authentication bypass https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000048.html L2Blocker provided by SOFTCREATE CORP. contains a vulnerability (CWE-288) in which the login authentication is bypassed by using alternative paths or channels for Sensor. Cyber Defense Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000048 https://jvn.jp/en/jp/JVN51464799/index.html https://www.cve.org/CVERecord?id=CVE-2022-33202 https://nvd.nist.gov/vuln/detail/CVE-2022-33202 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:softcreate:l2blocker 2024-06-18T10:45+09:00 2022-06-24T14:21+09:00 2024-06-18T10:45+09:00 web2py vulnerable to open redirect https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000047.html web2py contains an open redirect vulnerability (CWE-601). Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000047 https://jvn.jp/en/jp/JVN02158640/index.html https://www.cve.org/CVERecord?id=CVE-2022-33146 https://nvd.nist.gov/vuln/detail/CVE-2022-33146 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:web2py:web2py 2024-06-18T10:48+09:00 2022-06-23T14:21+09:00 2024-06-18T10:48+09:00 Gitlab vulnerable to server-side request forgery https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000046.html Gitlab contains a server-side request forgery vulnerability (CWE-918) through the Project Import feature. Kanta Nishitani of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to the developer and coordinated. After coordination was completed, this case was reported to IPA, and JPCERT/CC coordinated with the developer for the publication under Information Security Early Warning Partnership. JVNDB-2022-000046 http://jvn.jp/en/jp/JVN93667442/index.html https://www.cve.org/CVERecord?id=CVE-2022-0136 https://nvd.nist.gov/vuln/detail/CVE-2022-0136 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:gitlab:gitlab cpe:/a:gitlab:gitlab cpe:/a:gitlab:gitlab 2024-06-20T15:39+09:00 2022-06-17T12:26+09:00 2024-06-20T15:39+09:00 Growi vulnerable to weak password requirements https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001953.html GROWI provided by WESEEK, Inc. contains a weak password requirements vulnerability (CWE-521, CVE-2022-1236). 418sec first reported this vulnerability to JPCERT/CC, then JPCERT/CC contacted WSEEK, Inc. as a coordinator. After the coordination between 418sec and WESEEK, Inc. was completed, this case was published to notify the users of the solution through JVN. JVNDB-2022-001953 http://jvn.jp/en/vu/JVNVU96438711/index.html https://www.cve.org/CVERecord?id=CVE-2022-1236 https://nvd.nist.gov/vuln/detail/CVE-2022-1236 https://huntr.dev/bounties/c7df088f-e355-45e6-9267-e41030dc6a32/?token=7f784544ffb530a9e6bef04557518633e763810d60f107095451c58b34645b81ad18529d3ea12f3b61ba547c99a0d87b2324e52da6efc4b01ec175416c479099bf5de3d16b8f07f0758556c278d058872597936f0e4fea7acb2bd2bc https://cwe.mitre.org/data/definitions/521.html cpe:/a:weseek:growi 2022-06-15T17:47+09:00 2022-06-15T17:47+09:00 2022-06-15T17:47+09:00 FreeBSD vulnerable to denial-of-service (DoS) https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000045.html FreeBSD contains a denial-of-service (DoS) vulnerability (CWE-400) due to improper handling of TSopt on TCP connections. JVNDB-2022-000045 http://jvn.jp/en/jp/JVN20930118/index.html https://www.cve.org/CVERecord?id=CVE-2022-32264 https://nvd.nist.gov/vuln/detail/CVE-2022-32264 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:freebsd:freebsd 2024-06-13T16:31+09:00 2022-06-15T12:28+09:00 2024-06-13T16:31+09:00 Cisco Catalyst 2940 Series Switches vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000044.html Cisco Catalyst 2940 Series Switches provided by Cisco Systems, Inc., with firmware versions prior to 12.2(50)SY, improperly processes user input and generates error pages, leading to a cross-site scripting vulnerability (CWE-79). The vulnerability has been addressed on 12.2(50)SY released in 2011 (Cisco bug id: CSCek36997), and Cisco Catalyst 2940 Series Switches has been End-of-Support since 2015. Imaoka Ryo of Cyber Security Research Team reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000044 http://jvn.jp/en/jp/JVN94363766/index.html https://www.cve.org/CVERecord?id=CVE-2022-31734 https://nvd.nist.gov/vuln/detail/CVE-2022-31734 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/h:cisco:catalyst_2940 2024-06-18T10:51+09:00 2022-06-14T13:46+09:00 2024-06-18T10:51+09:00 SHIRASAGI vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000043.html SHIRASAGI provided by SHIRASAGI Project contains a cross-site scripting vulnerability (CWE-79). hibiki moriyama of STNet, Incorporated reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000043 http://jvn.jp/en/jp/JVN32962443/index.html https://www.cve.org/CVERecord?id=CVE-2022-29485 https://nvd.nist.gov/vuln/detail/CVE-2022-29485 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:ss-proj:shirasagi cpe:/a:ss-proj:shirasagi 2024-06-18T11:13+09:00 2022-06-09T13:31+09:00 2024-06-18T11:13+09:00 Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001948.html Trend Micro Incorporated has released security updates for Apex One and Apex One as a Service. Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2022-001948 http://jvn.jp/en/vu/JVNVU90675050/index.html https://www.cve.org/CVERecord?id=CVE-2022-30700 https://www.cve.org/CVERecord?id=CVE-2022-30701 https://nvd.nist.gov/vuln/detail/CVE-2022-30700 https://nvd.nist.gov/vuln/detail/CVE-2022-30701 https://cwe.mitre.org/data/definitions/732.html https://cwe.mitre.org/data/definitions/427.html cpe:/a:trendmicro:apex_one 2024-06-18T16:30+09:00 2022-06-03T12:17+09:00 2024-06-18T16:30+09:00 T&D Data Server and THERMO RECORDER DATA SERVER contain a directory traversal vulnerability. https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000042.html T&D Data Server and THERMO RECORDER DATA SERVER provided by T&D Corporation contain a directory traversal vulnerability (CWE-22). Shun Asai of FiveDrive, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000042 https://jvn.jp/en/jp/JVN28659051/index.html https://www.cve.org/CVERecord?id=CVE-2022-29509 https://nvd.nist.gov/vuln/detail/CVE-2022-29509 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:tandd:t%26d_server cpe:/o:tandd:thermo_recorder_data_server_firmware 2024-06-18T10:34+09:00 2022-06-01T16:12+09:00 2024-06-18T10:34+09:00 WordPress Plugin "Modern Events Calendar Lite" vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000041.html WordPress Plugin "Modern Events Calendar Lite" provided by Webnus contains a stored cross-site scripting vulnerability (CWE-79). Tsutomu Aramaki of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000041 http://jvn.jp/en/jp/JVN04155116/index.html https://www.cve.org/CVERecord?id=CVE-2022-30533 https://nvd.nist.gov/vuln/detail/CVE-2022-30533 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:webnus:modern_events_calendar_lite 2024-06-18T10:42+09:00 2022-06-01T13:39+09:00 2024-06-18T10:42+09:00 RevoWorks incomplete filtering of MS Office v4 macros https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000039.html RevoWorks SCVX, RevoWorks Browser and RevoWorks Desktop provided by J's Communication Co., Ltd. enables users to execute web browsers, accessing drives, folders, files and registries in a sandboxed environment. Users can download files from the internet to the sandboxed environment, sanitizing through "File Sanitization Library" or "File Sanitization Option", and import to the local environment. "File Sanitization Library" and "File Sanitization Option" are implemented with some third-party component, but the component's filtering functionality is incomplete, fails to detect nor remove Microsoft Excel 4.0 (XLM) Macros (CWE-791). The developer reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and the developer coordinated under the Information Security Early Warning Partnership. JVNDB-2022-000039 http://jvn.jp/en/jp/JVN27256219/index.html https://www.cve.org/CVERecord?id=CVE-2022-27176 https://nvd.nist.gov/vuln/detail/CVE-2022-27176 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:jscom:revoworks_browser cpe:/a:jscom:revoworks_desktop cpe:/a:jscom:revoworks_scvx 2024-06-18T16:31+09:00 2022-05-27T16:09+09:00 2024-06-18T16:31+09:00 Mobaoku-Auction & Flea Market App for iOS vulnerable to improper server certificate verification https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000040.html Mobaoku-Auction & Flea Market App for iOS provided by DeNA Co., Ltd. is vulnerable to improper server certificate verification (CWE-295). Okazawa Yoshihiro reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000040 http://jvn.jp/en/jp/JVN13878856/index.html https://www.cve.org/CVERecord?id=CVE-2022-29482 https://nvd.nist.gov/vuln/detail/CVE-2022-29482 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:dena:mobaoku-auction_%26_flea_market 2024-06-18T11:06+09:00 2022-05-27T15:48+09:00 2024-06-18T11:06+09:00 Multiple vulnerabilities in Fuji Electric V-SFT https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001929.html Multiple vulnerabilities listed below exist in the simulator module contained in the graphic editor "V-SFT" provided by FUJI ELECTRIC CO., LTD. * Out-of-bounds Write (CWE-787) - CVE-2022-30538 * Out-of-bounds Read (CWE-125) - CVE-2022-30546 * Heap-based Buffer Overflow (CWE-122) - CVE-2022-26302 * Use After Free (CWE-416) - CVE-2022-29522 * Access of Uninitialized Pointer (CWE-824) - CVE-2022-29522 Michael Heinzl reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2022-001929 http://jvn.jp/en/vu/JVNVU99188133/index.html https://www.cve.org/CVERecord?id=CVE-2022-30538 https://www.cve.org/CVERecord?id=CVE-2022-30546 https://www.cve.org/CVERecord?id=CVE-2022-26302 https://www.cve.org/CVERecord?id=CVE-2022-29522 https://www.cve.org/CVERecord?id=CVE-2022-29925 https://nvd.nist.gov/vuln/detail/CVE-2022-30538 https://nvd.nist.gov/vuln/detail/CVE-2022-30546 https://nvd.nist.gov/vuln/detail/CVE-2022-26302 https://nvd.nist.gov/vuln/detail/CVE-2022-29522 https://nvd.nist.gov/vuln/detail/CVE-2022-29925 https://cwe.mitre.org/data/definitions/122.html https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/416.html https://cwe.mitre.org/data/definitions/787.html https://cwe.mitre.org/data/definitions/824.html cpe:/a:fujielectric:v-sft 2024-06-18T13:44+09:00 2022-05-27T15:39+09:00 2024-06-18T13:44+09:00 Multiple vulnerabilities in Fuji Electric V-SFT, V-Server and V-Server Lite https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001931.html Multiple vulnerabilities listed below exist in the simulator module contained in the graphic editor "V-SFT" and the remote monitoring software "V-Server" and "V-Server Lite" provided by FUJI ELECTRIC CO., LTD. * Out-of-bounds Read in V-SFT (CWE-125) - CVE-2022-29506 * Out-of-bounds Read in V-Server and V-Server Lite (CWE-125) - CVE-2022-30549 * Out-of-bounds Write in V-Server and V-Server Lite (CWE-787) - CVE-2022-29524 Michael Heinzl reported these vulnerabilities to JPCERT/CC. JPCERT/CC coordinated with the developer. JVNDB-2022-001931 http://jvn.jp/en/vu/JVNVU93134398/index.html https://www.cve.org/CVERecord?id=CVE-2022-29506 https://www.cve.org/CVERecord?id=CVE-2022-30549 https://www.cve.org/CVERecord?id=CVE-2022-29524 https://nvd.nist.gov/vuln/detail/CVE-2022-29506 https://nvd.nist.gov/vuln/detail/CVE-2022-30549 https://nvd.nist.gov/vuln/detail/CVE-2022-29524 https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/787.html cpe:/a:fujielectric:v-server cpe:/a:fujielectric:v-sft 2024-06-18T16:28+09:00 2022-05-27T15:37+09:00 2024-06-18T16:28+09:00 Multiple vulnerabilities in CONTEC SolarView Compact https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001923.html SolarView Compact provided by CONTEC CO., LTD. is PV Measurement System. SolarView Compact contains multiple vulnerabilities listed below. OS command injection (CWE-78) - CVE-2022-29303 Improper validation of input values on the send test mail console of the product's web server may result in OS command injection. Directory traversal (CWE-23) - CVE-2022-29298 Improper validation of a URL on the download page of the product's web server may allow a remote attacker to view and obtain an arbitrary file. Information disclosure (CWE-200) - CVE-2022-29302 The hidden page which enables to edit the product's web server contents exists in the product's web server, and a remote attacker to read and/or alter an arbitrary file on the web server via the hidden page. OS command injection (CWE-78) - CVE-2022-40881 Improper validation of input values on Check Network Communication Page of the product's web server may result in an arbitrary OS command execution. OS command injection (CWE-78) - CVE-2023-23333 Improper validation of input values on the download page of the product's web server may result in an arbitrary OS command execution. CVE-2022-29298 Jongheon Yan of S2W Inc reported CONTEC CO., LTD. that the fix for the vulnerability was insufficient in Ver.6.5. CONTEC CO., LTD. and JPCERT/CC updated respective advisories. JVNDB-2022-001923 https://jvn.jp/en/vu/JVNVU92327282/index.html https://www.cve.org/CVERecord?id=CVE-2022-29303 https://www.cve.org/CVERecord?id=CVE-2022-29298 https://www.cve.org/CVERecord?id=CVE-2022-29302 https://www.cve.org/CVERecord?id=CVE-2022-40881 https://www.cve.org/CVERecord?id=CVE-2023-23333 https://nvd.nist.gov/vuln/detail/CVE-2022-29303 https://nvd.nist.gov/vuln/detail/CVE-2022-29298 https://nvd.nist.gov/vuln/detail/CVE-2022-29302 https://nvd.nist.gov/vuln/detail/CVE-2022-40881 https://nvd.nist.gov/vuln/detail/CVE-2023-23333 https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://cwe.mitre.org/data/definitions/23.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/o:contec:sv-cpt-mc310f_firmware cpe:/o:contec:sv-cpt-mc310f_firmware cpe:/o:contec:sv-cpt-mc310_firmware cpe:/o:contec:sv-cpt-mc310_firmware 2024-06-20T11:34+09:00 2022-05-27T15:28+09:00 2024-06-20T11:34+09:00 Trend Micro Password Manager vulnerable to privilege escalation https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001809.html Trend Micro Incorporated has released a security update for Trend Micro Password Manager. Trend Micro Incorporated reported the vulnerability to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2022-001809 http://jvn.jp/en/vu/JVNVU92641706/index.html https://www.cve.org/CVERecord?id=CVE-2022-30523 https://nvd.nist.gov/vuln/detail/CVE-2022-30523 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:trendmicro:password_manager 2024-06-18T17:52+09:00 2022-05-24T15:27+09:00 2024-06-18T17:52+09:00 WordPress plugin "WP Statistics" vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000038.html WordPress plugin "WP Statistics" provided by VeronaLabs contains a cross-site scripting vulnerability (CWE-79). Shogo Kumamaru of LAC CyberLink Co., Ltd reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000038 http://jvn.jp/en/jp/JVN15241647/index.html https://www.cve.org/CVERecord?id=CVE-2022-27231 https://nvd.nist.gov/vuln/detail/CVE-2022-27231 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:veronalabs:wp_statistics 2024-06-18T15:41+09:00 2022-05-24T15:00+09:00 2024-06-18T15:41+09:00 Spring Security OAuth (spring-security-oauth2) vulnerable to denial-of-service (DoS) https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000037.html Spring Security OAuth (spring-security-oauth2) provided by VMware, Inc. contains a denial-of-service vulnerability due to uncontrolled resource consumption (CWE-400). Note that Spring Security OAuth (spring-security-oauth2) is no longer supported, therefore Spring Security has been developed as the alternative, and the similar vulnerability known as CVE-2021-22119 was identified but has been addressed. Macchinetta/TERASOLUNA Framework Development Team:NTT DATA Corporation, NTT COMWARE, and NTT reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000037 https://jvn.jp/en/jp/JVN15317878/index.html https://www.cve.org/CVERecord?id=CVE-2022-22969 https://nvd.nist.gov/vuln/detail/cve-2022-22969 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:vmware:spring_security_oauth 2024-06-20T12:09+09:00 2022-05-20T17:04+09:00 2024-06-20T12:09+09:00 Multiple vulnerabilities in Rakuten Casa https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000036.html Rakuten Casa provided by Rakuten Mobile, Inc. contains multiple vulnerabilities listed below. * Use of Hard-coded Credentials (CWE-798) - CVE-2022-29525 * Improper Access Control (CWE-284) - CVE-2022-28704 * Improper Access Control (CWE-284) - CVE-2022-26834 CVE-2022-29525 Narumi Hirai of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2022-28704 Hiroki Oshiro and Tagawa, Masaki reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2022-26834 Tagawa, Masaki reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000036 http://jvn.jp/en/jp/JVN46892984/index.html https://www.cve.org/CVERecord?id=CVE-2022-29525 https://www.cve.org/CVERecord?id=CVE-2022-28704 https://www.cve.org/CVERecord?id=CVE-2022-26834 https://nvd.nist.gov/vuln/detail/CVE-2022-26834 https://nvd.nist.gov/vuln/detail/CVE-2022-28704 https://nvd.nist.gov/vuln/detail/CVE-2022-29525 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:rakuten:casa 2024-06-18T12:09+09:00 2022-05-19T15:13+09:00 2024-06-18T12:09+09:00 Multiple vulnerabilities in Cybozu Garoon https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000035.html Cybozu Garoon provided by Cybozu, Inc. contains multiple vulnerabilities listed below. * [CyVDB-1584][CyVDB-2670] Operation restriction bypass vulnerability in Bulletin (CWE-285) - CVE-2022-28718 * [CyVDB-1865][CyVDB-2692] Operation restriction bypass vulnerability in Workflow (CWE-285) - CVE-2022-27661 * [CyVDB-2660] Improper input validation vulnerability in Space (CWE-20) - CVE-2022-29892 * [CyVDB-2667] Cross-site scripting vulnerability in Scheduler (CWE-79) - CVE-2022-29513 * [CyVDB-2685] Browse restriction bypass vulnerability in Bulletin (CWE-284) - CVE-2022-29471 * [CyVDB-2689] Operation restriction bypass vulnerability in Portal (CWE-285) - CVE-2022-26051 * [CyVDB-2718] Improper input validation vulnerability in Scheduler (CWE-20) - CVE-2022-28692 * [CyVDB-2839] Improper input validation vulnerability in Space (CWE-20) - CVE-2022-27803 * [CyVDB-2841] Browse restriction bypass and operation restriction bypass vulnerability in Cabinet (CWE-285) - CVE-2022-26368 * [CyVDB-2889] Cross-site scripting vulnerability in Organization's Information (CWE-79) - CVE-2022-27627 * [CyVDB-2897] Operation restriction bypass vulnerability in Link (CWE-285) - CVE-2022-26054 * [CyVDB-2906] Improper input validation vulnerability in Link (CWE-20) - CVE-2022-27807 * [CyVDB-2932] Address information disclosure vulnerability (CWE-200) - CVE-2022-29467 * [CyVDB-2940] Improper authentication vulnerability in Scheduler (CWE-287) - CVE-2022-28713 * [CyVDB-3001] Operation restriction bypass vulnerability in Space (CWE-285) - CVE-2022-29484 * [CyVDB-2911] Browse restriction bypass vulnerability in Cabinet (CWE-284) - CVE-2022-31472 CVE-2022-27627 Masato Kinugawa reported this vulnerability to Cybozu, Inc. and Cybozu, Inc. reported it to JPCERT/CC to notify users of its solution through JVN. CVE-2022-26054, CVE-2022-26368, CVE-2022-31472 Yuji Tounai reported these vulnerabilities to Cybozu, Inc. and Cybozu, Inc. reported them to JPCERT/CC to notify users of the solutions through JVN. CVE-2022-26051, CVE-2022-27661, CVE-2022-27803, CVE-2022-27807, CVE-2022-28692, CVE-2022-28713, CVE-2022-28718, CVE-2022-29467, CVE-2022-29471, CVE-2022-29484, CVE-2022-29513, CVE-2022-29892 Cybozu, Inc. reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN. JVNDB-2022-000035 http://jvn.jp/en/jp/JVN73897863/index.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26051 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26054 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26368 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27627 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27661 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27803 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27807 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28692 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28713 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28718 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29467 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29484 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29513 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29892 https://www.cve.org/CVERecord?id=CVE-2022-31472 https://nvd.nist.gov/vuln/detail/CVE-2022-26051 https://nvd.nist.gov/vuln/detail/CVE-2022-26054 https://nvd.nist.gov/vuln/detail/CVE-2022-26368 https://nvd.nist.gov/vuln/detail/CVE-2022-27627 https://nvd.nist.gov/vuln/detail/CVE-2022-27661 https://nvd.nist.gov/vuln/detail/CVE-2022-27803 https://nvd.nist.gov/vuln/detail/CVE-2022-27807 https://nvd.nist.gov/vuln/detail/CVE-2022-28692 https://nvd.nist.gov/vuln/detail/CVE-2022-28713 https://nvd.nist.gov/vuln/detail/CVE-2022-28718 https://nvd.nist.gov/vuln/detail/CVE-2022-29467 https://nvd.nist.gov/vuln/detail/CVE-2022-29471 https://nvd.nist.gov/vuln/detail/CVE-2022-29484 https://nvd.nist.gov/vuln/detail/CVE-2022-29513 https://nvd.nist.gov/vuln/detail/CVE-2022-29892 https://nvd.nist.gov/vuln/detail/CVE-2022-31472 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:cybozu:garoon cpe:/a:cybozu:garoon cpe:/a:cybozu:garoon cpe:/a:cybozu:garoon cpe:/a:cybozu:garoon cpe:/a:cybozu:garoon 2024-06-17T16:34+09:00 2022-05-16T14:25+09:00 2024-06-17T16:34+09:00 Strapi vulnerable to cross-site scripting https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000033.html Strapi contains a stored cross-site scripting vulnerability (CWE-79) in the file upload function. Yuta Morioka of Information Science College reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. JVNDB-2022-000033 http://jvn.jp/en/jp/JVN44550983/index.html https://www.cve.org/CVERecord?id=CVE-2022-29894 https://nvd.nist.gov/vuln/detail/CVE-2022-29894 https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html cpe:/a:strapi:strapi 2024-06-18T11:17+09:00 2022-05-13T16:45+09:00 2024-06-18T11:17+09:00