Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

JPCERT/CC

#ede6fdc4-6654-4307-a26d-3331c018e2ce
PolicyEmail

Short Name

jpcert

Program Role

Root || CNA

Top Level Root

MITRE Corporation

Security Advisories

View Advisories

Domain

jpcert.or.jp

Country

Japan

Scope

Root Scope: Japan organizations.
CNA Scope: Vulnerability assignment related to its vulnerability coordination role.
Reported CVEsVendorsProductsReports
2952Vulnerabilities found

CVE-2024-45366
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.08% / 25.42%
||
7 Day CHG~0.00%
Published-18 Sep, 2024 | 05:20
Updated-10 Jul, 2025 | 13:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Welcart e-Commerce prior to 2.11.2 contains a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed on the user's web browser.

Action-Not Available
Vendor-welcartWelcart Inc.
Product-welcart_e-commerceWelcart e-Commerce
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-42404
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.27% / 50.28%
||
7 Day CHG~0.00%
Published-18 Sep, 2024 | 05:20
Updated-10 Jul, 2025 | 13:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SQL injection vulnerability in Welcart e-Commerce prior to 2.11.2 allows an attacker who can login to the product to obtain or alter the information stored in the database.

Action-Not Available
Vendor-welcartWelcart Inc.collne
Product-welcart_e-commerceWelcart e-Commercewelcart
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-45679
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.4||HIGH
EPSS-0.10% / 27.63%
||
7 Day CHG~0.00%
Published-18 Sep, 2024 | 03:35
Updated-13 Jun, 2025 | 19:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow vulnerability in Assimp versions prior to 5.4.3 allows a local attacker to execute arbitrary code by importing a specially crafted file into the product.

Action-Not Available
Vendor-assimpOpen Asset Import Libraryassimp
Product-assimpAssimpassimp
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2024-45624
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.21% / 44.00%
||
7 Day CHG~0.00%
Published-12 Sep, 2024 | 04:33
Updated-12 Sep, 2024 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exposure of sensitive information due to incompatible policies issue exists in Pgpool-II. If a database user accesses a query cache, table data unauthorized for the user may be retrieved.

Action-Not Available
Vendor-PgPool Global Development Grouppgpool
Product-Pgpool-IIpgpool-ii
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-44072
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.7||MEDIUM
EPSS-0.65% / 69.92%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 06:56
Updated-10 Sep, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS command injection vulnerability exists in BUFFALO wireless LAN routers and wireless LAN repeaters. If a user logs in to the management page and sends a specially crafted request to the affected product from the product's specific management page, an arbitrary OS command may be executed.

Action-Not Available
Vendor-BUFFALO INC.
Product-WEX-733DHPSWHR-1166DHP3WHR-1166DHP4WEX-1166DHPWEX-300HPTX/NWHR-300HP2WEX-733DHPWHR-1166DHPWHR-600DWHR-1166DHP2WSR-1166DHP3WEX-1166DHP2WEX-733DHP2WEX-733DHPTXWSR-600DHPWEX-1166DHPSWEX-300HPS/NWMR-300whr_1166dhp4whr_1166dhpwex_733dhpswhr_600dwhr_1166dhp2wex_733hptxwex_733dhpwex_300hptxnwex_733dhp2wex_1166dhpswsr_600dhpwhr_1166dhp3wex_300hpsnwmr_300wex_1166dhpwsr_1166dhp3whr_300hp2wex_1166dhp2
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-45504
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.02% / 3.53%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 04:35
Updated-04 Nov, 2024 | 21:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site request forgery (CSRF) vulnerability in multiple Alps System Integration products and the OEM products allow a remote unauthenticated attacker to hijack the authentication of the user and to perform unintended operations if the user views a malicious page while logged in.

Action-Not Available
Vendor-Trend Micro IncorporatedMOTEX CorporationAXSEEDMIROKU JYOHO SERVICEJMA Systems CorporationALSI (Alps System Integration)QualitySoft CorporationHammock Corporation
Product-MJS WebFilteringInterSafe MobileSecurityInterSafe WebFilterInterSafe GatewayConnectionInterSafe LogDirectorLANSCOPE EndpointManager WebFilteringKAITO SecureBrowserInterSafe LogNavigatorSPPM Secure FilteringInterSafe CATSAssetView FInterScan WebManagerURL FilteringSPPM BizBrowser
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2024-45203
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.3||MEDIUM
EPSS-0.09% / 25.70%
||
7 Day CHG~0.00%
Published-09 Sep, 2024 | 06:42
Updated-13 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authorization in handler for custom URL scheme issue in "@cosme" App for Android versions prior 5.69.0 and "@cosme" App for iOS versions prior to 6.74.0 allows an attacker to lead a user to access an arbitrary website via the vulnerable App. As a result, the user may become a victim of a phishing attack.

Action-Not Available
Vendor-istyleistyle Inc.
Product-\@cosme"@cosme" App for iOS"@cosme" App for Android
CWE ID-CWE-939
Improper Authorization in Handler for Custom URL Scheme
CVE-2024-45625
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.04% / 10.26%
||
7 Day CHG~0.00%
Published-09 Sep, 2024 | 04:44
Updated-26 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in Forminator versions prior to 1.34.1. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who follows a crafted URL and accesses the webpage with the web form created by Forminator.

Action-Not Available
Vendor-Incsub, LLC
Product-forminatorForminator
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-45429
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.14% / 34.23%
||
7 Day CHG~0.00%
Published-04 Sep, 2024 | 23:07
Updated-25 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in Advanced Custom Fields versions 6.3.5 and earlier and Advanced Custom Fields Pro versions 6.3.5 and earlier. If an attacker with the 'capability' setting privilege which is set in the product settings stores an arbitrary script in the field label, the script may be executed on the web browser of the logged-in user with the same privilege as the attacker's.

Action-Not Available
Vendor-wpengineWP Engine
Product-advanced_custom_fieldsAdvanced Custom FieldsAdvanced Custom Fields Pro
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-39921
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.19% / 40.78%
||
7 Day CHG~0.00%
Published-04 Sep, 2024 | 01:51
Updated-13 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Observable timing discrepancy issue exists in IPCOM EX2 Series V01L02NF0001 to V01L06NF0401, V01L20NF0001 to V01L20NF0401, V02L20NF0001 to V02L21NF0301, and IPCOM VE2 Series V01L04NF0001 to V01L06NF0112. If this vulnerability is exploited, some of the encrypted communication may be decrypted by an attacker who can obtain the contents of the communication.

Action-Not Available
Vendor-Fsas Technologies Inc.Fujitsu Limited
Product-ipcom_ve2_ls_plus_200_firmwareipcom_ve2_ls_plus_200ipcom_ex2_sc_3500_firmwareipcom_ve2_ls_plus2_200ipcom_ex2_lb_3200_firmwareipcom_ex2_lb_3500_firmwareipcom_ex2_sc_3200ipcom_ve2_sc_plus_100ipcom_ex2_dc_3200ipcom_ve2_ls_200ipcom_ve2_ls_220_firmwareipcom_ex2_in_3500_firmwareipcom_ve2_ls_plus_100ipcom_ve2_ls_plus_100_firmwareipcom_ve2_sc_plus_220ipcom_ve2_ls_plus_220_firmwareipcom_ex2_dc_3500_firmwareipcom_ve2_ls_plus2_200_firmwareipcom_ex2_lb_3500ipcom_ve2_ls_plus2_220_firmwareipcom_ex2_in_3500ipcom_ve2_sc_plus_200_firmwareipcom_ve2_ls_220ipcom_ex2_lb_3200ipcom_ve2_sc_plus_200ipcom_ve2_ls_plus_220ipcom_ve2_ls_200_firmwareipcom_ve2_sc_plus_220_firmwareipcom_ex2_dc_3500ipcom_ve2_ls_100_firmwareipcom_ve2_ls_100ipcom_ve2_sc_plus_100_firmwareipcom_ex2_in_3200_firmwareipcom_ex2_in_3200ipcom_ex2_sc_3200_firmwareipcom_ex2_sc_3500ipcom_ex2_dc_3200_firmwareipcom_ve2_ls_plus2_220IPCOM VE2 SeriesIPCOM EX2 Series
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-41927
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.6||MEDIUM
EPSS-0.03% / 7.61%
||
7 Day CHG~0.00%
Published-04 Sep, 2024 | 00:43
Updated-02 Jul, 2025 | 02:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext transmission of sensitive information vulnerability exists in multiple IDEC PLCs. If an attacker sends a specific command to PLC's serial communication port, user credentials may be obtained. As a result, the program of the PLC may be obtained, and the PLC may be manipulated.

Action-Not Available
Vendor-idecIDEC Corporation
Product-kit-fc6a-40-kd_firmwarekit-fc6a-c16r-hg5g-vhp_firmwarekit-fc6a-16-ra_firmwarekit-smart-40-bdc-rs_firmwarekit-fc6a-d16r-hg3g-vahpkit-smart-12-hacft1a-h24rakit-fc6a-40-kdkit-fc6a-16-ra-hg2g-5ttkit-fc6a-40-rd_firmwarekit-fc6a-16-rc-hg1g_firmwareft1a-b24ra_firmwarekit-smart-40-bdc-rskit-fc6a-24-kckit-smart-40-bdc-rkkit-smart-40-hac-r_firmwarekit-fc6a-d32p-hg2g-5tn_firmwarekit-smart-40-hdc-rk_firmwarekit-smart-24-backit-fc6a-24-rc-hg2g-5tnkit-smart-12-hdckit-fc6a-24-rc_firmwarekit-fc6a-40-raft1a-pc2_firmwarekit-fc6a-d16p-hg1g_firmwarekit-fc6a-p16-k_firmwarekit-fc6a-16-pckit-fc6a-p16-skit-fc6a-d32p-hg1g_firmwarekit-fc6a-16-rc-hg1gkit-fc6a-24-kc_firmwarekit-fc6a-c24r-hg2g-vhp_firmwareft1a-pm1_firmwarekit-fc6a-24-rckit-smart-48-bac-skit-smart-40-hdc-rkft1a-pc3_firmwarekit-fc6a-c16r-hg2g-vhpkit-smart-48-bac-s_firmwarekit-fc6a-40-ra_firmwarekit-fc6a-24-pc_firmwarekit-fc6a-40-rc_firmwarekit-fc6a-p16-r_firmwarekit-fc6a-40-pd_firmwarekit-fc6a-16-ra-hg2g-5tn_firmwarekit-fc6a-p32-skit-fc6a-p16-rkit-fc6a-24-ra-hg1g_firmwarekit-fc6a-40-pdkit-fc6a-40-rdkit-fc6a-d16r-hg4g-vhp_firmwarekit-fc6a-16-ra-hg2g-5tnkit-fc6a-p16-kkit-fc6a-16-rckit-fc6a-16-rc-hg2g-5tt_firmwarekit-fc6a-16-pd_firmwarekit-fc6a-16-kc_firmwarekit-fc6a-d16r-hg2g-vhp_firmwarekit-smart-48-bdc-k_firmwarekit-smart-40-bac-r_firmwarehg9z-xcm2aft1a-pc1kit-fc6a-40-pc_firmwareft1a-b12raft1a-pc2kit-fc6a-16-rdft1a-pc3kit-fc6a-c24r-hg4g-vhpkit-smart-48-hdc-s_firmwarekit-smart-24-bdckit-fc6a-16-pc_firmwarekit-fc6a-c24r-hg2g-vhpft1a-b24rakit-smart-48-hac-s_firmwareft1a-h24rc_firmwarekit-fc6a-d16r-hg5g-vhpkit-smart-48-hac-skit-smart-40-hac-rkit-smart-12-backit-fc6a-c24r-hg3g-vahpkit-smart-40-bac-rkit-smart-24-hdckit-smart-48-hac-k_firmwarekit-smart-48-hac-kkit-fc6a-d32p-hg2g-5tnkit-fc6a-16-kdkit-fc6a-24-ra-hg2g-5ttkit-fc6a-16-rd_firmwarekit-fc6a-16-kd_firmwarekit-fc6a-16-rc_firmwarekit-fc6a-d16r-hg2g-5tt_firmwareft1a-h24ra_firmwareft1a-h24rckit-fc6a-d16r-hg5g-vhp_firmwarekit-fc6a-d16r-hg3g-v8hpkit-smart-12-bdc_firmwarekit-fc6a-16-pdkit-fc6a-c16r-hg5g-vhpkit-fc6a-d16p-hg2g-5tnkit-smart-12-bac_firmwareft1a-h12ra_firmwareft1a-pc1_firmwarekit-fc6a-p16-s_firmwarekit-fc6a-16-ra-hg2g-5tt_firmwarekit-fc6a-d16r-hg2g-vhpft9z-1a01kit-fc6a-c16r-hg3g-vahpkit-fc6a-d16r-hg4g-vhpkit-smart-12-hac_firmwarekit-fc6a-16-rc-hg2g-5tn_firmwarekit-fc6a-24-rc-hg2g-5ttkit-fc6a-16-kckit-fc6a-c24r-hg5g-vhpkit-fc6a-d16p-hg2g-5tn_firmwareft1a-h12rc_firmwarekit-fc6a-c16r-hg3g-v8hp_firmwarekit-smart-48-hdc-sft1a-pm1hg9z-xcm2a_firmwarekit-fc6a-d16r-hg2g-5tnkit-fc6a-24-rc-hg1gkit-smart-48-bdc-s_firmwarekit-smart-48-bdc-skit-fc6a-24-rc-hg2g-5tt_firmwarekit-fc6a-16-rakit-fc6a-d32p-hg1gkit-smart-24-bac_firmwarekit-smart-48-bac-kkit-fc6a-d32p-hg2g-5ttkit-fc6a-24-ra-hg1gkit-fc6a-d16r-hg2g-5tn_firmwareft1a-h12rcft9z-psp1pn05kit-smart-40-bdc-rk_firmwarekit-fc6a-40-pckit-fc6a-c24r-hg3g-v8hp_firmwarekit-fc6a-24-rc-hg1g_firmwarekit-smart-24-hackit-fc6a-16-rc-hg2g-5tnkit-fc6a-c16r-hg3g-v8hpkit-smart-40-hdc-rskit-fc6a-24-ra-hg2g-5tn_firmwarekit-fc6a-24-ra-hg2g-5tnkit-fc6a-p32-k_firmwarekit-fc6a-d16r-hg3g-vahp_firmwarekit-fc6a-d16r-hg3g-v8hp_firmwarekit-fc6a-24-ra-hg2g-5tt_firmwarekit-smart-12-hdc_firmwarekit-fc6a-16-rc-hg2g-5ttkit-smart-24-hac_firmwarekit-fc6a-24-rc-hg2g-5tn_firmwarekit-fc6a-24-pckit-fc6a-c24r-hg3g-vahp_firmwarekit-fc6a-c16r-hg2g-vhp_firmwarekit-fc6a-24-rakit-smart-12-bdckit-smart-24-hdc_firmwarekit-smart-48-bdc-kft9z-1a01_firmwarekit-fc6a-d16p-hg2g-5tt_firmwarekit-fc6a-c24r-hg5g-vhp_firmwarekit-fc6a-d16r-hg1g_firmwarekit-fc6a-16-ra-hg1gkit-fc6a-d16r-hg1gft1a-b12ra_firmwarekit-smart-40-hdc-rs_firmwarekit-fc6a-24-ra_firmwarekit-fc6a-40-rckit-fc6a-c24r-hg4g-vhp_firmwarekit-smart-48-bac-k_firmwarekit-fc6a-d32p-hg2g-5tt_firmwarekit-fc6a-p32-s_firmwarekit-fc6a-c24r-hg3g-v8hpkit-fc6a-16-ra-hg1g_firmwarekit-smart-24-bdc_firmwarekit-fc6a-c16r-hg3g-vahp_firmwarekit-fc6a-d16r-hg2g-5ttft9z-psp1pn05_firmwareft1a-h12rakit-fc6a-d16p-hg2g-5ttkit-fc6a-p32-kkit-fc6a-d16p-hg1gFT1A Series SmartAXIS Pro/LiteFC6B Series MICROSmart All-in-One CPU moduleFC6B Series MICROSmart Plus CPU moduleFC6A Series MICROSmart Plus CPU moduleFC6A Series MICROSmart All-in-One CPU module
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-41716
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.1||HIGH
EPSS-0.10% / 27.93%
||
7 Day CHG~0.00%
Published-04 Sep, 2024 | 00:34
Updated-13 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext storage of sensitive information vulnerability exists in WindLDR and WindO/I-NV4. If this vulnerability is exploited, an attacker who obtained the product's project file may obtain user credentials of the PLC or Operator Interfaces. As a result, an attacker may be able to manipulate and/or suspend the PLC and Operator Interfaces by accessing or hijacking them.

Action-Not Available
Vendor-idecIDEC Corporation
Product-windldrwindo\/i-nv4WindO/I-NV4WindLDR
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2024-45270
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.3||MEDIUM
EPSS-0.05% / 15.83%
||
7 Day CHG~0.00%
Published-01 Sep, 2024 | 23:55
Updated-13 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WordPress plugin "Carousel Slider" provided by Sayful Islam contains a cross-site request forgery vulnerability on Hero image selection feature. While logged in to the WordPress site with Carousel Slider plugin enabled, accessing a crafted page may cause a user to alter the contents of the WordPress site.

Action-Not Available
Vendor-majeedrazaSayful Islam
Product-carousel_sliderCarousel Slider
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2024-45269
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.3||MEDIUM
EPSS-0.09% / 25.57%
||
7 Day CHG~0.00%
Published-01 Sep, 2024 | 23:55
Updated-13 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WordPress plugin "Carousel Slider" provided by Sayful Islam contains a cross-site request forgery vulnerability on Carousel image selection feature. While logged in to the WordPress site with Carousel Slider plugin enabled, accessing a crafted page may cause a user to alter the contents of the WordPress site.

Action-Not Available
Vendor-majeedrazaSayful Islam
Product-carousel_sliderCarousel Slider
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2024-39300
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.1||HIGH
EPSS-0.20% / 42.27%
||
7 Day CHG~0.00%
Published-30 Aug, 2024 | 06:29
Updated-21 Oct, 2024 | 13:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Missing authentication vulnerability exists in Telnet function of WAB-I1750-PS v1.5.10 and earlier. When Telnet function of the product is enabled, a remote attacker may login to the product without authentication and alter the product's settings.

Action-Not Available
Vendor-Elecom Co., Ltd.
Product-wab-i1750-ps_firmwarewab-i1750-psWAB-I1750-PSwab-i1750-ps_firmware
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-34577
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.6||MEDIUM
EPSS-0.20% / 42.10%
||
7 Day CHG~0.00%
Published-30 Aug, 2024 | 06:29
Updated-13 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in WRC-X3000GS2-B, WRC-X3000GS2-W, and WRC-X3000GS2A-B due to improper processing of input values in easysetup.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser.

Action-Not Available
Vendor-Elecom Co., Ltd.
Product-wrc-x3000gs2a-b_firmwarewrc-x3000gs2-w_firmwarewrc-x3000gs2a-bwrc-x3000gs2-wwrc-x3000gs2-b_firmwarewrc-x3000gs2-bWRC-X3000GS2-WWRC-X3000GS2A-BWRC-X3000GS2-B
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-42412
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.19% / 41.39%
||
7 Day CHG~0.00%
Published-30 Aug, 2024 | 06:29
Updated-26 Nov, 2024 | 08:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in ELECOM wireless access points due to improper processing of input values in menu.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser.

Action-Not Available
Vendor-Elecom Co., Ltd.
Product-wab-i1750-ps_firmwarewab-s1167-pswab-s1167-ps_firmwarewab-i1750-psWAB-M1775-PSWAB-S1775WAB-I1750-PSWAB-S733MIWAB-S1167-PS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-43700
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7||HIGH
EPSS-0.05% / 15.08%
||
7 Day CHG~0.00%
Published-29 Aug, 2024 | 07:36
Updated-30 Nov, 2024 | 12:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

xfpt versions prior to 1.01 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted file, arbitrary code may be executed on the user's environment.

Action-Not Available
Vendor-philiphazelPhilip Hazelphiliphazel
Product-xfptxfptxfpt
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-41918
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-3.1||LOW
EPSS-0.10% / 27.38%
||
7 Day CHG~0.00%
Published-29 Aug, 2024 | 02:47
Updated-30 Aug, 2024 | 16:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

'Rakuten Ichiba App' for Android 12.4.0 and earlier and 'Rakuten Ichiba App' for iOS 11.7.0 and earlier are vulnerable to improper authorization in handler for custom URL scheme. An arbitrary site may be displayed on the WebView of the product via Intent from another application installed on the user's device. As a result, the user may be redirected to an unauthorized site, and the user may become a victim of a phishing attack.

Action-Not Available
Vendor-rakutenRakuten Group, Inc.rakuten
Product-ichiba'Rakuten Ichiba App' for iOS'Rakuten Ichiba App' for Androidichiba
CWE ID-CWE-939
Improper Authorization in Handler for Custom URL Scheme
CWE ID-CWE-862
Missing Authorization
CVE-2024-39771
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.2||MEDIUM
EPSS-0.05% / 13.70%
||
7 Day CHG~0.00%
Published-28 Aug, 2024 | 05:54
Updated-28 Oct, 2024 | 21:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

QBiC CLOUD CC-2L v1.1.30 and earlier and Safie One v1.8.2 and earlier do not properly validate certificates, which may allow a network-adjacent unauthenticated attacker to obtain and/or alter communications of the affected product via a man-in-the-middle attack.

Action-Not Available
Vendor-safieSafie Inc.
Product-safie_one_firmwareqbic_cloud_cc-2\/2l_firmwareqbic_cloud_cc-2\/2lsafie_oneQBiC CLOUD CC-2LSafie One
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-41995
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.06% / 19.78%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 06:51
Updated-24 Mar, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Initialization of a resource with an insecure default vulnerability exists in JavaTM Platform Ver.12.89 and earlier. If this vulnerability is exploited, the product may be affected by some known TLS1.0 and TLS1.1 vulnerabilities. As for the specific products/models/versions of MFPs and printers that contain JavaTM Platform, see the information provided by the vendor.

Action-Not Available
Vendor-Ricoh Company, Ltd.
Product-JavaTM Platformjavatm_platform
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2024-39817
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.18% / 39.83%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 04:54
Updated-18 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insertion of sensitive information into sent data issue exists in Cybozu Office 10.0.0 to 10.8.6, which may allow a user who can login to the product to view data that the user does not have access by conducting 'search' under certain conditions in Custom App.

Action-Not Available
Vendor-Cybozu, Inc.
Product-officeCybozu Office
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-41889
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.65% / 69.84%
||
7 Day CHG~0.00%
Published-05 Aug, 2024 | 04:36
Updated-30 Aug, 2024 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple Pimax products accept WebSocket connections from unintended endpoints. If this vulnerability is exploited, arbitrary code may be executed by a remote unauthenticated attacker.

Action-Not Available
Vendor-pimaxPimaxpimax
Product-pitoolplayPiToolPimax Playpitoolplay
CWE ID-CWE-923
Improper Restriction of Communication Channel to Intended Endpoints
CVE-2024-41720
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8||HIGH
EPSS-0.08% / 24.66%
||
7 Day CHG~0.00%
Published-05 Aug, 2024 | 04:36
Updated-17 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect permission assignment for critical resource issue exists in ZWX-2000CSW2-HN firmware versions prior to Ver.0.3.15, which may allow a network-adjacent authenticated attacker to alter the configuration of the device.

Action-Not Available
Vendor-zexelonZEXELON CO., LTD.
Product-zwx-2000csw2-hnzwx-2000csw2-hn_firmwareZWX-2000CSW2-HN
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2024-39838
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.09% / 26.37%
||
7 Day CHG~0.00%
Published-05 Aug, 2024 | 04:35
Updated-25 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ZWX-2000CSW2-HN firmware versions prior to Ver.0.3.15 uses hard-coded credentials, which may allow a network-adjacent attacker with an administrative privilege to alter the configuration of the device.

Action-Not Available
Vendor-zexelonZEXELON CO., LTD.
Product-zwx-2000csw2-hn_firmwarezwx-2000csw2-hnZWX-2000CSW2-HN
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-40883
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 17.56%
||
7 Day CHG~0.00%
Published-01 Aug, 2024 | 01:18
Updated-17 Feb, 2025 | 05:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site request forgery vulnerability exists in ELECOM wireless LAN routers. Viewing a malicious page while logging in to the affected product with an administrative privilege, the user may be directed to perform unintended operations such as changing the login ID, login password, etc.

Action-Not Available
Vendor-Elecom Co., Ltd.
Product-wrc-2533gs2-b_firmwarewrc-2533gs2v-bwrc-2533gs2v-b_firmwarewrc-x6000xs-gwrc-2533gs2-wwrc-x1500gs-b_firmwarewrc-2533gs2-bwrc-2533gs2-w_firmwarewrc-x1500gs-bwrc-x1500gsa-b_firmwarewrc-x1500gsa-bwrc-x6000xs-g_firmwareWRC-X1500GSA-BWRC-X6000QSA-GWRC-X3000GS2-WWRC-X1800GS-BWRC-XE5400GSA-GWRC-XE5400GS-GWRC-X1500GS-BWRC-X3000GS2A-BWRC-X6000XST-GWRC-X1800GSH-BWRC-X6000XS-GWRC-X3000GS2-BWRC-X1800GSA-BWRC-X6000QS-G
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2024-39607
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.8||MEDIUM
EPSS-0.57% / 67.68%
||
7 Day CHG~0.00%
Published-01 Aug, 2024 | 01:17
Updated-17 Feb, 2025 | 06:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS command injection vulnerability exists in ELECOM wireless LAN routers. A specially crafted request may be sent to the affected product by a logged-in user with an administrative privilege to execute an arbitrary OS command.

Action-Not Available
Vendor-Elecom Co., Ltd.
Product-WRC-X1500GSA-BWRC-X6000QSA-GWRC-X3000GS2-WWRC-X1800GS-BWRC-XE5400GSA-GWRC-XE5400GS-GWRC-X1500GS-BWRC-X3000GS2A-BWRC-X6000XST-GWRC-X1800GSH-BWRC-X6000XS-GWRC-X3000GS2-BWRC-X1800GSA-BWRC-X6000QS-Gwrc-x1500gsa-b_firmwarewrc-x1500gs-b_firmwarewrc-x6000xs-g_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-34021
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.8||MEDIUM
EPSS-0.03% / 6.51%
||
7 Day CHG~0.00%
Published-01 Aug, 2024 | 01:15
Updated-26 Nov, 2024 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unrestricted upload of file with dangerous type vulnerability exists in ELECOM wireless LAN routers. A specially crafted file may be uploaded to the affected product by a logged-in user with an administrative privilege, resulting in an arbitrary OS command execution.

Action-Not Available
Vendor-Elecom Co., Ltd.
Product-WRC-2533GS2-BWRC-2533GS2-WWRC-2533GS2V-BWRC-2533GST2WRC-1167GST2wrc-2533gs2-b_firmwarewrc-2533gst2_firmwarewrc-2533gs2v-b_firmwarewrc-2533gs2-w_firmware
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2024-41924
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.2||HIGH
EPSS-0.08% / 24.18%
||
7 Day CHG~0.00%
Published-30 Jul, 2024 | 08:45
Updated-18 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Acceptance of extraneous untrusted data with trusted data vulnerability exists in EC-CUBE 4 series. If this vulnerability is exploited, an attacker who obtained the administrative privilege may install an arbitrary PHP package. If the obsolete versions of PHP packages are installed, the product may be affected by some known vulnerabilities.

Action-Not Available
Vendor-EC-CUBE CO.,LTD.ec-cube
Product-EC-CUBE 4 seriesec-cube
CWE ID-CWE-349
Acceptance of Extraneous Untrusted Data With Trusted Data
CVE-2024-41141
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.08% / 25.42%
||
7 Day CHG~0.00%
Published-30 Jul, 2024 | 08:45
Updated-06 Nov, 2024 | 17:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stored cross-site scripting vulnerability exists in EC-CUBE Web API Plugin. When there are multiple users using OAuth Management feature and one of them inputs some crafted value on the OAuth Management page, an arbitrary script may be executed on the web browser of the other user who accessed the management page.

Action-Not Available
Vendor-EC-CUBE CO.,LTD.
Product-EC-CUBE Web API Plugin (4.2 series)EC-CUBE Web API Plugin
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-40895
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.4||MEDIUM
EPSS-0.41% / 60.29%
||
7 Day CHG~0.00%
Published-30 Jul, 2024 | 08:37
Updated-02 Aug, 2024 | 04:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FFRI AMC versions 3.4.0 to 3.5.3 and some OEM products that implement/bundle FFRI AMC versions 3.4.0 to 3.5.3 allow a remote unauthenticated attacker to execute arbitrary OS commands when certain conditions are met in an environment where the notification program setting is enabled and the executable file path is set to a batch file (.bat) or command file (.cmd) extension.

Action-Not Available
Vendor-FFRI Security, Inc.Sky Co., Ltd.skygroupffriNEC Corporation
Product-FFRI AMCFFRI AMC for ActSecure χEDR Plus Packffri_amcedr_plus_pack_cloudedr_plus_pack
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-41726
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.31% / 53.95%
||
7 Day CHG~0.00%
Published-29 Jul, 2024 | 08:51
Updated-04 Jun, 2025 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Path traversal vulnerability exists in SKYSEA Client View Ver.3.013.00 to Ver.19.210.04e. If this vulnerability is exploited, an arbitrary executable file may be executed by a user who can log in to the PC where the product's Windows client is installed.

Action-Not Available
Vendor-skygroupSky Co.,LTD.skysea
Product-skysea_client_viewSKYSEA Client Viewclient_view
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-41143
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.11%
||
7 Day CHG~0.00%
Published-29 Jul, 2024 | 08:51
Updated-14 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Origin validation error vulnerability exists in SKYSEA Client View Ver.3.013.00 to Ver.19.210.04e. If this vulnerability is exploited, an arbitrary process may be executed with SYSTEM privilege by a user who can log in to the PC where the product's Windows client is installed.

Action-Not Available
Vendor-skygroupSky Co.,LTD.
Product-skysea_client_viewSKYSEA Client View
CWE ID-CWE-346
Origin Validation Error
CVE-2024-41139
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.29%
||
7 Day CHG~0.00%
Published-29 Jul, 2024 | 08:51
Updated-04 Jun, 2025 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect privilege assignment vulnerability exists in SKYSEA Client View Ver.6.010.06 to Ver.19.210.04e. If a user who can log in to the PC where the product's Windows client is installed places a specially crafted DLL file in a specific folder, arbitrary code may be executed with SYSTEM privilege.

Action-Not Available
Vendor-skygroupSky Co.,LTD.skygroup
Product-skysea_client_viewSKYSEA Client Viewskysea_client_view
CWE ID-CWE-266
Incorrect Privilege Assignment
CVE-2024-41881
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.21% / 43.40%
||
7 Day CHG~0.00%
Published-29 Jul, 2024 | 08:39
Updated-02 Aug, 2024 | 04:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SDoP versions prior to 1.11 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted XML file, arbitrary code may be executed on the user's environment.

Action-Not Available
Vendor-Philip Hazelphiliphazel
Product-SDoPsdop
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2024-40897
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7||HIGH
EPSS-0.16% / 37.42%
||
7 Day CHG+0.12%
Published-26 Jul, 2024 | 06:03
Updated-13 Feb, 2025 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer's build environment. This may lead to compromise of developer machines or CI build environments.

Action-Not Available
Vendor-gstreamerGStreamergstreamer
Product-orcORCorc
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-39457
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.4||MEDIUM
EPSS-0.61% / 68.92%
||
7 Day CHG+0.42%
Published-19 Jul, 2024 | 08:36
Updated-19 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cybozu Garoon 6.0.0 to 6.0.1 contains a cross-site scripting vulnerability in PDF preview. If this vulnerability is exploited, an arbitrary script may be executed on a logged-in user’s web browser.

Action-Not Available
Vendor-Cybozu, Inc.
Product-garoonCybozu Garoon
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-40724
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.4||HIGH
EPSS-0.07% / 20.48%
||
7 Day CHG-0.02%
Published-19 Jul, 2024 | 07:38
Updated-25 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow vulnerability in Assimp versions prior to 5.4.2 allows a local attacker to execute arbitrary code by inputting a specially crafted file into the product.

Action-Not Available
Vendor-assimpOpen Asset Import Libraryopen_asset_import_library
Product-assimpAssimpopen_asset_import_library
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-36491
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.71% / 71.29%
||
7 Day CHG+0.09%
Published-17 Jul, 2024 | 08:50
Updated-08 Apr, 2025 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FutureNet NXR series, VXR series and WXR series provided by Century Systems Co., Ltd. allow an administrative user to execute an arbitrary OS command, obtain and/or alter sensitive information, and cause a denial-of-service (DoS) condition.

Action-Not Available
Vendor-centurysysCentury Systems Co., Ltd.centurysys
Product-futurenet_nxr-g110_firmwarefuturenet_nxr-120\/c_firmwarefuturenet_nxr-1200futurenet_nxr-1200_firmwarefuturenet_nxr-g060_firmwarefuturenet_nxr-530futurenet_nxr-350\/c_firmwarefuturenet_nxr-230\/cfuturenet_nxr-610x_firmwarefuturenet_nxr-160\/lw_firmwarefuturenet_nxr-230\/c_firmwarefuturenet_nxr-350\/cfuturenet_nxr-125\/cx_firmwarefuturenet_nxr-650_firmwarefuturenet_nxr-155\/c_firmwarefuturenet_vxr-x86futurenet_nxr-160\/lwfuturenet_nxr-g180\/l-ca_firmwarefuturenet_nxr-g180\/l-cafuturenet_nxr-g100_firmwarefuturenet_nxr-g120_firmwarefuturenet_nxr-530_firmwarefuturenet_nxr-1300_firmwarefuturenet_nxr-120\/cfuturenet_wxr-250_firmwarefuturenet_nxr-g050_firmwarefuturenet_nxr-130\/c_firmwarefuturenet_wxr-250futurenet_nxr-g200_firmwarefuturenet_vxr-x64futurenet_nxr-130\/cFutureNet NXR-610X seriesFutureNet NXR-G180/L-CAFutureNet NXR-G120 seriesFutureNet NXR-230/CFutureNet NXR-1200FutureNet VXR/x64FutureNet WXR-250FutureNet NXR-120/CFutureNet NXR-1300 seriesFutureNet VXR/x86FutureNet NXR-125/CXFutureNet NXR-130/CFutureNet NXR-G100 seriesFutureNet NXR-160/LWFutureNet NXR-G050 seriesFutureNet NXR-650FutureNet NXR-G110 seriesFutureNet NXR-350/CFutureNet NXR-G200 seriesFutureNet NXR-G060 seriesFutureNet NXR-155/C seriesFutureNet NXR-530futurenet_nxr-125\/cx_firmwarefuturenet_nxr-1200_firmwarefuturenet_nxr-g120_firmwarefuturenet_nxr-610x_firmwarefuturenet_nxr-130\/c_firmwarefuturenet_nxr-g110_firmwarefuturenet_nxr-1300_firmwarefuturenet_nxr-155\/c_firmwarefuturenet_nxr-650_firmwarefuturenet_wxr-250_firmwarefuturenet_nxr-g060_firmwarefuturenet_nxr-120\/c_firmwarefuturenet_nxr-g180\/l-ca_firmwarefuturenet_nxr-g050_firmwarefuturenet_nxr-160\/lw_firmwarefuturenet_nxr-230\/c_firmwarefuturenet_nxr-g100_firmwarefuturenet_nxr-g200_firmwarefuturenet_vxr\/x64_firmwarefuturenet_nxr-350\/c_firmwarefuturenet_vxr\/x86_firmwarefuturenet_nxr-530_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-36475
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.2||HIGH
EPSS-0.23% / 45.47%
||
7 Day CHG-0.19%
Published-17 Jul, 2024 | 08:48
Updated-27 Sep, 2024 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FutureNet NXR series, VXR series and WXR series provided by Century Systems Co., Ltd. contain an active debug code vulnerability. If a user who knows how to use the debug function logs in to the product, the debug function may be used and an arbitrary OS command may be executed.

Action-Not Available
Vendor-centurysysCentury Systems Co., Ltd.centurysys
Product-futurenet_nxr-125\/cx_firmwarefuturenet_nxr-610x_firmwarefuturenet_nxr-650futurenet_nxr-155\/c_firmwarefuturenet_nxr-160\/lwfuturenet_nxr-g180\/l-ca_firmwarefuturenet_nxr-230\/cfuturenet_nxr-530_firmwarefuturenet_nxr-g050_firmwarefuturenet_vxr-x64futurenet_nxr-650_firmwarefuturenet_nxr-120\/cfuturenet_nxr-230\/c_firmwarefuturenet_nxr-130\/c_firmwarefuturenet_nxr-160\/lw_firmwarefuturenet_nxr-g110_firmwarefuturenet_nxr-1200_firmwarefuturenet_nxr-g180\/l-cafuturenet_wxr-250_firmwarefuturenet_nxr-130\/cfuturenet_wxr-250futurenet_nxr-125\/cxfuturenet_nxr-350\/c_firmwarefuturenet_nxr-g120_firmwarefuturenet_nxr-350\/cfuturenet_nxr-g200_firmwarefuturenet_nxr-1300_firmwarefuturenet_nxr-g060_firmwarefuturenet_nxr-1200futurenet_nxr-120\/c_firmwarefuturenet_vxr-x86futurenet_nxr-g100_firmwarefuturenet_nxr-530FutureNet NXR-610X seriesFutureNet NXR-120/CFutureNet WXR-250FutureNet NXR-530FutureNet NXR-G180/L-CAFutureNet NXR-125/CXFutureNet NXR-230/CFutureNet NXR-650FutureNet NXR-350/CFutureNet NXR-1300 seriesFutureNet NXR-130/CFutureNet NXR-G120 seriesFutureNet NXR-160/LWFutureNet NXR-G100 seriesFutureNet VXR/x86FutureNet NXR-155/C seriesFutureNet NXR-G200 seriesFutureNet NXR-G050 seriesFutureNet NXR-1200FutureNet VXR/x64FutureNet NXR-G060 seriesFutureNet NXR-G110 seriesfuturenet_nxr-230\/c_firmwarefuturenet_nxr-130\/c_firmwarefuturenet_vxr\/x86_firmwarefuturenet_nxr-125\/cx_firmwarefuturenet_nxr-610x_firmwarefuturenet_nxr-160\/lw_firmwarefuturenet_nxr-g110_firmwarefuturenet_nxr-1200_firmwarefuturenet_nxr-155\/c_firmwarefuturenet_wxr-250_firmwarefuturenet_nxr-350\/c_firmwarefuturenet_nxr-g120_firmwarefuturenet_nxr-g180\/l-ca_firmwarefuturenet_nxr-g200_firmwarefuturenet_nxr-1300_firmwarefuturenet_nxr-g060_firmwarefuturenet_nxr-120\/c_firmwarefuturenet_vxr\/x64_firmwarefuturenet_nxr-530_firmwarefuturenet_nxr-g050_firmwarefuturenet_nxr-g100_firmwarefuturenet_nxr-650_firmware
CWE ID-CWE-489
Active Debug Code
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-31070
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.1||CRITICAL
EPSS-1.20% / 78.07%
||
7 Day CHG+0.88%
Published-17 Jul, 2024 | 08:47
Updated-27 Sep, 2024 | 17:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Initialization of a resource with an insecure default vulnerability in FutureNet NXR series, VXR series and WXR series provided by Century Systems Co., Ltd. allows a remote unauthenticated attacker to access telnet service unlimitedly.

Action-Not Available
Vendor-centurysysCentury Systems Co., Ltd.centurysys
Product-futurenet_nxr-230\/c_firmwarefuturenet_nxr-130\/c_firmwarefuturenet_nxr-160\/lw_firmwarefuturenet_nxr-125\/cx_firmwarefuturenet_nxr-610x_firmwarefuturenet_nxr-530futurenet_nxr-g110_firmwarefuturenet_nxr-1200_firmwarefuturenet_nxr-155\/c_firmwarefuturenet_wxr-250_firmwarefuturenet_nxr-130\/cfuturenet_wxr-250futurenet_nxr-g100_firmwarefuturenet_nxr-160\/lwfuturenet_nxr-350\/c_firmwarefuturenet_nxr-g120_firmwarefuturenet_nxr-g180\/l-ca_firmwarefuturenet_nxr-350\/cfuturenet_nxr-g200_firmwarefuturenet_nxr-230\/cfuturenet_nxr-1300_firmwarefuturenet_nxr-g060_firmwarefuturenet_nxr-1200futurenet_nxr-120\/c_firmwarefuturenet_vxr-x86futurenet_nxr-530_firmwarefuturenet_nxr-g050_firmwarefuturenet_vxr-x64futurenet_nxr-650_firmwarefuturenet_nxr-g180\/l-cafuturenet_nxr-120\/cFutureNet NXR-610X seriesFutureNet NXR-120/CFutureNet WXR-250FutureNet NXR-530FutureNet NXR-G180/L-CAFutureNet NXR-125/CXFutureNet NXR-230/CFutureNet NXR-650FutureNet NXR-350/CFutureNet NXR-1300 seriesFutureNet NXR-130/CFutureNet NXR-G120 seriesFutureNet NXR-160/LWFutureNet NXR-G100 seriesFutureNet VXR/x86FutureNet NXR-155/C seriesFutureNet NXR-G200 seriesFutureNet NXR-G050 seriesFutureNet NXR-1200FutureNet VXR/x64FutureNet NXR-G060 seriesFutureNet NXR-G110 seriesfuturenet_nxr-230\/c_firmwarefuturenet_nxr-130\/c_firmwarefuturenet_vxr\/x86_firmwarefuturenet_nxr-125\/cx_firmwarefuturenet_nxr-610x_firmwarefuturenet_nxr-160\/lw_firmwarefuturenet_nxr-g110_firmwarefuturenet_nxr-1200_firmwarefuturenet_nxr-155\/c_firmwarefuturenet_wxr-250_firmwarefuturenet_nxr-350\/c_firmwarefuturenet_nxr-g120_firmwarefuturenet_nxr-g180\/l-ca_firmwarefuturenet_nxr-g200_firmwarefuturenet_nxr-1300_firmwarefuturenet_nxr-g060_firmwarefuturenet_nxr-120\/c_firmwarefuturenet_vxr\/x64_firmwarefuturenet_nxr-530_firmwarefuturenet_nxr-g050_firmwarefuturenet_nxr-g100_firmwarefuturenet_nxr-650_firmware
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2024-40617
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-9.99% / 92.75%
||
7 Day CHG-0.34%
Published-17 Jul, 2024 | 08:44
Updated-29 Oct, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.

Action-Not Available
Vendor-Fujitsu Limited
Product-network_edgiot_gw1500network_edgiot_gw1500_firmwareFUJITSU Network Edgiot GW1500 (M2M-GW for FENICS)
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-36453
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.29% / 51.76%
||
7 Day CHG+0.13%
Published-10 Jul, 2024 | 07:02
Updated-06 Nov, 2024 | 21:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in session_login.cgi of Webmin versions prior to 1.970 and Usermin versions prior to 1.820. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a webpage may be altered or sensitive information such as a credential may be disclosed.

Action-Not Available
Vendor-Webmin
Product-WebminUsermin
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-36452
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-3.1||LOW
EPSS-0.19% / 41.17%
||
7 Day CHG+0.04%
Published-10 Jul, 2024 | 07:01
Updated-05 Nov, 2024 | 22:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site request forgery vulnerability exists in ajaxterm module of Webmin versions prior to 2.003. If this vulnerability is exploited, unintended operations may be performed when a user views a malicious page while logged in. As a result, data within a system may be referred, a webpage may be altered, or a server may be permanently halted.

Action-Not Available
Vendor-Webmin
Product-Webmin
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2024-36451
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.15% / 36.38%
||
7 Day CHG~0.00%
Published-10 Jul, 2024 | 07:01
Updated-02 Aug, 2024 | 03:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper handling of insufficient permissions or privileges vulnerability exists in ajaxterm module of Webmin prior to 2.003. If this vulnerability is exploited, a console session may be hijacked by an unauthorized user. As a result, data within a system may be referred, a webpage may be altered, or a server may be permanently halted.

Action-Not Available
Vendor-WebminGentoo Foundation, Inc.
Product-Webminwebmin
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2024-36450
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.4||MEDIUM
EPSS-0.23% / 45.76%
||
7 Day CHG+0.10%
Published-10 Jul, 2024 | 07:01
Updated-13 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in sysinfo.cgi of Webmin versions prior to 1.910. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a session ID may be obtained, a webpage may be altered, or a server may be halted.

Action-Not Available
Vendor-Webmin
Product-webminWebmin
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-39927
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.2||HIGH
EPSS-0.62% / 69.27%
||
7 Day CHG-0.35%
Published-10 Jul, 2024 | 06:55
Updated-02 Aug, 2024 | 04:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write vulnerability exists in Ricoh MFPs and printers. If a remote attacker sends a specially crafted request to the affected products, the products may be able to cause a denial-of-service (DoS) condition and/or user's data may be destroyed.

Action-Not Available
Vendor-Ricoh Company, Ltd.
Product-IM 460F/460FTL/370/370FIM C6010/C5510/C4510IM C3510/C3010IM C2510/C2010IM C7010IM C8500/C8510M/C8500/C8500M370fim_c7010im_c8500im_460ftlim_c5510im_460fim_c3510im_c2010im_c3010im_c6010im_c8510mim_c8500mim_c4510370im_c2510
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-39886
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-3.7||LOW
EPSS-0.16% / 37.26%
||
7 Day CHG~0.00%
Published-10 Jul, 2024 | 06:41
Updated-02 Aug, 2024 | 04:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TONE store App version 3.4.2 and earlier contains an issue with unprotected primary channel. Since TONE store App communicates with TONE store website in cleartext, a man-in-the-middle attack may allow an attacker to obtain and/or alter communications of the affected App.

Action-Not Available
Vendor-DREAM TRAIN INTERNET INC.
Product-TONE store App
CWE ID-CWE-419
Unprotected Primary Channel
CVE-2024-38471
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.8||MEDIUM
EPSS-0.07% / 21.22%
||
7 Day CHG~0.00%
Published-04 Jul, 2024 | 00:49
Updated-13 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a crafted backup file. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-Archer AX5400Archer AX3000Archer AXE5400Archer AXE75Archer Air R5archer_ax5400_firmwarearcher_ax3000_firmwarearcher_axe75_firmwarearcher_airr5_firmwarearcher_axe5400_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-38345
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.1||HIGH
EPSS-0.12% / 32.50%
||
7 Day CHG~0.00%
Published-04 Jul, 2024 | 00:19
Updated-13 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site request forgery vulnerability exists in Sola Testimonials versions prior to 3.0.0. If this vulnerability is exploited, an attacker allows a user who logs in to the WordPress site where the affected plugin is enabled to access a malicious page. As a result, the user may perform unintended operations on the WordPress site.

Action-Not Available
Vendor-Sola Pluginssolaplugins
Product-Sola Testimonialssola_testimonials
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
  • Previous
  • 1
  • 2
  • ...
  • 5
  • 6
  • 7
  • ...
  • 59
  • 60
  • Next