Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

JPCERT/CC

#ede6fdc4-6654-4307-a26d-3331c018e2ce
PolicyEmail

Short Name

jpcert

Program Role

Root || CNA

Top Level Root

MITRE Corporation

Security Advisories

View Advisories

Domain

jpcert.or.jp

Country

Japan

Scope

Root Scope: Japan organizations.
CNA Scope: Vulnerability assignment related to its vulnerability coordination role.
Reported CVEsVendorsProductsReports
2952Vulnerabilities found

CVE-2024-38344
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.4||MEDIUM
EPSS-0.11% / 30.53%
||
7 Day CHG~0.00%
Published-04 Jul, 2024 | 00:18
Updated-06 Dec, 2024 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site request forgery vulnerability exists in WP Tweet Walls versions prior to 1.0.4. If this vulnerability is exploited, an attacker allows a user who logs in to the WordPress site where the affected plugin is enabled to access a malicious page. As a result, the user may perform unintended operations on the WordPress site.

Action-Not Available
Vendor-Sola Plugins
Product-WP Tweet Walls
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2024-38480
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4||MEDIUM
EPSS-0.04% / 13.09%
||
7 Day CHG~0.00%
Published-01 Jul, 2024 | 02:27
Updated-12 Nov, 2024 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

"Piccoma" App for Android and iOS versions prior to 6.20.0 uses a hard-coded API key for an external service, which may allow a local attacker to obtain the API key. Note that the users of the app are not directly affected by this vulnerability.

Action-Not Available
Vendor-Kakao piccoma Corp.
Product-"Piccoma" App for Android"Piccoma" App for iOS
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-33687
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.78%
||
7 Day CHG~0.00%
Published-24 Jun, 2024 | 15:03
Updated-13 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient verification of data authenticity issue exists in NJ Series CPU Unit all versions and NX Series CPU Unit all versions. If a user program in the affected product is altered, the product may not be able to detect the alteration.

Action-Not Available
Vendor-omronOMRON Corporation
Product-nx1p2-1040dt1_firmwarenx1p2-9024dt1_firmwarenx102-1100_firmwarenj501-4300_firmwarenj101-1020nx701-1600_firmwarenx102-1020_firmwarenj501-4300nj501-5300-1nj-pd3001nx1w-mab221nj501-1320_firmwarenx1p2-1040dt_firmwarenj501-5300_firmwarenj501-1340nx701-z700_firmwarenj501-4310_firmwarenx1w-mab221_firmwarenx701-1600nj501-r420nj101-9000nx102-9000_firmwarenj101-1000nx102-1120nj501-4500nx1p2-9024dtnx102-1020nj-pa3001nj501-4400_firmwarenj501-1300_firmwarenx1p2-1040dt1nj501-4400nj101-1020_firmwarenx701-z700nx701-1700_firmwarenj501-1320nx1p2-9024dt_firmwarenj501-5300-1_firmwarenj501-4310nj101-9000_firmwarenx1p2-1040dtnj501-1400nx102-1100nj101-9020nx1w-adb21nj501-r520nj501-r400_firmwarenj-pa3001_firmwarenj501-r400nj501-1340_firmwarenj101-1000_firmwarenx1p2-1140dt1nj501-r320nj-pd3001_firmwarenj501-4500_firmwarenx1p2-9024dt1nx701-1720_firmwarenx102-1220_firmwarenx102-1200nj501-r320_firmwarenx1w-cif01nx102-1000_firmwarenx102-9020_firmwarenj501-5300nj501-1500nx1w-dab21v_firmwarenx1w-adb21_firmwarenx701-1700nj501-140nx102-1220nj301-1100_firmwarenx701-1720nj501-r300_firmwarenx102-1000nj501-1520_firmwarenx1w-cif11_firmwarenj301-1200nx1w-cif01_firmwarenj501-r520_firmwarenj101-9020_firmwarenj501-r300nj301-1100nj501-4320nx102-9020nx102-1120_firmwarenj501-r500_firmwarenx1w-cif12nx1p2-1140dt_firmwarenx1p2-1140dt1_firmwarenx1w-cif11nx1w-cif12_firmwarenj501-1300nj501-r500nx701-1620nx701-z600_firmwarenj501-1520nx701-z600nx102-9000nj501-4320_firmwarenx701-1620_firmwarenj501-1500_firmwarenx1w-dab21vnj301-1200_firmwarenx102-1200_firmwarenj501-r420_firmwarenj501-1400_firmwarenj501-1420nx1p2-1140dtnj501-140_firmwarenj501-1420_firmwareNX Series CPU UnitNJ Series CPU Unit
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2024-37387
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4||MEDIUM
EPSS-0.05% / 13.47%
||
7 Day CHG~0.00%
Published-19 Jun, 2024 | 06:40
Updated-02 Aug, 2024 | 03:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of potentially dangerous function issue exists in Ricoh Streamline NX PC Client. If this vulnerability is exploited, files in the PC where the product is installed may be altered.

Action-Not Available
Vendor-Ricoh Company, Ltd.
Product-Ricoh Streamline NX PC Client
CWE ID-CWE-676
Use of Potentially Dangerous Function
CVE-2024-37124
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.14% / 34.82%
||
7 Day CHG~0.00%
Published-19 Jun, 2024 | 06:40
Updated-02 Aug, 2024 | 03:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of potentially dangerous function issue exists in Ricoh Streamline NX PC Client. If this vulnerability is exploited, an attacker may create an arbitrary file in the PC where the product is installed.

Action-Not Available
Vendor-Ricoh Company, Ltd.
Product-Ricoh Streamline NX PC Clientstreamline_nx_pc_client
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-36480
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.11% / 30.31%
||
7 Day CHG~0.00%
Published-19 Jun, 2024 | 06:40
Updated-02 Aug, 2024 | 03:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of hard-coded credentials issue exists in Ricoh Streamline NX PC Client ver.3.7.2 and earlier. If this vulnerability is exploited, an attacker may obtain LocalSystem Account of the PC where the product is installed. As a result, unintended operations may be performed on the PC.

Action-Not Available
Vendor-Ricoh Company, Ltd.
Product-Ricoh Streamline NX PC Clientstreamline_nx_pc_client
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-36252
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.3||MEDIUM
EPSS-0.05% / 14.40%
||
7 Day CHG~0.00%
Published-19 Jun, 2024 | 06:40
Updated-02 Aug, 2024 | 03:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper restriction of communication channel to intended endpoints issue exists in Ricoh Streamline NX PC Client ver.3.6.x and earlier. If this vulnerability is exploited, arbitrary code may be executed on the PC where the product is installed.

Action-Not Available
Vendor-RICOH COMPANY, LTD
Product-Ricoh Streamline NX PC Client
CWE ID-CWE-923
Improper Restriction of Communication Channel to Intended Endpoints
CVE-2024-37881
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-3.17% / 86.42%
||
7 Day CHG~0.00%
Published-19 Jun, 2024 | 06:29
Updated-02 Aug, 2024 | 03:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SiteGuard WP Plugin provides a functionality to customize the path to the login page wp-login.php and implements a measure to avoid redirection from other URLs. However, SiteGuard WP Plugin versions prior to 1.7.7 missed to implement a measure to avoid redirection from wp-register.php. As a result, the customized path to the login page may be exposed.

Action-Not Available
Vendor-EG Secure Solutions Inc.eg_secure_solutions
Product-SiteGuard WP Pluginsiteguard
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
CVE-2024-35298
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.3||MEDIUM
EPSS-0.10% / 28.84%
||
7 Day CHG~0.00%
Published-19 Jun, 2024 | 05:07
Updated-02 Aug, 2024 | 03:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authorization in handler for custom URL scheme issue in 'ZOZOTOWN' App for Android versions prior to 7.39.6 allows an attacker to lead a user to access an arbitrary website via another application installed on the user's device. As a result, the user may become a victim of a phishing attack.

Action-Not Available
Vendor-ZOZO, Inc.
Product-'ZOZOTOWN' App for Android
CWE ID-CWE-939
Improper Authorization in Handler for Custom URL Scheme
CVE-2024-34024
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.3||MEDIUM
EPSS-0.47% / 63.48%
||
7 Day CHG~0.00%
Published-18 Jun, 2024 | 05:44
Updated-15 Nov, 2024 | 21:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Observable response discrepancy issue exists in ID Link Manager and FUJITSU Software TIME CREATOR. If this vulnerability is exploited, an unauthenticated remote attacker may determine if a username is valid or not.

Action-Not Available
Vendor-Fsas Technologies Inc.
Product-FUJITSU Software TIME CREATOR ID Link Manager SaaSFUJITSU Software TIME CREATOR ID Link ManagerFUJITSU Business Application ID Link Manager IIFUJITSU Software ID Link Manager
CVE-2024-33620
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.6||HIGH
EPSS-0.29% / 52.33%
||
7 Day CHG~0.00%
Published-18 Jun, 2024 | 05:44
Updated-13 Aug, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Absolute path traversal vulnerability exists in ID Link Manager and FUJITSU Software TIME CREATOR. If this vulnerability is exploited, the file contents including sensitive information on the server may be retrieved by an unauthenticated remote attacker.

Action-Not Available
Vendor-Fsas Technologies Inc.Fujitsu Limited
Product-FUJITSU Software TIME CREATOR ID Link ManagerFUJITSU Business Application ID Link Manager IIFUJITSU Software ID Link Managerbusiness_application_id_link_manager_iiid_link_managertime_creator_id_link_manager
CWE ID-CWE-36
Absolute Path Traversal
CVE-2024-33622
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 29.21%
||
7 Day CHG~0.00%
Published-18 Jun, 2024 | 05:44
Updated-21 Nov, 2024 | 15:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Missing authentication for critical function vulnerability exists in ID Link Manager and FUJITSU Software TIME CREATOR. If this vulnerability is exploited, sensitive information may be obtained and/or the information stored in the database may be altered by a remote authenticated attacker.

Action-Not Available
Vendor-Fsas Technologies Inc.
Product-FUJITSU Software TIME CREATOR ID Link Manager SaaSFUJITSU Software TIME CREATOR ID Link ManagerFUJITSU Business Application ID Link Manager IIFUJITSU Software ID Link Manager
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-36289
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.12% / 31.16%
||
7 Day CHG~0.00%
Published-17 Jun, 2024 | 07:34
Updated-02 Aug, 2024 | 03:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Reusing a nonce, key pair in encryption issue exists in "FreeFrom - the nostr client" App versions prior to 1.3.5 for Android and iOS. If this vulnerability is exploited, the content of direct messages (DMs) between users may be manipulated by a man-in-the-middle attack.

Action-Not Available
Vendor-FreeFrom K.K.freefrom_kk
Product-"FreeFrom - the nostr client" App for Android"FreeFrom - the nostr client" App for iOSfreefrom_the_nostr_client_app
CWE ID-CWE-323
Reusing a Nonce, Key Pair in Encryption
CVE-2024-36279
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 26.53%
||
7 Day CHG~0.00%
Published-17 Jun, 2024 | 07:34
Updated-02 Aug, 2024 | 03:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Reliance on obfuscation or encryption of security-relevant inputs without integrity checking issue exists in "FreeFrom - the nostr client" App versions prior to 1.3.5 for Android and iOS. If this vulnerability is exploited, the content of direct messages (DMs) between users may be manipulated by a man-in-the-middle attack.

Action-Not Available
Vendor-FreeFrom K.K.freefrom_kk
Product-"FreeFrom - the nostr client" App for Android"FreeFrom - the nostr client" App for iOSfreefrom_the_nostr_client_app
CWE ID-CWE-649
Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
CVE-2024-36277
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 19.52%
||
7 Day CHG~0.00%
Published-17 Jun, 2024 | 07:33
Updated-02 Aug, 2024 | 03:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper verification of cryptographic signature issue exists in "FreeFrom - the nostr client" App versions prior to 1.3.5 for Android and iOS. The affected app cannot detect event data with invalid signatures.

Action-Not Available
Vendor-FreeFrom K.K.freefrom_kk
Product-"FreeFrom - the nostr client" App for Android"FreeFrom - the nostr client" App for iOSfreefrom_the_nostr_client_app
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-36454
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 29.88%
||
7 Day CHG~0.00%
Published-12 Jun, 2024 | 05:12
Updated-02 Aug, 2024 | 03:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of uninitialized resource issue exists in IPCOM EX2 Series (V01L0x Series) V01L07NF0201 and earlier, and IPCOM VE2 Series V01L07NF0201 and earlier. If this vulnerability is exploited, the system may be rebooted or suspended by receiving a specially crafted packet.

Action-Not Available
Vendor-Fsas Technologies Inc.Fujitsu Limited
Product-IPCOM VE2 SeriesIPCOM EX2 Series (V01L0x Series)ipcom_ex2_sc_3500_firmwareipcom_ve2_ls_plus2_220_firmware
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2024-36103
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.8||MEDIUM
EPSS-0.19% / 41.08%
||
7 Day CHG~0.00%
Published-12 Jun, 2024 | 00:34
Updated-02 Aug, 2024 | 03:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS command injection vulnerability in WRC-X5400GS-B v1.0.10 and earlier, and WRC-X5400GSA-B v1.0.10 and earlier allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product.

Action-Not Available
Vendor-Elecom Co., Ltd.
Product-WRC-X5400GSA-BWRC-X5400GS-Bwrc-x5400gsa-bwrc-x5400gs-b
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-31397
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.9||MEDIUM
EPSS-0.14% / 34.11%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 05:34
Updated-02 Aug, 2024 | 01:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper handling of extra values issue exists in Cybozu Garoon 5.0.0 to 5.15.2. If this vulnerability is exploited, a user who can log in to the product with the administrative privilege may be able to cause a denial-of-service (DoS) condition.

Action-Not Available
Vendor-Cybozu, Inc.
Product-Cybozu Garoon
CWE ID-CWE-231
Improper Handling of Extra Values
CVE-2024-31399
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 47.71%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 05:34
Updated-20 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Excessive platform resource consumption within a loop issue exists in Cybozu Garoon 5.0.0 to 5.15.2. If this vulnerability is exploited, processing a crafted mail may cause a denial-of-service (DoS) condition.

Action-Not Available
Vendor-Cybozu, Inc.
Product-garoonCybozu Garoon
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-31402
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.3||MEDIUM
EPSS-0.37% / 58.17%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 05:21
Updated-28 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect authorization vulnerability in Cybozu Garoon 5.0.0 to 5.15.2 allows a remote authenticated attacker to delete the data of Shared To-Dos.

Action-Not Available
Vendor-Cybozu, Inc.
Product-garoonCybozu Garoon
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-31398
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.3||MEDIUM
EPSS-0.36% / 57.68%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 05:20
Updated-13 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insertion of sensitive information into sent data issue exists in Cybozu Garoon 5.0.0 to 5.15.2. If this vulnerability is exploited, a user who can log in to the product may obtain information on the list of users.

Action-Not Available
Vendor-Cybozu, Inc.
Product-garoonCybozu Garoon
CVE-2024-31404
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.3||MEDIUM
EPSS-0.36% / 57.68%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 04:27
Updated-28 May, 2025 | 20:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insertion of sensitive information into sent data issue exists in Cybozu Garoon 5.5.0 to 6.0.0, which may allow a user who can log in to the product to view the data of Scheduler.

Action-Not Available
Vendor-Cybozu, Inc.
Product-garoonCybozu Garoon
CWE ID-CWE-922
Insecure Storage of Sensitive Information
CVE-2024-31403
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.4||MEDIUM
EPSS-0.35% / 56.86%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 04:27
Updated-28 May, 2025 | 20:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect authorization vulnerability in Cybozu Garoon 5.0.0 to 6.0.0 allows a remote authenticated attacker to alter and/or obtain the data of Memo.

Action-Not Available
Vendor-Cybozu, Inc.
Product-garoonCybozu Garoongaroon
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-31401
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9||CRITICAL
EPSS-2.58% / 84.98%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 04:26
Updated-05 Aug, 2025 | 15:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability in Cybozu Garoon 5.0.0 to 5.15.2 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script on the web browser of the user who is logging in to the product.

Action-Not Available
Vendor-Cybozu, Inc.
Product-garoonCybozu Garoongaroon
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-31400
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.36% / 57.06%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 04:26
Updated-05 Aug, 2025 | 15:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insertion of sensitive information into sent data issue exists in Cybozu Garoon 5.0.0 to 5.15.0. If this vulnerability is exploited, unintended data may be left in forwarded mail.

Action-Not Available
Vendor-Cybozu, Inc.
Product-garoonCybozu Garoon
CWE ID-CWE-922
Insecure Storage of Sensitive Information
CVE-2024-36360
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.85% / 82.27%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 04:19
Updated-14 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS command injection vulnerability exists in awkblog v0.0.1 (commit hash:7b761b192d0e0dc3eef0f30630e00ece01c8d552) and earlier. If a remote unauthenticated attacker sends a specially crafted HTTP request, an arbitrary OS command may be executed with the privileges of the affected product on the machine running the product.

Action-Not Available
Vendor-Keisuke Nakayamakeisuke_nakayama
Product-awkblogawkblog
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-36082
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.60% / 68.60%
||
7 Day CHG~0.00%
Published-07 Jun, 2024 | 03:42
Updated-30 Oct, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SQL injection vulnerability in Music Store - WordPress eCommerce versions prior to 1.1.14 allows a remote authenticated attacker with an administrative privilege to execute arbitrary SQL commands. Information stored in the database may be obtained or altered by the attacker.

Action-Not Available
Vendor-CodePeople
Product-music_storeMusic Store - WordPress eCommerce
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2023-51436
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.9||MEDIUM
EPSS-0.26% / 49.47%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 03:45
Updated-19 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in UNIVERSAL PASSPORT RX versions 1.0.0 to 1.0.8, which may allow a remote authenticated attacker with an administrative privilege to execute an arbitrary script on the web browser of the user who is using the product.

Action-Not Available
Vendor-Japan System Techniques Co., Ltd.japan_system_techniques
Product-UNIVERSAL PASSPORT RXuniversal_passport_rx
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-42427
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.28% / 50.64%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 03:44
Updated-02 Aug, 2024 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in UNIVERSAL PASSPORT RX versions 1.0.0 to 1.0.7, which may allow a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is using the product.

Action-Not Available
Vendor-Japan System Techniques Co., Ltd.japan_system_techniques
Product-UNIVERSAL PASSPORT RXuniversal_passport_rx
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-36246
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.19% / 41.17%
||
7 Day CHG~0.00%
Published-31 May, 2024 | 06:11
Updated-08 Apr, 2025 | 05:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Missing authorization vulnerability exists in Unifier and Unifier Cast. If this vulnerability is exploited, arbitrary code may be executed with LocalSystem privilege. As a result, a malicious program may be installed, data may be altered or deleted.

Action-Not Available
Vendor-Yokogawa Rental & Lease Corporationyokogawa_rental_lease_corporation
Product-UnifierUnifier Castunifierunifier_cast
CWE ID-CWE-862
Missing Authorization
CVE-2024-23847
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.9||MEDIUM
EPSS-0.07% / 21.12%
||
7 Day CHG~0.00%
Published-31 May, 2024 | 06:11
Updated-08 Apr, 2025 | 05:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions issue exists in Unifier and Unifier Cast. If this vulnerability is exploited, arbitrary code may be executed with LocalSystem privilege. As a result, a malicious program may be installed, data may be altered or deleted.

Action-Not Available
Vendor-Yokogawa Rental & Lease Corporationyokogawa_rental_lease_corporation
Product-UnifierUnifier Castunifier
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2024-32850
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.67% / 81.37%
||
7 Day CHG~0.00%
Published-31 May, 2024 | 01:33
Updated-02 Aug, 2024 | 02:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper neutralization of special elements used in a command ('Command Injection') exists in SkyBridge MB-A100/MB-A110 firmware Ver. 4.2.2 and earlier and SkyBridge BASIC MB-A130 firmware Ver. 1.5.5 and earlier. If the remote monitoring and control function is enabled on the product, an attacker with access to the product may execute an arbitrary command or login to the product with the administrator privilege.

Action-Not Available
Vendor-Seiko Solutions Inc.seiko-sol
Product-SkyBridge BASIC MB-A130SkyBridge MB-A100/MB-A110skybridge_mb-a110_firmwareskybridge_basic_mb-a130_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-36267
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.1||HIGH
EPSS-0.20% / 42.65%
||
7 Day CHG~0.00%
Published-30 May, 2024 | 05:33
Updated-02 Aug, 2024 | 03:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Path traversal vulnerability exists in Redmine DMSF Plugin versions prior to 3.1.4. If this vulnerability is exploited, a logged-in user may obtain or delete arbitrary files on the server (within the privilege of the Redmine process).

Action-Not Available
Vendor-Kontronkontron
Product-Redmine DMSF Pluginredmine_dmsf_plugin
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-28886
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.4||HIGH
EPSS-0.25% / 47.98%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 03:11
Updated-02 Aug, 2024 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS command injection vulnerability exists in UTAU versions prior to v0.4.19. If a user of the product opens a crafted UTAU project file (.ust file), an arbitrary OS command may be executed.

Action-Not Available
Vendor-ameya/ayameameya_ayame
Product-UTAUutau
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-32944
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-3.3||LOW
EPSS-0.04% / 11.04%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 03:11
Updated-29 Oct, 2024 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Path traversal vulnerability exists in UTAU versions prior to v0.4.19. If a user of the product installs a crafted UTAU voicebank installer (.uar file, .zip file) to UTAU, an arbitrary file may be placed.

Action-Not Available
Vendor-ameya/ayame
Product-UTAU
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-29078
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.50%
||
7 Day CHG~0.00%
Published-27 May, 2024 | 23:52
Updated-28 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect permission assignment for critical resource issue exists in MosP kintai kanri V4.6.6 and earlier, which may allow a remote unauthenticated attacker with access to the product to alter the product settings.

Action-Not Available
Vendor-esMind, LLC
Product-MosP kintai kanri
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2024-28880
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 22.35%
||
7 Day CHG~0.00%
Published-27 May, 2024 | 23:50
Updated-02 Aug, 2024 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Path traversal vulnerability in MosP kintai kanri V4.6.6 and earlier allows a remote attacker who can log in to the product to obtain sensitive information of the product.

Action-Not Available
Vendor-esMind, LLCesmind
Product-MosP kintai kanrimosp_kintai_kanri
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-35297
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.7||MEDIUM
EPSS-0.19% / 40.66%
||
7 Day CHG~0.00%
Published-27 May, 2024 | 04:40
Updated-08 Nov, 2024 | 17:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in WP Booking versions prior to 2.4.5. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is accessing the web site using the product.

Action-Not Available
Vendor-aviplugins.com
Product-WP Booking
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-35291
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.12% / 32.07%
||
7 Day CHG~0.00%
Published-27 May, 2024 | 04:39
Updated-28 Oct, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in Splunk Config Explorer versions prior to 1.7.16. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is using the product.

Action-Not Available
Vendor-Chris Younger
Product-Splunk Config Explorer
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-32988
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.23% / 46.05%
||
7 Day CHG~0.00%
Published-22 May, 2024 | 07:37
Updated-02 Aug, 2024 | 02:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

'OfferBox' App for Android versions 2.0.0 to 2.3.17 and 'OfferBox' App for iOS versions 2.1.7 to 2.6.14 use a hard-coded secret key for JWT. Secret key for JWT may be retrieved if the application binary is reverse-engineered.

Action-Not Available
Vendor-i-plug inc.iplug
Product-'OfferBox' App for Android'OfferBox' App for iOSofferbox_app_for_iosofferbox_app_for_android
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-35162
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.71% / 71.35%
||
7 Day CHG~0.00%
Published-22 May, 2024 | 05:30
Updated-12 Aug, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Path traversal vulnerability exists in Download Plugins and Themes from Dashboard versions prior to 1.8.6. If this vulnerability is exploited, a remote authenticated attacker with "switch_themes" privilege may obtain arbitrary files on the server.

Action-Not Available
Vendor-WPFactory LLCwpfactory
Product-Download Plugins and Themes from Dashboarddownload_plugins_and_themes_from_dashboard
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-31340
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.8||MEDIUM
EPSS-0.28% / 51.03%
||
7 Day CHG~0.00%
Published-22 May, 2024 | 05:29
Updated-28 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TP-Link Tether versions prior to 4.5.13 and TP-Link Tapo versions prior to 3.3.6 do not properly validate certificates, which may allow a remote unauthenticated attacker to eavesdrop on an encrypted communication via a man-in-the-middle attack.

Action-Not Available
Vendor-TP-Link
Product-TP-Link TapoTP-Link Tether
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-31396
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.6||MEDIUM
EPSS-0.55% / 67.08%
||
7 Day CHG~0.00%
Published-22 May, 2024 | 04:35
Updated-12 May, 2025 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Code injection vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12 and Ver.3.0.x series versions prior to Ver.3.0.32. If this vulnerability is exploited, a user with an administrator or higher privilege who can log in to the product may execute an arbitrary command on the server.

Action-Not Available
Vendor-applepleappleple inc.appleple
Product-a-blog_cmsa-blog cms Ver.3.0.x seriesa-blog cms Ver.3.1.x seriesa-blog_cms
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-31395
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.69% / 70.87%
||
7 Day CHG~0.00%
Published-22 May, 2024 | 04:35
Updated-12 May, 2025 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with an editor or higher privilege who can log in to the product may execute an arbitrary script on the web browser of the user who accessed the schedule management page.

Action-Not Available
Vendor-applepleappleple inc.
Product-a-blog_cmsa-blog cms Ver.2.10.x seriesa-blog cms Ver.3.1.x seriesa-blog cms Ver.2.11.x seriesa-blog cms Ver.3.0.x seriesa-blog cms
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-31394
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.95% / 75.40%
||
7 Day CHG~0.00%
Published-22 May, 2024 | 04:35
Updated-12 May, 2025 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with an editor or higher privilege who can log in to the product may obtain arbitrary files on the server.

Action-Not Available
Vendor-applepleappleple inc.
Product-a-blog_cmsa-blog cms Ver.3.1.x seriesa-blog cms Ver.2.11.x seriesa-blog cms Ver.2.10.x seriesa-blog cms Ver.3.0.x seriesa-blog cms
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-30420
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.4||MEDIUM
EPSS-0.21% / 43.00%
||
7 Day CHG~0.00%
Published-22 May, 2024 | 04:35
Updated-12 May, 2025 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Server-side request forgery (SSRF) vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12 and Ver.3.0.x series versions prior to Ver.3.0.32. If this vulnerability is exploited, a user with an administrator or higher privilege who can log in to the product may obtain arbitrary files on the server and information on the internal server that is not disclosed to the public.

Action-Not Available
Vendor-applepleappleple inc.appleple
Product-a-blog_cmsa-blog cms Ver.3.0.x seriesa-blog cms Ver.3.1.x seriesa-blog_cms
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-30419
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.4||MEDIUM
EPSS-0.72% / 71.55%
||
7 Day CHG~0.00%
Published-22 May, 2024 | 04:35
Updated-12 May, 2025 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with a contributor or higher privilege who can log in to the product may execute an arbitrary script on the web browser of the user who accessed the website using the product.

Action-Not Available
Vendor-applepleappleple inc.appleple
Product-a-blog_cmsa-blog cms Ver.2.10.x seriesa-blog cms Ver.3.1.x seriesa-blog cms Ver.2.11.x seriesa-blog cms Ver.3.0.x seriesa-blog cmsa-blog_cms
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-34749
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.30% / 52.62%
||
7 Day CHG~0.00%
Published-13 May, 2024 | 08:17
Updated-27 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Phormer prior to version 3.35 contains a cross-site scripting vulnerability. If this vulnerability is exploited, a remote unauthenticated attacker may execute an arbitrary script on the web browser of the user.

Action-Not Available
Vendor-Aideen NasiriShargh
Product-Phormer
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-32674
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.4||MEDIUM
EPSS-0.18% / 40.36%
||
7 Day CHG~0.00%
Published-08 May, 2024 | 03:37
Updated-04 Jun, 2025 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heateor Social Login WordPress prior to 1.1.32 contains a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product.

Action-Not Available
Vendor-BestWebSoftHeateor
Product-social_loginHeateor Social Login WordPresssocial_login
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-24978
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.3||MEDIUM
EPSS-0.69% / 70.86%
||
7 Day CHG~0.00%
Published-01 May, 2024 | 13:05
Updated-01 Nov, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Denial-of-service (DoS) vulnerability exists in TvRock 0.9t8a. Receiving a specially crafted request by a remote attacker or having a user of TvRock click a specially crafted request may lead to ABEND (abnormal end). Note that the developer was unreachable, therefore, users should consider stop using TvRock 0.9t8a.

Action-Not Available
Vendor-TvRock
Product-TvRock
  • Previous
  • 1
  • 2
  • ...
  • 6
  • 7
  • 8
  • ...
  • 59
  • 60
  • Next