{ "id": "CVE-2023-49108", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-12-04T06:15:07.063", "lastModified": "2023-12-04T13:48:34.723", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Path traversal vulnerability exists in RakRak Document Plus Ver.3.2.0.0 to Ver.6.4.0.7 (excluding Ver.6.1.1.3a). If this vulnerability is exploited, arbitrary files on the server may be obtained or deleted by a user of the product with specific privileges." }, { "lang": "es", "value": "Vulnerabilidad de path traversal existe en RakRak Document Plus Ver.3.2.0.0 a Ver.6.4.0.7 (excluyendo Ver.6.1.1.3a). Si se explota esta vulnerabilidad, un usuario del producto con privilegios espec\u00edficos puede obtener o eliminar archivos arbitrarios en el servidor." } ], "metrics": {}, "references": [ { "url": "https://jvn.jp/en/jp/JVN46895889/", "source": "vultures@jpcert.or.jp" }, { "url": "https://rakrak.jp/RakDocSupport/rkspServlet", "source": "vultures@jpcert.or.jp" } ] }