Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

JPCERT/CC

#ede6fdc4-6654-4307-a26d-3331c018e2ce
PolicyEmail

Short Name

jpcert

Program Role

Root || CNA

Top Level Root

MITRE Corporation

Security Advisories

View Advisories

Domain

jpcert.or.jp

Country

Japan

Scope

Root Scope: Japan organizations.
CNA Scope: Vulnerability assignment related to its vulnerability coordination role.
Reported CVEsVendorsProductsReports
2949Vulnerabilities found

CVE-2025-20094
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.02% / 3.11%
||
7 Day CHG~0.00%
Published-06 Feb, 2025 | 07:05
Updated-12 Feb, 2025 | 19:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unprotected Windows messaging channel ('Shatter') issue exists in Defense Platform Home Edition Ver.3.9.51.x and earlier. If an attacker sends a specially crafted message to the specific process of the Windows system where the product is running, arbitrary code may be executed with SYSTEM privilege.

Action-Not Available
Vendor-Humming Heads Inc.
Product-Defense Platform Home Edition
CWE ID-CWE-422
Unprotected Windows Messaging Channel ('Shatter')
CVE-2025-22894
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.02% / 2.50%
||
7 Day CHG~0.00%
Published-06 Feb, 2025 | 07:05
Updated-12 Feb, 2025 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unprotected Windows messaging channel ('Shatter') issue exists in Defense Platform Home Edition Ver.3.9.51.x and earlier. If an attacker sends a specially crafted message to the specific process of the Windows system where the product is running, arbitrary files in the system may be altered. As a result, an arbitrary DLL may be executed with SYSTEM privilege.

Action-Not Available
Vendor-Humming Heads Inc.
Product-Defense Platform Home Edition
CWE ID-CWE-422
Unprotected Windows Messaging Channel ('Shatter')
CVE-2025-22890
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.02% / 3.24%
||
7 Day CHG~0.00%
Published-06 Feb, 2025 | 07:05
Updated-12 Feb, 2025 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Execution with unnecessary privileges issue exists in Defense Platform Home Edition Ver.3.9.51.x and earlier. If an attacker performs a specific operation, SYSTEM privilege of the Windows system where the product is running may be obtained.

Action-Not Available
Vendor-Humming Heads Inc.
Product-Defense Platform Home Edition
CWE ID-CWE-250
Execution with Unnecessary Privileges
CVE-2025-24982
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.3||MEDIUM
EPSS-0.02% / 4.10%
||
7 Day CHG~0.00%
Published-04 Feb, 2025 | 04:18
Updated-04 Feb, 2025 | 16:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site request forgery vulnerability exists in Activity Log WinterLock versions prior to 1.2.5. If a user views a malicious page while logged in, the log data may be deleted.

Action-Not Available
Vendor-SWIT
Product-Activity Log WinterLock
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-24336
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-3.3||LOW
EPSS-0.02% / 3.66%
||
7 Day CHG~0.00%
Published-31 Jan, 2025 | 00:02
Updated-31 Jan, 2025 | 17:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SXF Common Library handles input data improperly. If a product using the library reads a crafted file, the product may be crashed.

Action-Not Available
Vendor-General Incorporated Association OCF
Product-SXF Common Library
CWE ID-CWE-237
Improper Handling of Structural Elements
CVE-2025-23362
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 6.29%
||
7 Day CHG~0.00%
Published-29 Jan, 2025 | 01:53
Updated-12 Feb, 2025 | 19:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The old versions of EXIF Viewer Classic contain a cross-site scripting vulnerability caused by improper handling of EXIF meta data. When an image is rendered and crafted EXIF meta data is processed, an arbitrary script may be executed on the web browser. Versions 2.3.2 and 2.4.0 were reported as vulnerable. According to the vendor, the product has been refactored after those old versions and the version 3.0.1 is not vulnerable.

Action-Not Available
Vendor-Rodrigue
Product-EXIF Viewer Classic
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-24810
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.8||MEDIUM
EPSS-0.07% / 20.59%
||
7 Day CHG+0.01%
Published-28 Jan, 2025 | 04:36
Updated-28 Jan, 2025 | 14:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in Simple Image Sizes 3.2.3 and earlier. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege and accessing the settings screen.

Action-Not Available
Vendor-Rahe
Product-Simple Image Sizes
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-23237
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.6||MEDIUM
EPSS-0.18% / 39.79%
||
7 Day CHG~0.00%
Published-22 Jan, 2025 | 05:50
Updated-12 Feb, 2025 | 20:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. If a user logs in to CLI of the affected product, an arbitrary OS command may be executed.

Action-Not Available
Vendor-I-O DATA DEVICE, INC.
Product-UD-LT2
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-22450
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.05% / 16.25%
||
7 Day CHG~0.00%
Published-22 Jan, 2025 | 05:49
Updated-12 Feb, 2025 | 20:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Inclusion of undocumented features issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. A remote attacker may disable the LAN-side firewall function of the affected products, and open specific ports.

Action-Not Available
Vendor-I-O DATA DEVICE, INC.
Product-UD-LT2
CWE ID-CWE-1242
Inclusion of Undocumented Features or Chicken Bits
CVE-2025-20617
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.2||HIGH
EPSS-0.48% / 64.08%
||
7 Day CHG~0.00%
Published-22 Jan, 2025 | 05:48
Updated-20 Feb, 2025 | 06:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. If an attacker logs in to the affected product with an administrative account and manipulates requests for a certain screen operation, an arbitrary OS command may be executed. This vulnerability was reported on a different screen operation from CVE-2025-26856.

Action-Not Available
Vendor-I-O DATA DEVICE, INC.
Product-UD-LT2
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-55577
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7||HIGH
EPSS-0.02% / 4.60%
||
7 Day CHG~0.00%
Published-15 Jan, 2025 | 05:17
Updated-15 Jan, 2025 | 15:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow vulnerability exists in Linux Ratfor 1.06 and earlier. When the software processes a file which is specially crafted by an attacker, arbitrary code may be executed. As a result, the attacker may obtain or alter information of the user environment or cause the user environment to become unusable.

Action-Not Available
Vendor-The Dimensional Gate Co.
Product-Linux Ratfor
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-20620
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.08% / 24.48%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 09:34
Updated-14 Jan, 2025 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SQL Injection vulnerability exists in STEALTHONE D220/D340 provided by Y'S corporation. An attacker who can access the affected product may obtain the administrative password of the web management page.

Action-Not Available
Vendor-Y'S corporation
Product-STEALTHONE D220STEALTHONE D340
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-20055
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.50% / 80.36%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 09:33
Updated-14 Jan, 2025 | 15:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS command injection vulnerability exists in network storage servers STEALTHONE D220/D340 provided by Y'S corporation. An attacker who can access the affected product may execute an arbitrary OS command.

Action-Not Available
Vendor-Y'S corporation
Product-STEALTHONE D220STEALTHONE D340
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-20016
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.2||HIGH
EPSS-0.80% / 73.01%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 09:32
Updated-14 Jan, 2025 | 15:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS command injection vulnerability exists in network storage servers STEALTHONE D220/D340/D440 provided by Y'S corporation. A user with an administrative privilege who logged in to the web management page of the affected product may execute an arbitrary OS command.

Action-Not Available
Vendor-Y'S corporation
Product-STEALTHONE D220STEALTHONE D340STEALTHONE D440
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-21603
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.8||MEDIUM
EPSS-0.04% / 8.66%
||
7 Day CHG~0.00%
Published-08 Jan, 2025 | 03:30
Updated-08 Jan, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in MZK-DP300N firmware versions 1.05 and earlier. If an attacker logs in to the affected product and manipulates the device settings, an arbitrary script may be executed on the logged-in user's web browser when accessing a crafted URL.

Action-Not Available
Vendor-PLANEX COMMUNICATIONS INC.
Product-MZK-DP300N
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-54082
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.2||HIGH
EPSS-1.01% / 76.23%
||
7 Day CHG~0.00%
Published-23 Dec, 2024 | 00:18
Updated-24 Dec, 2024 | 00:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

home 5G HR02 and Wi-Fi STATION SH-54C contain an OS command injection vulnerability in the configuration restore function. An arbitrary OS command may be executed with the root privilege by an administrative user.

Action-Not Available
Vendor-Sharp Corporation
Product-Wi-Fi STATION SH-54Chome 5G HR02
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-52321
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.9||MEDIUM
EPSS-0.11% / 30.65%
||
7 Day CHG~0.00%
Published-23 Dec, 2024 | 00:18
Updated-24 Dec, 2024 | 00:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple SHARP routers contain an improper authentication vulnerability in the configuration backup function. The product's backup files containing sensitive information may be retrieved by a remote unauthenticated attacker.

Action-Not Available
Vendor-Sharp Corporation
Product-Wi-Fi STATION SH-54Chome 5G HR02PocketWifi 809SHWi-Fi STATION SH-52BSpeed Wi-Fi NEXT W07Wi-Fi STATION SH-05L
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2024-47864
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 25.25%
||
7 Day CHG~0.00%
Published-23 Dec, 2024 | 00:18
Updated-24 Dec, 2024 | 00:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

home 5G HR02, Wi-Fi STATION SH-52B, and Wi-Fi STATION SH-54C contain a buffer overflow vulnerability in the hidden debug function. A remote unauthenticated attacker may get the web console of the product down.

Action-Not Available
Vendor-Sharp Corporation
Product-Wi-Fi STATION SH-54Chome 5G HR02Wi-Fi STATION SH-52B
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-46873
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.16% / 37.46%
||
7 Day CHG~0.00%
Published-23 Dec, 2024 | 00:17
Updated-24 Dec, 2024 | 00:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple SHARP routers leave the hidden debug function enabled. An arbitrary OS command may be executed with the root privilege by a remote unauthenticated attacker.

Action-Not Available
Vendor-Sharp Corporation
Product-Wi-Fi STATION SH-54Chome 5G HR02PocketWifi 809SHWi-Fi STATION SH-52BSpeed Wi-Fi NEXT W07Wi-Fi STATION SH-05L
CWE ID-CWE-489
Active Debug Code
CVE-2024-45721
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.2||HIGH
EPSS-1.01% / 76.23%
||
7 Day CHG~0.00%
Published-23 Dec, 2024 | 00:17
Updated-24 Dec, 2024 | 00:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

home 5G HR02, Wi-Fi STATION SH-52B, and Wi-Fi STATION SH-54C contain an OS command injection vulnerability in the HOST name configuration screen. An arbitrary OS command may be executed with the root privilege by an administrative user.

Action-Not Available
Vendor-Sharp Corporation
Product-Wi-Fi STATION SH-54Chome 5G HR02Wi-Fi STATION SH-52B
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-54457
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.2||HIGH
EPSS-0.12% / 32.34%
||
7 Day CHG+0.02%
Published-18 Dec, 2024 | 06:37
Updated-18 Dec, 2024 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Inclusion of undocumented features or chicken bits issue exists in AE1021 firmware versions 2.0.10 and earlier and AE1021PE firmware versions 2.0.10 and earlier, which may allow a logged-in user to enable telnet service.

Action-Not Available
Vendor-FXC Inc.
Product-AE1021PEAE1021
CWE ID-CWE-1242
Inclusion of Undocumented Features or Chicken Bits
CVE-2024-53688
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.2||HIGH
EPSS-1.51% / 80.43%
||
7 Day CHG+0.36%
Published-18 Dec, 2024 | 06:36
Updated-18 Dec, 2024 | 14:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in AE1021 firmware versions 2.0.10 and earlier and AE1021PE firmware versions 2.0.10 and earlier, which may allow a logged-in user to execute an arbitrary OS command using a crafted HTTP request.

Action-Not Available
Vendor-FXC Inc.
Product-AE1021PEAE1021
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-47397
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.11% / 30.16%
||
7 Day CHG-0.02%
Published-18 Dec, 2024 | 06:35
Updated-18 Dec, 2024 | 14:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Weak authentication issue exists in AE1021 firmware versions 2.0.10 and earlier and AE1021PE firmware versions 2.0.10 and earlier. If this vulnerability is exploited, the authentication may be bypassed with an undocumented specific string.

Action-Not Available
Vendor-FXC Inc.
Product-AE1021PEAE1021
CWE ID-CWE-1390
Weak Authentication
CVE-2024-54125
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-3.3||LOW
EPSS-0.02% / 3.89%
||
7 Day CHG~0.00%
Published-17 Dec, 2024 | 05:36
Updated-17 Dec, 2024 | 14:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authorization in handler for custom URL scheme issue in "Shonen Jump+" App for Android versions prior to 4.0.0 allows an attacker to lead a user to access an arbitrary website via the vulnerable App. As a result, the user may become a victim of a phishing attack.

Action-Not Available
Vendor-SHUEISHA INC.
Product-"Shonen Jump+" App for Android
CWE ID-CWE-939
Improper Authorization in Handler for Custom URL Scheme
CVE-2024-55864
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.8||MEDIUM
EPSS-0.08% / 24.27%
||
7 Day CHG+0.01%
Published-17 Dec, 2024 | 04:43
Updated-17 Dec, 2024 | 14:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in My WP Customize Admin/Frontend versions prior to ver 1.24.1. If a malicious administrative user customizes the administrative page with some malicious contents, an arbitrary script may be executed on the web browser of the other users who are accessing the page.

Action-Not Available
Vendor-gqevu6bsiz
Product-My WP Customize Admin/Frontend
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-52564
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.07% / 21.72%
||
7 Day CHG+0.01%
Published-05 Dec, 2024 | 09:41
Updated-29 Jan, 2025 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Inclusion of undocumented features or chicken bits issue exists in UD-LT1 firmware Ver.2.1.8 and earlier and UD-LT1/EX firmware Ver.2.1.8 and earlier. A remote attacker may disable the firewall function of the affected products. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered.

Action-Not Available
Vendor-I-O DATA DEVICE, INC.iodata
Product-UD-LT1UD-LT1/EXud-lt1_firmwareud-lt1\/ex_firmware
CWE ID-CWE-1242
Inclusion of Undocumented Features or Chicken Bits
CVE-2024-47133
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.2||HIGH
EPSS-0.33% / 55.36%
||
7 Day CHG+0.02%
Published-05 Dec, 2024 | 09:40
Updated-18 Dec, 2024 | 07:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

UD-LT1 firmware Ver.2.1.9 and earlier and UD-LT1/EX firmware Ver.2.1.9 and earlier allow a remote authenticated attacker with an administrative account to execute arbitrary OS commands.

Action-Not Available
Vendor-I-O DATA DEVICE, INC.iodata
Product-UD-LT1UD-LT1/EXud-lt1_firmwareud-lt1\/ex_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-45841
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 17.35%
||
7 Day CHG+0.01%
Published-05 Dec, 2024 | 09:39
Updated-18 Dec, 2024 | 07:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect permission assignment for critical resource issue exists in UD-LT1 firmware Ver.2.1.9 and earlier and UD-LT1/EX firmware Ver.2.1.9 and earlier. If an attacker with the guest account of the affected products accesses a specific file, the information containing credentials may be obtained.

Action-Not Available
Vendor-I-O DATA DEVICE, INC.
Product-UD-LT1UD-LT1/EX
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2024-54014
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-3.6||LOW
EPSS-0.06% / 18.66%
||
7 Day CHG+0.01%
Published-05 Dec, 2024 | 02:42
Updated-05 Dec, 2024 | 11:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authorization in handler for custom URL scheme issue in 'Skylark' App for Android 6.2.13 and earlier and 'Skylark' App for iOS 6.2.13 and earlier allows an attacker to lead the application to access an arbitrary web site via another application installed on the user's device.

Action-Not Available
Vendor-SKYLARK HOLDINGS CO., LTD.
Product-'Skylark' App for iOS'Skylark' App for Android
CWE ID-CWE-939
Improper Authorization in Handler for Custom URL Scheme
CVE-2024-50357
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.17% / 39.15%
||
7 Day CHG+0.02%
Published-29 Nov, 2024 | 09:06
Updated-02 Dec, 2024 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FutureNet NXR series routers provided by Century Systems Co., Ltd. have REST-APIs, which are configured as disabled in the initial (factory default) configuration. But, REST-APIs are unexpectedly enabled when the affected product is powered up, provided either http-server (GUI) or Web authentication is enabled. The factory default configuration makes http-server (GUI) enabled, which means REST-APIs are also enabled. The username and the password for REST-APIs are configured in the factory default configuration. As a result, an attacker may obtain and/or alter the affected product's settings via REST-APIs.

Action-Not Available
Vendor-Century Systems Co., Ltd.centurysys
Product-FutureNet NXR-G050 seriesFutureNet NXR-G060 seriesFutureNet NXR-G110 seriesfuturenet_nxr-g060_firmwarefuturenet_nxr-g110_firmwarefuturenet_nxr-g050_firmware
CWE ID-CWE-684
Incorrect Provision of Specified Functionality
CVE-2024-53701
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-3.1||LOW
EPSS-0.03% / 8.28%
||
7 Day CHG~0.00%
Published-29 Nov, 2024 | 05:39
Updated-03 Dec, 2024 | 14:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple FCNT Android devices provide the original security features such as "privacy mode" where arbitrary applications can be set not to be displayed, etc. Under certain conditions, and when an attacker can directly operate the device which its screen is unlocked by a user, the provided security features' setting pages may be exposed and/or the settings may be altered, without authentication. For example, specific applications in the device configured to be hidden may be displayed and/or activated.

Action-Not Available
Vendor-FCNT LLC
Product-arrows We F-51Barrows N F-51Carrows We FCG01arrows We
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-38658
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.43%
||
7 Day CHG~0.00%
Published-28 Nov, 2024 | 02:11
Updated-29 Nov, 2024 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an Out-of-bounds read vulnerability in V-Server (v4.0.19.0 and earlier) and V-Server Lite (v4.0.19.0 and earlier). If a user opens a specially crafted file, information may be disclosed and/or arbitrary code may be executed.

Action-Not Available
Vendor-Fuji Electric Co., Ltd.Hakko Electronics Co., Ltd.
Product-V-ServerV-Server Litev-server_litev-server
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-38389
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.43%
||
7 Day CHG~0.00%
Published-28 Nov, 2024 | 02:11
Updated-29 Nov, 2024 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an Out-of-bounds read vulnerability in TELLUS (v4.0.19.0 and earlier) and TELLUS Lite (v4.0.19.0 and earlier). If a user opens a specially crafted file, information may be disclosed and/or arbitrary code may be executed.

Action-Not Available
Vendor-Fuji Electric Co., Ltd.Hakko Electronics Co., Ltd.
Product-TELLUSTELLUS Litetellus_litetellus
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-53008
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.17% / 38.78%
||
7 Day CHG~0.00%
Published-28 Nov, 2024 | 02:10
Updated-29 Nov, 2024 | 20:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Inconsistent interpretation of HTTP requests ('HTTP Request/Response Smuggling') issue exists in HAProxy. If this vulnerability is exploited, a remote attacker may access a path that is restricted by ACL (Access Control List) set on the product. As a result, the attacker may obtain sensitive information.

Action-Not Available
Vendor-HAProxy Projecthaproxy
Product-HAProxy 2.9HAProxy 3.0HAProxy 2.8HAProxy 2.6haproxy
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2024-38309
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.43%
||
7 Day CHG~0.00%
Published-28 Nov, 2024 | 02:10
Updated-29 Nov, 2024 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There are multiple stack-based buffer overflow vulnerabilities in V-SFT (v6.2.2.0 and earlier), TELLUS (v4.0.19.0 and earlier), and TELLUS Lite (v4.0.19.0 and earlier). If a user opens a specially crafted file, information may be disclosed and/or arbitrary code may be executed.

Action-Not Available
Vendor-Fuji Electric Co., Ltd.Hakko Electronics Co., Ltd.
Product-TELLUSV-SFTTELLUS Litetellus_litetellusv-sft
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2024-36254
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.09% / 26.37%
||
7 Day CHG+0.01%
Published-26 Nov, 2024 | 07:38
Updated-26 Nov, 2024 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read vulnerability exists in Sharp Corporation and Toshiba Tec Corporation multiple MFPs (multifunction printers), which may lead to a denial-of-service (DoS) condition.

Action-Not Available
Vendor-Sharp CorporationToshiba Tec Corporationsharp
Product-Multiple MFPs (multifunction printers)mx-4051mx-3061smx-3061mx-3071mx-5051mx-2651mx-4071smx-6580nmx-3051bp-50c26bp-30c25bp-60c45mx-3551mx-3571bp-55c26bp-90c80mx-3071sbp-70c36bp-50c36bp-90c70bp-50c31mx-3561mx-4061smx-6071mx-3571sbp-60c36bp-70c45bp-50c45mx-7090nmx-6071sbp-60c31bp-70c55bp-30c25ymx-8090nmx-8081bp-70c31bp-50c65bp-50c55bp-30c25zmx-4071mx-7580nmx-7081mx-4061bp-70c65mx-5071mx-6051bp-30c25tmx-3561smx-5071s
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-36251
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.20% / 42.45%
||
7 Day CHG+0.05%
Published-26 Nov, 2024 | 07:38
Updated-26 Nov, 2024 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web interface of the affected devices process some crafted HTTP requests improperly, leading to a device crash. More precisely, a crafted parameter to billcodedef_sub_sel.html is not processed properly and device-crash happens. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Action-Not Available
Vendor-Sharp CorporationToshiba Tec Corporationsharp
Product-Multiple MFPs (multifunction printers)mx-m6050mx-b455wtbp-b537wrbp-b547wdbp-b550wdmx-m3050mx-m2630bp-b540wrmx-b455wmx-m5050mx-b355wzmx-m3070mx-b355wmx-b455wzmx-m905mx-m3570mx-m5070mx-m4050mx-m4070mx-m3550mx-b355wtmx-m6070
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-36249
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.4||HIGH
EPSS-0.07% / 22.82%
||
7 Day CHG+0.01%
Published-26 Nov, 2024 | 07:38
Updated-26 Nov, 2024 | 14:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in Sharp Corporation and Toshiba Tech Corporation multiple MFPs (multifunction printers). If this vulnerability is exploited, an arbitrary script may be executed on the administrative page of the affected MFPs. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Action-Not Available
Vendor-Sharp CorporationToshiba Tec Corporation
Product-Multiple MFPs (multifunction printers)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-36248
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.1||CRITICAL
EPSS-0.09% / 26.54%
||
7 Day CHG~0.00%
Published-26 Nov, 2024 | 07:38
Updated-27 Aug, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

API keys for some cloud services are hardcoded in the "main" binary. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Action-Not Available
Vendor-Sharp CorporationToshiba Tec Corporation
Product-Multiple MFPs (multifunction printers)
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-35244
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.1||CRITICAL
EPSS-0.09% / 26.54%
||
7 Day CHG~0.00%
Published-26 Nov, 2024 | 07:38
Updated-27 Aug, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There are several hidden accounts. Some of them are intended for maintenance engineers, and with the knowledge of their passwords (e.g., by examining the coredump), these accounts can be used to re-configure the device. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Action-Not Available
Vendor-Sharp CorporationToshiba Tec Corporation
Product-Multiple MFPs (multifunction printers)
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-34162
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 27.31%
||
7 Day CHG+0.01%
Published-26 Nov, 2024 | 07:37
Updated-10 Dec, 2024 | 15:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web interface of the affected devices is designed to hide the LDAP credentials even for administrative users. But configuring LDAP authentication to "SIMPLE", the device communicates with the LDAP server in clear-text. The LDAP password can be retrieved from this clear-text communication. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Action-Not Available
Vendor-Sharp CorporationToshiba Tec Corporation
Product-Multiple MFPs (multifunction printers)
CWE ID-CWE-767
Access to Critical Private Variable via Public Method
CVE-2024-33616
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 29.00%
||
7 Day CHG~0.00%
Published-26 Nov, 2024 | 07:37
Updated-10 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Admin authentication can be bypassed with some specific invalid credentials, which allows logging in with an administrative privilege. Sharp Corporation states the telnet feature is implemented on older models only, and is planning to provide the firmware update to remove the feature. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Action-Not Available
Vendor-Sharp CorporationToshiba Tec Corporation
Product-Multiple MFPs (multifunction printers)
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-33610
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.1||CRITICAL
EPSS-76.85% / 98.91%
||
7 Day CHG~0.00%
Published-26 Nov, 2024 | 07:37
Updated-10 Dec, 2024 | 14:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

"sessionlist.html" and "sys_trayentryreboot.html" are accessible with no authentication. "sessionlist.html" provides logged-in users' session information including session cookies, and "sys_trayentryreboot.html" allows to reboot the device. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Action-Not Available
Vendor-Sharp CorporationToshiba Tec Corporation
Product-Multiple MFPs (multifunction printers)
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2024-33605
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-57.70% / 98.08%
||
7 Day CHG~0.00%
Published-26 Nov, 2024 | 07:37
Updated-10 Dec, 2024 | 15:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper processing of some parameters of installed_emanual_list.html leads to a path traversal vulnerability. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Action-Not Available
Vendor-Sharp CorporationToshiba Tec Corporation
Product-Multiple MFPs (multifunction printers)
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-32151
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.9||MEDIUM
EPSS-0.11% / 30.06%
||
7 Day CHG~0.00%
Published-26 Nov, 2024 | 07:37
Updated-26 Nov, 2024 | 14:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Action-Not Available
Vendor-Sharp CorporationToshiba Tec Corporation
Product-Multiple MFPs (multifunction printers)
CWE ID-CWE-257
Storing Passwords in a Recoverable Format
CVE-2024-29978
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.9||MEDIUM
EPSS-0.11% / 30.06%
||
7 Day CHG~0.00%
Published-26 Nov, 2024 | 07:37
Updated-04 Dec, 2024 | 17:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Action-Not Available
Vendor-Sharp CorporationToshiba Tec Corporation
Product-Multiple MFPs (multifunction printers)
CWE ID-CWE-256
Plaintext Storage of a Password
CVE-2024-29146
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.9||MEDIUM
EPSS-0.07% / 20.76%
||
7 Day CHG+0.01%
Published-26 Nov, 2024 | 07:37
Updated-26 Nov, 2024 | 14:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Action-Not Available
Vendor-Sharp CorporationToshiba Tec Corporation
Product-Multiple MFPs (multifunction printers)
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2024-28955
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.9||MEDIUM
EPSS-0.37% / 58.08%
||
7 Day CHG+0.01%
Published-26 Nov, 2024 | 07:37
Updated-26 Nov, 2024 | 14:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Affected devices create coredump files when crashed, storing them with world-readable permission. Any local user of the device can examine the coredump files, and research the memory contents. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Action-Not Available
Vendor-Sharp CorporationToshiba Tec Corporation
Product-Multiple MFPs (multifunction printers)
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2024-28038
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9||CRITICAL
EPSS-0.22% / 44.88%
||
7 Day CHG+0.02%
Published-26 Nov, 2024 | 07:37
Updated-10 Dec, 2024 | 14:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web interface of the affected devices processes a cookie value improperly, leading to a stack buffer overflow. More precisely, giving too long character string to MFPSESSIONID parameter results in a stack buffer overflow. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Action-Not Available
Vendor-Sharp CorporationToshiba Tec Corporation
Product-Multiple MFPs (multifunction printers)
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2024-53278
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.8||MEDIUM
EPSS-0.12% / 31.35%
||
7 Day CHG+0.01%
Published-26 Nov, 2024 | 04:33
Updated-26 Nov, 2024 | 14:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in WP Admin UI Customize versions prior to ver 1.5.14. If a malicious admin user customizes the admin screen with some malicious contents, an arbitrary script may be executed on the web browser of the other users who are accessing the admin screen.

Action-Not Available
Vendor-gqevu6bsiz
Product-WP Admin UI Customize
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 58
  • 59
  • Next