"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-12-26 08:00:34 +00:00
parent 0ae47c4955
commit 8fd378169a
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
17 changed files with 918 additions and 68 deletions

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-42436",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Stored cross-site scripting vulnerability exists in the presentation feature of GROWI versions prior to v3.4.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WESEEK, Inc.",
"product": {
"product_data": [
{
"product_name": "GROWI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to v3.4.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"refsource": "MISC",
"name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/"
},
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN18715935/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-45737",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Stored cross-site scripting vulnerability exists in the App Settings (/admin/app) page and the Markdown Settings (/admin/markdown) page of GROWI versions prior to v3.5.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WESEEK, Inc.",
"product": {
"product_data": [
{
"product_name": "GROWI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to v3.5.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"refsource": "MISC",
"name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/"
},
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN18715935/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-45740",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Stored cross-site scripting vulnerability when processing profile images exists in GROWI versions prior to v4.1.3. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WESEEK, Inc.",
"product": {
"product_data": [
{
"product_name": "GROWI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to v4.1.3"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"refsource": "MISC",
"name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/"
},
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN18715935/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-45741",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "VR-S1000 firmware Ver. 2.37 and earlier allows an attacker with access to the product's web management page to execute arbitrary OS commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "OS command injection"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "BUFFALO INC.",
"product": {
"product_data": [
{
"product_name": "VR-S1000",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware Ver. 2.37 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.buffalo.jp/news/detail/20231225-01.html",
"refsource": "MISC",
"name": "https://www.buffalo.jp/news/detail/20231225-01.html"
},
{
"url": "https://jvn.jp/en/jp/JVN23771490/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN23771490/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-46681",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Improper neutralization of argument delimiters in a command ('Argument Injection') vulnerability in VR-S1000 firmware Ver. 2.37 and earlier allows an authenticated attacker who can access to the product's command line interface to execute an arbitrary command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper neutralization of argument delimiters in a command ('Argument Injection')"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "BUFFALO INC.",
"product": {
"product_data": [
{
"product_name": "VR-S1000",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware Ver. 2.37 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.buffalo.jp/news/detail/20231225-01.html",
"refsource": "MISC",
"name": "https://www.buffalo.jp/news/detail/20231225-01.html"
},
{
"url": "https://jvn.jp/en/jp/JVN23771490/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN23771490/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-46699",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Cross-site request forgery (CSRF) vulnerability exists in the User settings (/me) page of GROWI versions prior to v6.0.0. If a user views a malicious page while logging in, settings may be changed without the user's intention."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site request forgery (CSRF)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WESEEK, Inc.",
"product": {
"product_data": [
{
"product_name": "GROWI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to v6.0.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"refsource": "MISC",
"name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/"
},
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN18715935/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-46711",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "VR-S1000 firmware Ver. 2.37 and earlier uses a hard-coded cryptographic key which may allow an attacker to analyze the password of a specific product user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use of Hard-coded Cryptographic Key"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "BUFFALO INC.",
"product": {
"product_data": [
{
"product_name": "VR-S1000",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware Ver. 2.37 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.buffalo.jp/news/detail/20231225-01.html",
"refsource": "MISC",
"name": "https://www.buffalo.jp/news/detail/20231225-01.html"
},
{
"url": "https://jvn.jp/en/jp/JVN23771490/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN23771490/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47215",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Stored cross-site scripting vulnerability which is exploiting a behavior of the XSS Filter exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WESEEK, Inc.",
"product": {
"product_data": [
{
"product_name": "GROWI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to v6.0.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"refsource": "MISC",
"name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/"
},
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN18715935/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-49119",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Stored cross-site scripting vulnerability via the img tags exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WESEEK, Inc.",
"product": {
"product_data": [
{
"product_name": "GROWI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to v6.0.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"refsource": "MISC",
"name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/"
},
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN18715935/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-49598",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Stored cross-site scripting vulnerability exists in the event handlers of the pre tags in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WESEEK, Inc.",
"product": {
"product_data": [
{
"product_name": "GROWI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to v6.0.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"refsource": "MISC",
"name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/"
},
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN18715935/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-49779",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Stored cross-site scripting vulnerability exists in the anchor tag of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WESEEK, Inc.",
"product": {
"product_data": [
{
"product_name": "GROWI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to v6.0.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"refsource": "MISC",
"name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/"
},
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN18715935/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-49807",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Stored cross-site scripting vulnerability when processing the MathJax exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WESEEK, Inc.",
"product": {
"product_data": [
{
"product_name": "GROWI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to v6.0.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"refsource": "MISC",
"name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/"
},
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN18715935/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-50175",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Stored cross-site scripting vulnerability exists in the App Settings (/admin/app) page, the Markdown Settings (/admin/markdown) page, and the Customize (/admin/customize) page of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WESEEK, Inc.",
"product": {
"product_data": [
{
"product_name": "GROWI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to v6.0.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"refsource": "MISC",
"name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/"
},
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN18715935/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-50294",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The App Settings (/admin/app) page in GROWI versions prior to v6.0.6 stores sensitive information in cleartext form. As a result, the Secret access key for external service may be obtained by an attacker who can access the App Settings page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cleartext storage of sensitive information"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WESEEK, Inc.",
"product": {
"product_data": [
{
"product_name": "GROWI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to v6.0.6"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"refsource": "MISC",
"name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/"
},
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN18715935/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-50332",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Improper authorization vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.0.6. If this vulnerability is exploited, a user may delete or suspend its own account without the user's intention.\r\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper authorization"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WESEEK, Inc.",
"product": {
"product_data": [
{
"product_name": "GROWI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "prior to v6.0.6"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"refsource": "MISC",
"name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/"
},
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN18715935/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-50339",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Stored cross-site scripting vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.1.11. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WESEEK, Inc.",
"product": {
"product_data": [
{
"product_name": "GROWI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "v6.1.11"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/",
"refsource": "MISC",
"name": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/"
},
{
"url": "https://jvn.jp/en/jp/JVN18715935/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN18715935/"
}
]
}

View File

@ -1,17 +1,67 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-51363",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "VR-S1000 firmware Ver. 2.37 and earlier allows a network-adjacent unauthenticated attacker who can access the product's web management page to obtain sensitive information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information disclosure"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "BUFFALO INC.",
"product": {
"product_data": [
{
"product_name": "VR-S1000",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware Ver. 2.37 and earlier"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.buffalo.jp/news/detail/20231225-01.html",
"refsource": "MISC",
"name": "https://www.buffalo.jp/news/detail/20231225-01.html"
},
{
"url": "https://jvn.jp/en/jp/JVN23771490/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN23771490/"
}
]
}