Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

JPCERT/CC

#ede6fdc4-6654-4307-a26d-3331c018e2ce
PolicyEmail

Short Name

jpcert

Program Role

Root || CNA

Top Level Root

MITRE Corporation

Security Advisories

View Advisories

Domain

jpcert.or.jp

Country

Japan

Scope

Root Scope: Japan organizations.
CNA Scope: Vulnerability assignment related to its vulnerability coordination role.
Reported CVEsVendorsProductsReports
2952Vulnerabilities found

CVE-2023-40160
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-3.7||LOW
EPSS-0.09% / 27.08%
||
7 Day CHG~0.00%
Published-18 Mar, 2024 | 00:32
Updated-24 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability exists in Mailing List Search CGI (pmmls.exe) included in A.K.I Software's PMailServer/PMailServer2 products. If this vulnerability is exploited, a remote attacker may obtain arbitrary files on the server.

Action-Not Available
Vendor-A.K.I Software
Product-pmmls.exe
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-39933
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.3||MEDIUM
EPSS-0.14% / 35.38%
||
7 Day CHG~0.00%
Published-18 Mar, 2024 | 00:32
Updated-07 Nov, 2024 | 17:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient verification vulnerability exists in Broadcast Mail CGI (pmc.exe) included in A.K.I Software's PMailServer/PMailServer2 products. If this vulnerability is exploited, a user who can upload files through the product may execute an arbitrary executable file with the web server's execution privilege.

Action-Not Available
Vendor-A.K.I Software
Product-pmc.exe
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2023-39223
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.4||MEDIUM
EPSS-0.09% / 26.77%
||
7 Day CHG~0.00%
Published-18 Mar, 2024 | 00:32
Updated-27 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stored cross-site scripting vulnerability exists in CGIs included in A.K.I Software's PMailServer/PMailServer2 products. If this vulnerability is exploited, an arbitrary script may be executed on a logged-in user's web browser.

Action-Not Available
Vendor-AKI Software
Product-pmum.exe (Pro edition)pmum.exe (Pro + IMAP4 edition / Enterprise edition)pmum.exe (Standard + IMAP4 edition)pmam.exepmum.exe (Standard edition)pmc.exe
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-27440
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.8||MEDIUM
EPSS-0.11% / 30.04%
||
7 Day CHG~0.00%
Published-13 Mar, 2024 | 05:40
Updated-05 Aug, 2024 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Toyoko Inn official App for iOS versions prior to 1.13.0 and Toyoko Inn official App for Android versions prior 1.3.14 don't properly verify server certificates, which allows a man-in-the-middle attacker to spoof servers and obtain sensitive information via a crafted certificate.

Action-Not Available
Vendor-Toyoko Inn IT Solution Co., Ltd.toyoko_inn
Product-Toyoko Inn official App for iOSToyoko Inn official App for Androidtoyoko_inn
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-27279
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-1.10% / 77.15%
||
7 Day CHG~0.00%
Published-12 Mar, 2024 | 08:19
Updated-13 May, 2025 | 15:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability exists in a-blog cms Ver.3.1.x series Ver.3.1.9 and earlier, Ver.3.0.x series Ver.3.0.30 and earlier, Ver.2.11.x series Ver.2.11.59 and earlier, Ver.2.10.x series Ver.2.10.51 and earlier, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with editor or higher privilege who can login to the product may obtain arbitrary files on the server including password files.

Action-Not Available
Vendor-applepleappleple inc.
Product-a-blog_cmsa-blog cms Ver.2.10.x seriesa-blog cms Ver.3.1.x seriesa-blog cms Ver.2.11.x seriesa-blog cms Ver.3.0.x seriesa-blog cms
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-27121
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.2||HIGH
EPSS-0.78% / 72.82%
||
7 Day CHG~0.00%
Published-12 Mar, 2024 | 07:55
Updated-16 Aug, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Path traversal vulnerability exists in Machine Automation Controller NJ Series and Machine Automation Controller NX Series. An arbitrary file in the affected product may be accessed or arbitrary code may be executed by processing a specially crafted request sent from a remote attacker with an administrative privilege. As for the details of the affected product names/versions, see the information provided by the vendor under [References] section.

Action-Not Available
Vendor-OMRON Corporationomron
Product-Machine Automation Controller NX SeriesMachine Automation Controller NJ Series nj301-1200_firmwarenj501-r520_firmwarenj101-9020_firmware
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-21584
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.73% / 71.68%
||
7 Day CHG~0.00%
Published-12 Mar, 2024 | 07:25
Updated-13 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pleasanter 1.3.49.0 and earlier contains a cross-site scripting vulnerability. If an attacker tricks the user to access the product with a specially crafted URL and perform a specific operation, an arbitrary script may be executed on the web browser of the user.

Action-Not Available
Vendor-pleasanterImplem Inc.
Product-pleasanterPleasanter
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-24964
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.3||MEDIUM
EPSS-0.24% / 46.78%
||
7 Day CHG~0.00%
Published-12 Mar, 2024 | 07:21
Updated-23 May, 2025 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control vulnerability exists in the resident process of SKYSEA Client View versions from Ver.11.220 prior to Ver.19.2. If this vulnerability is exploited, an arbitrary process may be executed with SYSTEM privilege by a user who can log in to the PC where the product's Windows client is installed.

Action-Not Available
Vendor-skygroupSky Co.,LTD.
Product-skysea_client_viewSKYSEA Client View
CVE-2024-21805
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.8||HIGH
EPSS-0.12% / 30.93%
||
7 Day CHG~0.00%
Published-12 Mar, 2024 | 07:20
Updated-23 May, 2025 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control vulnerability exists in the specific folder of SKYSEA Client View versions from Ver.16.100 prior to Ver.19.2. If this vulnerability is exploited, an arbitrary file may be placed in the specific folder by a user who can log in to the PC where the product's Windows client is installed. In case the file is a specially crafted DLL file, arbitrary code may be executed with SYSTEM privilege.

Action-Not Available
Vendor-skygroupSky Co.,LTD.skygroup
Product-skysea_client_viewSKYSEA Client Viewskysea_client_view
CWE ID-CWE-284
Improper Access Control
CVE-2024-27278
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.4||MEDIUM
EPSS-1.29% / 78.84%
||
7 Day CHG~0.00%
Published-05 Mar, 2024 | 23:49
Updated-27 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenPNE Plugin "opTimelinePlugin" 1.2.11 and earlier contains a cross-site scripting vulnerability. On the site which uses the affected product, when a user configures the profile with some malicious contents, an arbitrary script may be executed on the web browsers of other users.

Action-Not Available
Vendor-openpneOpenPNE Project
Product-optimelinepluginOpenPNE Plugin "opTimelinePlugin"
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-25972
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.3||HIGH
EPSS-0.06% / 17.10%
||
7 Day CHG~0.00%
Published-01 Mar, 2024 | 09:31
Updated-04 Nov, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Initialization of a resource with an insecure default vulnerability in OET-213H-BTS1 sold in Japan by Atsumi Electric Co., Ltd. allows a network-adjacent unauthenticated attacker to configure and control the affected product.

Action-Not Available
Vendor-Zhejiang Uniview Technologies Co.,Ltd and Atsumi Electric Co., Ltd.atsumi
Product-OET-213H-BTS1oet-213h-bts1
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2024-25091
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.1||CRITICAL
EPSS-0.09% / 27.18%
||
7 Day CHG~0.00%
Published-01 Mar, 2024 | 08:59
Updated-05 Aug, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure issue exists in RevoWorks SCVX prior to scvimage4.10.21_1013 (when using 'VirusChecker' or 'ThreatChecker' feature) and RevoWorks Browser prior to 2.2.95 (when using 'VirusChecker' or 'ThreatChecker' feature). If data containing malware is saved in a specific file format (eml, dmg, vhd, iso, msi), malware may be taken outside the sandboxed environment.

Action-Not Available
Vendor-J's Communications Co., Ltd.jscom
Product-RevoWorks SCVXRevoWorks Browserrevoworks_scvxrevoworks_browser
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2024-25579
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.8||MEDIUM
EPSS-0.15% / 36.48%
||
7 Day CHG~0.00%
Published-28 Feb, 2024 | 23:08
Updated-03 Dec, 2024 | 17:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".

Action-Not Available
Vendor-Elecom Co., Ltd.
Product-WRC-2533GS2-BWRC-2533GS2-WWRC-1167GS2H-BWRC-2533GS2V-BWMC-X1800GST-BWRC-2533GST2WRC-X3200GST3-BWRC-G01-WWRC-1167GS2-BWRC-1167GST2wrc-2533gs2-b_firmwarewrc-1167gs2h-b_firmwarewmc-x1800gst-b_firmwarewrc-2533gst2_firmwarewrc-2533gs2v-b_firmwarewrc-x3200gst3-b_firmwarewrc-g01-w_firmwarewrc-1167gst2_firmwarewrc-2533gs2-w_firmwarewrc-1167gs2-b_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-23910
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.3||MEDIUM
EPSS-0.41% / 60.40%
||
7 Day CHG~0.00%
Published-28 Feb, 2024 | 23:07
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit "WMC-2LX-B".

Action-Not Available
Vendor-Elecom Co., Ltd.
Product-wrc-2533gs2v-bwmc-x1800gst-bwrc-2533gst2_firmwarewrc-2533gs2-bwrc-g01-wwrc-2533gs2-wwsc-x1800gs-bwrc-1167gs2h-bwrc-1167gst2wrc-1167gs2h-b_firmwarewrc-x3200gst3-b_firmwarewmc-x1800gst-b_firmwarewrc-1167gst2_firmwarewrc-2533gs2-w_firmwarewrc-2533gst2wrc-1167gs2-b_firmwarewsc-x1800gs-b_firmwarewrc-g01-w_firmwarewrc-x3200gst3-bwrc-2533gs2-b_firmwarewrc-2533gs2v-b_firmwarewrc-1167gs2-bWRC-1167GS2-BWRC-2533GST2WRC-1167GS2H-BWRC-X3200GST3-BWRC-2533GS2-WWRC-2533GS2V-BWMC-X1800GST-BWRC-2533GS2-BWRC-1167GST2WRC-G01-WWSC-X1800GS-Bwmc-x1800gst-bwrc-2533gs2-bwrc-2533gs2-wwsc-x1800gs-bwrc-g01-w_firmwarewrc-1167gs2h-bwrc-x3200gst3-b_firmwarewrc-2533gs2v-bwrc-1167gs2-b
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2024-21798
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.8||MEDIUM
EPSS-0.39% / 59.13%
||
7 Day CHG~0.00%
Published-28 Feb, 2024 | 23:03
Updated-14 Feb, 2025 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".

Action-Not Available
Vendor-Elecom Co., Ltd.
Product-wrc-2533gs2-bwrc-1167gs2-bwrc-2533gs2-b_firmwarewrc-2533gs2v-b_firmwarewmc-x1800gst-bwrc-g01-w_firmwarewrc-2533gst2wrc-2533gs2-wwmc-x1800gst-b_firmwarewrc-g01-wwrc-x3200gst3-bwrc-2533gst2_firmwarewrc-x3200gst3-b_firmwarewrc-2533gs2v-bwrc-2533gs2-w_firmwarewrc-1167gst2_firmwarewrc-1167gs2h-bwrc-1167gs2-b_firmwarewrc-1167gst2wrc-1167gs2h-b_firmwareWRC-2533GS2-BWRC-2533GS2-WWRC-1167GS2H-BWRC-2533GS2V-BWMC-X1800GST-BWRC-2533GST2WRC-X3200GST3-BWRC-G01-WWRC-1167GS2-BWRC-1167GST2
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-25559
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.7||MEDIUM
EPSS-0.26% / 48.65%
||
7 Day CHG~0.00%
Published-15 Feb, 2024 | 04:32
Updated-13 May, 2025 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

URL spoofing vulnerability exists in a-blog cms Ver.3.1.0 to Ver.3.1.8. If an attacker sends a specially crafted request, the administrator of the product may be forced to access an arbitrary website when clicking a link in the audit log.

Action-Not Available
Vendor-applepleappleple inc.
Product-a-blog_cmsa-blog cms
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2024-23789
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.51% / 65.29%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 10:35
Updated-14 Aug, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command on the affected product.

Action-Not Available
Vendor-SHARP CORPORATIONsharp_corporation
Product-Energy Management Controller with Cloud Servicesenergy_management_controller_with_cloud_services_\(jh-rvb1\)energy_management_controller_with_cloud_services_\(jh-rv11\)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-23788
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.1||CRITICAL
EPSS-0.31% / 53.54%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 10:10
Updated-19 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Server-side request forgery vulnerability in Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a network-adjacent unauthenticated attacker to send an arbitrary HTTP request (GET) from the affected product.

Action-Not Available
Vendor-sharpSHARP CORPORATIONsharp_corporation
Product-jh-rvb1jh-rvb1_firmwarejh-rv11_firmwarejh-rv11Energy Management Controller with Cloud Servicesenergy_management_controller_with_cloud_services
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-23787
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-1.09% / 77.05%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 10:09
Updated-25 Nov, 2024 | 18:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Path traversal vulnerability in Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a network-adjacent unauthenticated attacker to obtain an arbitrary file in the affected product.

Action-Not Available
Vendor-sharpSHARP CORPORATIONsharp_corporation
Product-jh-rvb1jh-rv11_firmwarejh-rvb1_firmwarejh-rv11Energy Management Controller with Cloud Servicesenergy_management_controller_with_cloud_services
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-23786
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.3||CRITICAL
EPSS-2.54% / 84.89%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 10:08
Updated-18 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability in Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a network-adjacent unauthenticated attacker to execute an arbitrary script on the web browser of the user who is accessing the management page of the affected product.

Action-Not Available
Vendor-sharpSHARP CORPORATION
Product-jh-rvb1jh-rvb1_firmwarejh-rv11_firmwarejh-rv11Energy Management Controller with Cloud Services
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-23785
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.11% / 30.88%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 10:07
Updated-27 Oct, 2024 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site request forgery vulnerability in Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a remote unauthenticated attacker to change the product settings.

Action-Not Available
Vendor-sharpSHARP CORPORATION
Product-jh-rvb1jh-rv11_firmwarejh-rvb1_firmwarejh-rv11Energy Management Controller with Cloud Services
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2024-23784
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.16% / 37.42%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 10:05
Updated-25 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control vulnerability exists in Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier, which may allow a network-adjacent unauthenticated attacker to obtain a username and its hashed password displayed on the management page of the affected product.

Action-Not Available
Vendor-sharpSHARP CORPORATION
Product-jh-rvb1_firmwarejh-rvb1jh-rv11_firmwarejh-rv11Energy Management Controller with Cloud Services
CVE-2024-23783
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.24% / 46.78%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 10:02
Updated-25 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication vulnerability in Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a network-adjacent unauthenticated attacker to access the affected product without authentication.

Action-Not Available
Vendor-sharpSHARP CORPORATION
Product-jh-rvb1_firmwarejh-rvb1jh-rv11_firmwarejh-rv11Energy Management Controller with Cloud Services
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-23304
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.83% / 73.64%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 04:19
Updated-04 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cybozu KUNAI for Android 3.0.20 to 3.0.21 allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition by performing certain operations.

Action-Not Available
Vendor-Cybozu, Inc.
Product-kunaiCybozu KUNAI for Android
CWE ID-CWE-426
Untrusted Search Path
CVE-2024-23978
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.36% / 57.66%
||
7 Day CHG~0.00%
Published-02 Feb, 2024 | 06:38
Updated-15 May, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. By processing invalid values, arbitrary code may be executed. Note that the affected products are no longer supported.

Action-Not Available
Vendor-kddiKDDI CORPORATION
Product-home_spot_cube_2_firmwarehome_spot_cube_2HOME SPOT CUBE2
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-21780
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-1.15% / 77.60%
||
7 Day CHG~0.00%
Published-02 Feb, 2024 | 06:38
Updated-16 Jun, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. Processing a specially crafted command may result in a denial of service (DoS) condition. Note that the affected products are no longer supported.

Action-Not Available
Vendor-kddiKDDI CORPORATION
Product-home_spot_cube_2home_spot_cube_2_firmwareHOME SPOT CUBE2
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-24548
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.18% / 39.63%
||
7 Day CHG~0.00%
Published-01 Feb, 2024 | 06:31
Updated-01 Aug, 2024 | 23:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Payment EX Ver1.1.5b and earlier allows a remote unauthenticated attacker to obtain the information of the user who purchases merchandise using Payment EX.

Action-Not Available
Vendor-estore-wssSimplesiteestore-wss
Product-payment_exPayment EXpayment_ex
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-23941
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.4||MEDIUM
EPSS-0.10% / 28.90%
||
7 Day CHG~0.00%
Published-01 Feb, 2024 | 03:56
Updated-04 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in Group Office prior to v6.6.182, prior to v6.7.64 and prior to v6.8.31, which may allow a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product.

Action-Not Available
Vendor-group-officeIntermesh BV
Product-group_officeGroup Office
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-23782
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.4||MEDIUM
EPSS-0.38% / 58.81%
||
7 Day CHG~0.00%
Published-28 Jan, 2024 | 23:09
Updated-02 Jun, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier versions. If this vulnerability is exploited, a user with a contributor or higher privilege may execute an arbitrary script on the web browser of the user who accessed the website using the product.

Action-Not Available
Vendor-applepleappleple inc.
Product-a-blog_cmsa-blog cms Ver.2.11.x seriesa-blog cms Ver.3.1.x seriesa-blog cms Ver.2.10.x seriesa-blog cms Ver.3.0.x seriesa-blog cms
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-23388
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.18% / 40.16%
||
7 Day CHG~0.00%
Published-26 Jan, 2024 | 07:07
Updated-03 Jun, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authorization in handler for custom URL scheme issue in "Mercari" App for Android prior to version 5.78.0 allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App. As a result, the user may become a victim of a phishing attack.

Action-Not Available
Vendor-mercariMercari, Inc.
Product-mercari"Mercari" App for Android
CWE ID-CWE-862
Missing Authorization
CVE-2024-22372
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.8||MEDIUM
EPSS-0.17% / 39.11%
||
7 Day CHG~0.00%
Published-24 Jan, 2024 | 04:38
Updated-17 Jun, 2025 | 21:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product.

Action-Not Available
Vendor-Elecom Co., Ltd.
Product-wrc-x6000xs-g_firmwarewrc-x6000xs-gwrc-x1800gsa-b_firmwarewrc-x1800gs-b_firmwarewrc-x1800gsh-bwrc-x6000xst-g_firmwarewrc-x1800gsa-bwrc-x1800gs-bwrc-x6000xst-gwrc-x1800gsh-b_firmwareWRC-X3000GS2A-BWRC-X1800GSA-BWRC-X6000QS-GWRC-X6000QSA-GWRC-X1800GS-BWRC-XE5400GS-GWRC-XE5400GSA-GWRC-X1500GS-BWRC-X1500GSA-BWRC-X1800GSH-BWRC-X3000GS2-BWRC-X6000XS-GWRC-X3000GS2-WWRC-X6000XST-G
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-22366
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.8||MEDIUM
EPSS-0.08% / 25.12%
||
7 Day CHG~0.00%
Published-24 Jan, 2024 | 04:35
Updated-20 Jun, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.

Action-Not Available
Vendor-yamahaYamaha Corporation
Product-wlx313wlx222wlx212wlx413_firmwarewlx222_firmwarewlx313_firmwarewlx413wlx212_firmwarewlx202wlx202_firmwareWLX202WLX222WLX212WLX413WLX313
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-21796
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.76%
||
7 Day CHG~0.00%
Published-24 Jan, 2024 | 01:32
Updated-10 Sep, 2024 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Electronic Deliverables Creation Support Tool (Construction Edition) prior to Ver1.0.4 and Electronic Deliverables Creation Support Tool (Design & Survey Edition) prior to Ver1.0.4 improperly restrict XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the system may be read by an attacker.

Action-Not Available
Vendor-dfegMinistry of Defense
Product-electronic_deliverables_creation_support_toolElectronic Deliverables Creation Support Tool (Design & Survey Edition)Electronic Deliverables Creation Support Tool (Construction Edition)
CWE ID-CWE-611
Improper Restriction of XML External Entity Reference
CVE-2024-22380
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 5.34%
||
7 Day CHG~0.00%
Published-24 Jan, 2024 | 01:32
Updated-05 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Electronic Delivery Check System (Ministry of Agriculture, Forestry and Fisheries The Agriculture and Rural Development Project Version) March, Heisei 31 era edition Ver.14.0.001.002 and earlier improperly restricts XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the system may be read by an attacker.

Action-Not Available
Vendor-maffMinistry of Agriculture, Forestry and Fisheries
Product-electronic_delivery_check_systemElectronic Delivery Check System (Ministry of Agriculture, Forestry and Fisheries The Agriculture and Rural Development Project Version) March, Heisei 31 era edition
CWE ID-CWE-611
Improper Restriction of XML External Entity Reference
CVE-2024-21765
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 5.83%
||
7 Day CHG~0.00%
Published-24 Jan, 2024 | 01:32
Updated-20 Jun, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Electronic Delivery Check System (Doboku) Ver.18.1.0 and earlier, Electronic Delivery Check System (Dentsu) Ver.12.1.0 and earlier, Electronic Delivery Check System (Kikai) Ver.10.1.0 and earlier, and Electronic delivery item Inspection Support SystemVer.4.0.31 and earlier improperly restrict XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the system may be read by an attacker.

Action-Not Available
Vendor-cals-edMinistry of Land, Infrastructure, Transport and Tourism, Japan
Product-electronic_delivery_check_systemelectronic_delivery_item_inspection_support_systemElectronic delivery item Inspection Support SystemElectronic Delivery Check System (Doboku)Electronic Delivery Check System (Kikai)Electronic Delivery Check System (Dentsu)
CWE ID-CWE-611
Improper Restriction of XML External Entity Reference
CVE-2024-23453
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 13.41%
||
7 Day CHG~0.00%
Published-23 Jan, 2024 | 23:12
Updated-04 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Android Spoon application version 7.11.1 to 8.6.0 uses hard-coded credentials, which may allow a local attacker to retrieve the hard-coded API key when the application binary is reverse-engineered. This API key may be used for unexpected access of the associated service.

Action-Not Available
Vendor-spooncastSpoon Radio Japan Inc.
Product-spoonAndroid Spoon application
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-23348
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.47% / 63.71%
||
7 Day CHG~0.00%
Published-23 Jan, 2024 | 09:39
Updated-30 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary JavaScript code by uploading a specially crafted SVG file.

Action-Not Available
Vendor-applepleappleple inc.
Product-a-blog_cmsa-blog cms Ver.3.1.x seriesa-blog cms Ver.3.0.x seriesa-blog cms Ver.2.10.x seriesa-blog cms Ver.2.11.x seriesa-blog cms
CVE-2024-23183
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-5.4||MEDIUM
EPSS-0.28% / 51.27%
||
7 Day CHG~0.00%
Published-23 Jan, 2024 | 09:39
Updated-20 Jun, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute an arbitrary script on the logged-in user's web browser.

Action-Not Available
Vendor-applepleappleple inc.
Product-a-blog_cmsa-blog cmsa-blog cms Ver.3.1.x seriesa-blog cms Ver.3.0.x seriesa-blog cms Ver.2.10.x seriesa-blog cms Ver.2.11.x series
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-23182
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.1||HIGH
EPSS-1.99% / 82.89%
||
7 Day CHG~0.00%
Published-23 Jan, 2024 | 09:38
Updated-30 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Relative path traversal vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to delete arbitrary files on the server.

Action-Not Available
Vendor-applepleappleple inc.
Product-a-blog_cmsa-blog cms Ver.3.1.x seriesa-blog cms Ver.3.0.x seriesa-blog cms Ver.2.10.x seriesa-blog cms Ver.2.11.x seriesa-blog cms
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-23181
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.58% / 68.06%
||
7 Day CHG~0.00%
Published-23 Jan, 2024 | 09:38
Updated-20 Jun, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote unauthenticated attacker to execute an arbitrary script on the logged-in user's web browser.

Action-Not Available
Vendor-applepleappleple inc.
Product-a-blog_cmsa-blog cmsa-blog cms Ver.3.1.x seriesa-blog cms Ver.3.0.x seriesa-blog cms Ver.2.10.x seriesa-blog cms Ver.2.11.x series
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-23180
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-2.20% / 83.76%
||
7 Day CHG~0.00%
Published-23 Jan, 2024 | 09:37
Updated-04 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary code by uploading a specially crafted SVG file.

Action-Not Available
Vendor-applepleappleple inc.
Product-a-blog_cmsa-blog cms Ver.2.10.x seriesa-blog cms Ver.2.11.x seriesa-blog cms Ver.3.1.x seriesa-blog cmsa-blog cms Ver.3.0.x series
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2024-22113
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.1||MEDIUM
EPSS-0.40% / 59.74%
||
7 Day CHG~0.00%
Published-22 Jan, 2024 | 04:17
Updated-20 Jun, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open redirect vulnerability in Access analysis CGI An-Analyzer released in 2023 December 31 and earlier allows a remote unauthenticated attacker to redirect users to arbitrary websites and conduct phishing attacks via a specially crafted URL.

Action-Not Available
Vendor-ANGLERSNET
Product-cgi_an-anlyzerAccess analysis CGI An-Analyzer
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2024-23387
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.8||MEDIUM
EPSS-0.10% / 28.48%
||
7 Day CHG~0.00%
Published-19 Jan, 2024 | 03:47
Updated-30 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FusionPBX prior to 5.1.0 contains a cross-site scripting vulnerability. If this vulnerability is exploited by a remote authenticated attacker with an administrative privilege, an arbitrary script may be executed on the web browser of the user who is logging in to the product.

Action-Not Available
Vendor-fusionpbxFusionPBX
Product-fusionpbxFusionPBX
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-22362
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.08% / 24.60%
||
7 Day CHG~0.00%
Published-16 Jan, 2024 | 03:39
Updated-20 Jun, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Drupal contains a vulnerability with improper handling of structural elements. If this vulnerability is exploited, an attacker may be able to cause a denial-of-service (DoS) condition.

Action-Not Available
Vendor-The Drupal Association
Product-drupalDrupal
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-22028
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.6||MEDIUM
EPSS-0.04% / 12.55%
||
7 Day CHG~0.00%
Published-15 Jan, 2024 | 06:53
Updated-03 Jun, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient technical documentation issue exists in thermal camera TMC series all firmware versions. The user of the affected product is not aware of the internally saved data. By accessing the affected product physically, an attacker may retrieve the internal data.

Action-Not Available
Vendor-3rrr-btobTHREE R SOLUTION CORP. JAPAN
Product-3r-tmc053r-tmc06_firmware3r-tmc013r-tmc063r-tmc043r-tmc023r-tmc01_firmware3r-tmc04_firmware3r-tmc03_firmware3r-tmc033r-tmc02_firmware3r-tmc05_firmware3R-TMC043R-TMC033R-TMC053R-TMC063R-TMC013R-TMC02
CVE-2024-22027
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.51% / 65.39%
||
7 Day CHG~0.00%
Published-12 Jan, 2024 | 06:41
Updated-05 Jun, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation vulnerability in WordPress Quiz Maker Plugin prior to 6.5.0.6 allows a remote authenticated attacker to perform a Denial of Service (DoS) attack against external services.

Action-Not Available
Vendor-AYS Pro Extensions
Product-quiz_makerWordPress Quiz Maker Plugin
CWE ID-CWE-20
Improper Input Validation
CVE-2024-21833
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.17% / 38.84%
||
7 Day CHG~0.00%
Published-10 Jan, 2024 | 23:25
Updated-16 Jun, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product to execute arbitrary OS commands. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-archer_ax3000deco_xe200_firmwarearcher_ax5400archer_axe75deco_x50_firmwarearcher_ax5400_firmwaredeco_x50deco_xe200archer_axe75_firmwarearcher_ax3000_firmwareArcher AX5400Archer AXE75Deco XE200Deco X50Archer AX3000archer_ax3000archer_ax5400archer_axe75deco_x50deco_xe200
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-21821
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8||HIGH
EPSS-0.10% / 27.95%
||
7 Day CHG~0.00%
Published-10 Jan, 2024 | 23:25
Updated-17 Jun, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple TP-LINK products allow a network-adjacent authenticated attacker with access to the product from the LAN port or Wi-Fi to execute arbitrary OS commands.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-archer_ax5400archer_ax3000archer_axe75archer_ax5400_firmwarearcher_axe75_firmwarearcher_ax3000_firmwareArcher AX3000Archer AX5400Archer AXE75Archer Air R5
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-21773
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.18% / 39.78%
||
7 Day CHG~0.00%
Published-10 Jan, 2024 | 23:24
Updated-03 Jun, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product from the LAN port or Wi-Fi to execute arbitrary OS commands on the product that has pre-specified target devices and blocked URLs in parental control settings.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-archer_ax3000_firmwaredeco_xe200archer_ax5400archer_ax5400_firmwaredeco_x50_firmwarearcher_ax3000deco_x50deco_xe200_firmwareArcher Air R5Deco XE200Archer AX3000Deco X50Archer AX5400
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-51363
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.12% / 32.52%
||
7 Day CHG~0.00%
Published-26 Dec, 2023 | 07:30
Updated-02 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VR-S1000 firmware Ver. 2.37 and earlier allows a network-adjacent unauthenticated attacker who can access the product's web management page to obtain sensitive information.

Action-Not Available
Vendor-BUFFALO INC.
Product-vr-s1000_firmwarevr-s1000VR-S1000
  • Previous
  • 1
  • 2
  • ...
  • 8
  • 9
  • 10
  • ...
  • 59
  • 60
  • Next