28 lines
1.1 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-49108",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-04T06:15:07.063",
"lastModified": "2023-12-04T13:48:34.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Path traversal vulnerability exists in RakRak Document Plus Ver.3.2.0.0 to Ver.6.4.0.7 (excluding Ver.6.1.1.3a). If this vulnerability is exploited, arbitrary files on the server may be obtained or deleted by a user of the product with specific privileges."
},
{
"lang": "es",
"value": "Vulnerabilidad de path traversal existe en RakRak Document Plus Ver.3.2.0.0 a Ver.6.4.0.7 (excluyendo Ver.6.1.1.3a). Si se explota esta vulnerabilidad, un usuario del producto con privilegios espec\u00edficos puede obtener o eliminar archivos arbitrarios en el servidor."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN46895889/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://rakrak.jp/RakDocSupport/rkspServlet",
"source": "vultures@jpcert.or.jp"
}
]
}