"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-04-11 09:00:34 +00:00
parent 3d7808db68
commit d71d9dbf19
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
15 changed files with 150 additions and 55 deletions

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22282",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.elecom.co.jp/news/security/20230324-01/"
"url": "https://www.elecom.co.jp/news/security/20230324-01/",
"refsource": "MISC",
"name": "https://www.elecom.co.jp/news/security/20230324-01/"
},
{
"url": "https://jvn.jp/en/jp/JVN35246979/"
"url": "https://jvn.jp/en/jp/JVN35246979/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN35246979/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-22429",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://play.google.com/store/apps/details?id=com.wolt.android&hl=en_US&gl=US"
"url": "https://play.google.com/store/apps/details?id=com.wolt.android&hl=en_US&gl=US",
"refsource": "MISC",
"name": "https://play.google.com/store/apps/details?id=com.wolt.android&hl=en_US&gl=US"
},
{
"url": "https://jvn.jp/en/jp/JVN64453490/"
"url": "https://jvn.jp/en/jp/JVN64453490/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN64453490/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-23572",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.epson.jp/support/misc_t/230308_oshirase.htm"
"url": "https://www.epson.jp/support/misc_t/230308_oshirase.htm",
"refsource": "MISC",
"name": "https://www.epson.jp/support/misc_t/230308_oshirase.htm"
},
{
"url": "https://jvn.jp/en/jp/JVN82424996/"
"url": "https://jvn.jp/en/jp/JVN82424996/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN82424996/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-23575",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,19 +45,29 @@
"references": {
"reference_data": [
{
"url": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf"
"url": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf",
"refsource": "MISC",
"name": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf"
},
{
"url": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware"
"url": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware",
"refsource": "MISC",
"name": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware"
},
{
"url": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware"
"url": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware",
"refsource": "MISC",
"name": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware"
},
{
"url": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware"
"url": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware",
"refsource": "MISC",
"name": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware"
},
{
"url": "https://jvn.jp/en/vu/JVNVU96198617/"
"url": "https://jvn.jp/en/vu/JVNVU96198617/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU96198617/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-24464",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.buffalo.jp/news/detail/20230310-01.html"
"url": "https://www.buffalo.jp/news/detail/20230310-01.html",
"refsource": "MISC",
"name": "https://www.buffalo.jp/news/detail/20230310-01.html"
},
{
"url": "https://jvn.jp/en/vu/JVNVU96824262/"
"url": "https://jvn.jp/en/vu/JVNVU96824262/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU96824262/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-24544",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.buffalo.jp/news/detail/20230310-01.html"
"url": "https://www.buffalo.jp/news/detail/20230310-01.html",
"refsource": "MISC",
"name": "https://www.buffalo.jp/news/detail/20230310-01.html"
},
{
"url": "https://jvn.jp/en/vu/JVNVU96824262/"
"url": "https://jvn.jp/en/vu/JVNVU96824262/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU96824262/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-25755",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.electronics.jtekt.co.jp/en/topics/202303315311/"
"url": "https://www.electronics.jtekt.co.jp/en/topics/202303315311/",
"refsource": "MISC",
"name": "https://www.electronics.jtekt.co.jp/en/topics/202303315311/"
},
{
"url": "https://jvn.jp/en/vu/JVNVU99710864/"
"url": "https://jvn.jp/en/vu/JVNVU99710864/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU99710864/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-25950",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://www.haproxy.org/"
"url": "https://www.haproxy.org/",
"refsource": "MISC",
"name": "https://www.haproxy.org/"
},
{
"url": "https://git.haproxy.org/?p=haproxy-2.7.git;a=commit;h=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46"
"url": "https://git.haproxy.org/?p=haproxy-2.7.git;a=commit;h=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46",
"refsource": "MISC",
"name": "https://git.haproxy.org/?p=haproxy-2.7.git;a=commit;h=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46"
},
{
"url": "https://jvn.jp/en/jp/JVN38170084/"
"url": "https://jvn.jp/en/jp/JVN38170084/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN38170084/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-25955",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://nlftp.mlit.go.jp/i_news.html#news4"
"url": "https://nlftp.mlit.go.jp/i_news.html#news4",
"refsource": "MISC",
"name": "https://nlftp.mlit.go.jp/i_news.html#news4"
},
{
"url": "https://jvn.jp/en/jp/JVN75742861/"
"url": "https://jvn.jp/en/jp/JVN75742861/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN75742861/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-26588",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.buffalo.jp/news/detail/20230310-01.html"
"url": "https://www.buffalo.jp/news/detail/20230310-01.html",
"refsource": "MISC",
"name": "https://www.buffalo.jp/news/detail/20230310-01.html"
},
{
"url": "https://jvn.jp/en/vu/JVNVU96824262/"
"url": "https://jvn.jp/en/vu/JVNVU96824262/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU96824262/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-26593",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/"
"url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/",
"refsource": "MISC",
"name": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/"
},
{
"url": "https://jvn.jp/en/vu/JVNVU98775218/"
"url": "https://jvn.jp/en/vu/JVNVU98775218/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU98775218/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27389",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,19 +45,29 @@
"references": {
"reference_data": [
{
"url": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf"
"url": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf",
"refsource": "MISC",
"name": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf"
},
{
"url": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware"
"url": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware",
"refsource": "MISC",
"name": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware"
},
{
"url": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware"
"url": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware",
"refsource": "MISC",
"name": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware"
},
{
"url": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware"
"url": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware",
"refsource": "MISC",
"name": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware"
},
{
"url": "https://jvn.jp/en/vu/JVNVU96198617/"
"url": "https://jvn.jp/en/vu/JVNVU96198617/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU96198617/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27520",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.epson.jp/support/misc_t/230308_oshirase.htm"
"url": "https://www.epson.jp/support/misc_t/230308_oshirase.htm",
"refsource": "MISC",
"name": "https://www.epson.jp/support/misc_t/230308_oshirase.htm"
},
{
"url": "https://jvn.jp/en/jp/JVN82424996/"
"url": "https://jvn.jp/en/jp/JVN82424996/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN82424996/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-27917",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,19 +45,29 @@
"references": {
"reference_data": [
{
"url": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf"
"url": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf",
"refsource": "MISC",
"name": "https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_cps_230317_en.pdf"
},
{
"url": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware"
"url": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware",
"refsource": "MISC",
"name": "https://www.contec.com/download/donwload-list/?itemid=f832c526-dcf6-4976-85aa-f536c15a8120#firmware"
},
{
"url": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware"
"url": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware",
"refsource": "MISC",
"name": "https://www.contec.com/download/donwload-list/?itemid=a054b3eb-da97-40d0-9598-d7f5ff4239ec#firmware"
},
{
"url": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware"
"url": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware",
"refsource": "MISC",
"name": "https://www.contec.com/download/donwload-list/?itemid=a1b33f0d-d32b-4549-9741-613cd37d5528#firmware"
},
{
"url": "https://jvn.jp/en/vu/JVNVU96198617/"
"url": "https://jvn.jp/en/vu/JVNVU96198617/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU96198617/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28368",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.tp-link.com/en/support/download/t2600g-28sq/#Firmware"
"url": "https://www.tp-link.com/en/support/download/t2600g-28sq/#Firmware",
"refsource": "MISC",
"name": "https://www.tp-link.com/en/support/download/t2600g-28sq/#Firmware"
},
{
"url": "https://jvn.jp/en/jp/JVN62420378/"
"url": "https://jvn.jp/en/jp/JVN62420378/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN62420378/"
}
]
},