"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-05-23 02:00:39 +00:00
parent 4cd96f7ab9
commit 863400e8dd
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
29 changed files with 345 additions and 98 deletions

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22654",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://www.tandd.com/news/detail.html?id=780"
"url": "https://www.tandd.com/news/detail.html?id=780",
"refsource": "MISC",
"name": "https://www.tandd.com/news/detail.html?id=780"
},
{
"url": "https://www.monitoring.especmic.co.jp/post/VulnerabilityInRT-12N_RS-12N_RT-22BNandTEU-12N"
"url": "https://www.monitoring.especmic.co.jp/post/VulnerabilityInRT-12N_RS-12N_RT-22BNandTEU-12N",
"refsource": "MISC",
"name": "https://www.monitoring.especmic.co.jp/post/VulnerabilityInRT-12N_RS-12N_RT-22BNandTEU-12N"
},
{
"url": "https://jvn.jp/en/jp/JVN14778242/"
"url": "https://jvn.jp/en/jp/JVN14778242/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN14778242/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-23545",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://www.tandd.com/news/detail.html?id=780"
"url": "https://www.tandd.com/news/detail.html?id=780",
"refsource": "MISC",
"name": "https://www.tandd.com/news/detail.html?id=780"
},
{
"url": "https://www.monitoring.especmic.co.jp/post/VulnerabilityInRT-12N_RS-12N_RT-22BNandTEU-12N"
"url": "https://www.monitoring.especmic.co.jp/post/VulnerabilityInRT-12N_RS-12N_RT-22BNandTEU-12N",
"refsource": "MISC",
"name": "https://www.monitoring.especmic.co.jp/post/VulnerabilityInRT-12N_RS-12N_RT-22BNandTEU-12N"
},
{
"url": "https://jvn.jp/en/jp/JVN14778242/"
"url": "https://jvn.jp/en/jp/JVN14778242/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN14778242/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-25946",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://qrio.me/article/announce/2023/4140/"
"url": "https://qrio.me/article/announce/2023/4140/",
"refsource": "MISC",
"name": "https://qrio.me/article/announce/2023/4140/"
},
{
"url": "https://jvn.jp/en/jp/JVN48687031/"
"url": "https://jvn.jp/en/jp/JVN48687031/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN48687031/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-25953",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://line.worksmobile.com/jp/release-notes/20230216/"
"url": "https://line.worksmobile.com/jp/release-notes/20230216/",
"refsource": "MISC",
"name": "https://line.worksmobile.com/jp/release-notes/20230216/"
},
{
"url": "https://jvn.jp/en/jp/JVN01937209/"
"url": "https://jvn.jp/en/jp/JVN01937209/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN01937209/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-26595",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://cs.cybozu.co.jp/2023/007698.html"
"url": "https://cs.cybozu.co.jp/2023/007698.html",
"refsource": "MISC",
"name": "https://cs.cybozu.co.jp/2023/007698.html"
},
{
"url": "https://jvn.jp/en/jp/JVN41694426/"
"url": "https://jvn.jp/en/jp/JVN41694426/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN41694426/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27304",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://cs.cybozu.co.jp/2023/007698.html"
"url": "https://cs.cybozu.co.jp/2023/007698.html",
"refsource": "MISC",
"name": "https://cs.cybozu.co.jp/2023/007698.html"
},
{
"url": "https://jvn.jp/en/jp/JVN41694426/"
"url": "https://jvn.jp/en/jp/JVN41694426/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN41694426/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27384",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://cs.cybozu.co.jp/2023/007698.html"
"url": "https://cs.cybozu.co.jp/2023/007698.html",
"refsource": "MISC",
"name": "https://cs.cybozu.co.jp/2023/007698.html"
},
{
"url": "https://jvn.jp/en/jp/JVN41694426/"
"url": "https://jvn.jp/en/jp/JVN41694426/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN41694426/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27387",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://www.tandd.com/news/detail.html?id=780"
"url": "https://www.tandd.com/news/detail.html?id=780",
"refsource": "MISC",
"name": "https://www.tandd.com/news/detail.html?id=780"
},
{
"url": "https://www.monitoring.especmic.co.jp/post/VulnerabilityInRT-12N_RS-12N_RT-22BNandTEU-12N"
"url": "https://www.monitoring.especmic.co.jp/post/VulnerabilityInRT-12N_RS-12N_RT-22BNandTEU-12N",
"refsource": "MISC",
"name": "https://www.monitoring.especmic.co.jp/post/VulnerabilityInRT-12N_RS-12N_RT-22BNandTEU-12N"
},
{
"url": "https://jvn.jp/en/jp/JVN14778242/"
"url": "https://jvn.jp/en/jp/JVN14778242/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN14778242/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27388",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://www.tandd.com/news/detail.html?id=780"
"url": "https://www.tandd.com/news/detail.html?id=780",
"refsource": "MISC",
"name": "https://www.tandd.com/news/detail.html?id=780"
},
{
"url": "https://www.monitoring.especmic.co.jp/post/VulnerabilityInRT-12N_RS-12N_RT-22BNandTEU-12N"
"url": "https://www.monitoring.especmic.co.jp/post/VulnerabilityInRT-12N_RS-12N_RT-22BNandTEU-12N",
"refsource": "MISC",
"name": "https://www.monitoring.especmic.co.jp/post/VulnerabilityInRT-12N_RS-12N_RT-22BNandTEU-12N"
},
{
"url": "https://jvn.jp/en/jp/JVN14778242/"
"url": "https://jvn.jp/en/jp/JVN14778242/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN14778242/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27397",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://microengine.jp/information/security_2023_05.html"
"url": "https://microengine.jp/information/security_2023_05.html",
"refsource": "MISC",
"name": "https://microengine.jp/information/security_2023_05.html"
},
{
"url": "https://jvn.jp/en/jp/JVN31701509/"
"url": "https://jvn.jp/en/jp/JVN31701509/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN31701509/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27507",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://microengine.jp/information/security_2023_05.html"
"url": "https://microengine.jp/information/security_2023_05.html",
"refsource": "MISC",
"name": "https://microengine.jp/information/security_2023_05.html"
},
{
"url": "https://jvn.jp/en/jp/JVN31701509/"
"url": "https://jvn.jp/en/jp/JVN31701509/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN31701509/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27512",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_solarview_230508.pdf"
"url": "https://www.contec.com/jp/download/donwload-list/?itemid=b28c8b7c-9f40-40b2-843c-b5b04c035b0e#firmware",
"refsource": "MISC",
"name": "https://www.contec.com/jp/download/donwload-list/?itemid=b28c8b7c-9f40-40b2-843c-b5b04c035b0e#firmware"
},
{
"url": "https://www.contec.com/jp/download/donwload-list/?itemid=b28c8b7c-9f40-40b2-843c-b5b04c035b0e#firmware"
"url": "https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_solarview_230508.pdf",
"refsource": "MISC",
"name": "https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_solarview_230508.pdf"
},
{
"url": "https://jvn.jp/en/vu/JVNVU92106300/"
"url": "https://jvn.jp/en/vu/JVNVU92106300/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU92106300/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27514",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_solarview_230508.pdf"
"url": "https://www.contec.com/jp/download/donwload-list/?itemid=b28c8b7c-9f40-40b2-843c-b5b04c035b0e#firmware",
"refsource": "MISC",
"name": "https://www.contec.com/jp/download/donwload-list/?itemid=b28c8b7c-9f40-40b2-843c-b5b04c035b0e#firmware"
},
{
"url": "https://www.contec.com/jp/download/donwload-list/?itemid=b28c8b7c-9f40-40b2-843c-b5b04c035b0e#firmware"
"url": "https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_solarview_230508.pdf",
"refsource": "MISC",
"name": "https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_solarview_230508.pdf"
},
{
"url": "https://jvn.jp/en/vu/JVNVU92106300/"
"url": "https://jvn.jp/en/vu/JVNVU92106300/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU92106300/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27518",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_solarview_230508.pdf"
"url": "https://www.contec.com/jp/download/donwload-list/?itemid=b28c8b7c-9f40-40b2-843c-b5b04c035b0e#firmware",
"refsource": "MISC",
"name": "https://www.contec.com/jp/download/donwload-list/?itemid=b28c8b7c-9f40-40b2-843c-b5b04c035b0e#firmware"
},
{
"url": "https://www.contec.com/jp/download/donwload-list/?itemid=b28c8b7c-9f40-40b2-843c-b5b04c035b0e#firmware"
"url": "https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_solarview_230508.pdf",
"refsource": "MISC",
"name": "https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_solarview_230508.pdf"
},
{
"url": "https://jvn.jp/en/vu/JVNVU92106300/"
"url": "https://jvn.jp/en/vu/JVNVU92106300/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU92106300/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27521",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_solarview_230508.pdf"
"url": "https://www.contec.com/jp/download/donwload-list/?itemid=b28c8b7c-9f40-40b2-843c-b5b04c035b0e#firmware",
"refsource": "MISC",
"name": "https://www.contec.com/jp/download/donwload-list/?itemid=b28c8b7c-9f40-40b2-843c-b5b04c035b0e#firmware"
},
{
"url": "https://www.contec.com/jp/download/donwload-list/?itemid=b28c8b7c-9f40-40b2-843c-b5b04c035b0e#firmware"
"url": "https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_solarview_230508.pdf",
"refsource": "MISC",
"name": "https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_solarview_230508.pdf"
},
{
"url": "https://jvn.jp/en/vu/JVNVU92106300/"
"url": "https://jvn.jp/en/vu/JVNVU92106300/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU92106300/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27920",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_solarview_230508.pdf"
"url": "https://www.contec.com/jp/download/donwload-list/?itemid=b28c8b7c-9f40-40b2-843c-b5b04c035b0e#firmware",
"refsource": "MISC",
"name": "https://www.contec.com/jp/download/donwload-list/?itemid=b28c8b7c-9f40-40b2-843c-b5b04c035b0e#firmware"
},
{
"url": "https://www.contec.com/jp/download/donwload-list/?itemid=b28c8b7c-9f40-40b2-843c-b5b04c035b0e#firmware"
"url": "https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_solarview_230508.pdf",
"refsource": "MISC",
"name": "https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_solarview_230508.pdf"
},
{
"url": "https://jvn.jp/en/vu/JVNVU92106300/"
"url": "https://jvn.jp/en/vu/JVNVU92106300/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU92106300/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27921",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://jinsmeme.com/media/2023-04-fwapp2"
"url": "https://jinsmeme.com/media/2023-04-fwapp2",
"refsource": "MISC",
"name": "https://jinsmeme.com/media/2023-04-fwapp2"
},
{
"url": "https://jvn.jp/en/jp/JVN13306058/"
"url": "https://jvn.jp/en/jp/JVN13306058/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN13306058/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27922",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/newsletter/"
"url": "https://wordpress.org/plugins/newsletter/",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/newsletter/"
},
{
"url": "https://jvn.jp/en/jp/JVN59341308/"
"url": "https://jvn.jp/en/jp/JVN59341308/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN59341308/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27923",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.vektor-inc.co.jp/product-update/vk-blocks-exunit-xss/"
"url": "https://www.vektor-inc.co.jp/product-update/vk-blocks-exunit-xss/",
"refsource": "MISC",
"name": "https://www.vektor-inc.co.jp/product-update/vk-blocks-exunit-xss/"
},
{
"url": "https://jvn.jp/en/jp/JVN95792402/"
"url": "https://jvn.jp/en/jp/JVN95792402/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN95792402/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27925",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.vektor-inc.co.jp/product-update/vk-blocks-exunit-xss/"
"url": "https://www.vektor-inc.co.jp/product-update/vk-blocks-exunit-xss/",
"refsource": "MISC",
"name": "https://www.vektor-inc.co.jp/product-update/vk-blocks-exunit-xss/"
},
{
"url": "https://jvn.jp/en/jp/JVN95792402/"
"url": "https://jvn.jp/en/jp/JVN95792402/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN95792402/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27926",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.vektor-inc.co.jp/product-update/vk-blocks-exunit-xss/"
"url": "https://www.vektor-inc.co.jp/product-update/vk-blocks-exunit-xss/",
"refsource": "MISC",
"name": "https://www.vektor-inc.co.jp/product-update/vk-blocks-exunit-xss/"
},
{
"url": "https://jvn.jp/en/jp/JVN95792402/"
"url": "https://jvn.jp/en/jp/JVN95792402/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN95792402/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28367",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.vektor-inc.co.jp/product-update/vk-blocks-exunit-xss/"
"url": "https://www.vektor-inc.co.jp/product-update/vk-blocks-exunit-xss/",
"refsource": "MISC",
"name": "https://www.vektor-inc.co.jp/product-update/vk-blocks-exunit-xss/"
},
{
"url": "https://jvn.jp/en/jp/JVN95792402/"
"url": "https://jvn.jp/en/jp/JVN95792402/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN95792402/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28390",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.icom.co.jp/news/7239/"
"url": "https://www.icom.co.jp/news/7239/",
"refsource": "MISC",
"name": "https://www.icom.co.jp/news/7239/"
},
{
"url": "https://jvn.jp/en/jp/JVN80476232/"
"url": "https://jvn.jp/en/jp/JVN80476232/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN80476232/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28392",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.inaba.co.jp/abaniact/news/Wi-Fi%20AP%20UNIT%E3%80%8CAC-WAPU-300%E3%80%8D%E3%81%AB%E3%81%8A%E3%81%91%E3%82%8BOS%E3%82%B3%E3%83%9E%E3%83%B3%E3%83%89%E3%82%A4%E3%83%B3%E3%82%B8%E3%82%A7%E3%82%AF%E3%82%B7%E3%83%A7%E3%83%B3%E3%81%AE%E8%84%86%E5%BC%B1%E6%80%A7%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6.pdf"
"url": "https://www.inaba.co.jp/abaniact/news/Wi-Fi%20AP%20UNIT%E3%80%8CAC-WAPU-300%E3%80%8D%E3%81%AB%E3%81%8A%E3%81%91%E3%82%8BOS%E3%82%B3%E3%83%9E%E3%83%B3%E3%83%89%E3%82%A4%E3%83%B3%E3%82%B8%E3%82%A7%E3%82%AF%E3%82%B7%E3%83%A7%E3%83%B3%E3%81%AE%E8%84%86%E5%BC%B1%E6%80%A7%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6.pdf",
"refsource": "MISC",
"name": "https://www.inaba.co.jp/abaniact/news/Wi-Fi%20AP%20UNIT%E3%80%8CAC-WAPU-300%E3%80%8D%E3%81%AB%E3%81%8A%E3%81%91%E3%82%8BOS%E3%82%B3%E3%83%9E%E3%83%B3%E3%83%89%E3%82%A4%E3%83%B3%E3%82%B8%E3%82%A7%E3%82%AF%E3%82%B7%E3%83%A7%E3%83%B3%E3%81%AE%E8%84%86%E5%BC%B1%E6%80%A7%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6.pdf"
},
{
"url": "https://jvn.jp/en/vu/JVNVU98968780/"
"url": "https://jvn.jp/en/vu/JVNVU98968780/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU98968780/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28394",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://www.beekeeperstudio.io/"
"url": "https://www.beekeeperstudio.io/",
"refsource": "MISC",
"name": "https://www.beekeeperstudio.io/"
},
{
"url": "https://github.com/beekeeper-studio/beekeeper-studio"
"url": "https://github.com/beekeeper-studio/beekeeper-studio",
"refsource": "MISC",
"name": "https://github.com/beekeeper-studio/beekeeper-studio"
},
{
"url": "https://jvn.jp/en/jp/JVN11705010/"
"url": "https://jvn.jp/en/jp/JVN11705010/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN11705010/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28408",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://plugins.2inc.org/mw-wp-form/blog/2023/05/08/752/"
"url": "https://plugins.2inc.org/mw-wp-form/blog/2023/05/08/752/",
"refsource": "MISC",
"name": "https://plugins.2inc.org/mw-wp-form/blog/2023/05/08/752/"
},
{
"url": "https://jvn.jp/en/jp/JVN01093915/"
"url": "https://jvn.jp/en/jp/JVN01093915/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN01093915/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28409",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://plugins.2inc.org/mw-wp-form/blog/2023/05/08/752/"
"url": "https://plugins.2inc.org/mw-wp-form/blog/2023/05/08/752/",
"refsource": "MISC",
"name": "https://plugins.2inc.org/mw-wp-form/blog/2023/05/08/752/"
},
{
"url": "https://jvn.jp/en/jp/JVN01093915/"
"url": "https://jvn.jp/en/jp/JVN01093915/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN01093915/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28413",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://snow-monkey.2inc.org/2023/04/28/snow-monkey-forms-v5-0-7/"
"url": "https://jvn.jp/en/jp/JVN01093915/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN01093915/"
},
{
"url": "https://jvn.jp/en/jp/JVN01093915/"
"url": "https://snow-monkey.2inc.org/2023/04/28/snow-monkey-forms-v5-0-7/",
"refsource": "MISC",
"name": "https://snow-monkey.2inc.org/2023/04/28/snow-monkey-forms-v5-0-7/"
}
]
},

View File

@ -1,17 +1,104 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-30469",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "hirt@hitachi.co.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Cross-site Scripting vulnerability in Hitachi Ops Center Analyzer (Hitachi Ops Center Analyzer detail view component) allows Reflected XSS.This issue affects Hitachi Ops Center Analyzer: from 10.9.1-00 before 10.9.2-00.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Hitachi",
"product": {
"product_data": [
{
"product_name": "Hitachi Ops Center Analyzer",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "10.9.2-00",
"status": "unaffected"
}
],
"lessThan": "10.9.2-00",
"status": "affected",
"version": "10.9.1-00",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-115/index.html",
"refsource": "MISC",
"name": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-115/index.html"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"advisory": "hitachi-sec-2023-115",
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N",
"version": "3.1"
}
]
}