2023-12-04 07:00:21 +00:00

24 lines
776 B
JSON

{
"id": "CVE-2023-49108",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-04T06:15:07.063",
"lastModified": "2023-12-04T06:15:07.063",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Path traversal vulnerability exists in RakRak Document Plus Ver.3.2.0.0 to Ver.6.4.0.7 (excluding Ver.6.1.1.3a). If this vulnerability is exploited, arbitrary files on the server may be obtained or deleted by a user of the product with specific privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN46895889/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://rakrak.jp/RakDocSupport/rkspServlet",
"source": "vultures@jpcert.or.jp"
}
]
}