All the vulnerabilites related to Cybozu, Inc. - Cybozu Remote Service
cve-2021-20798
Vulnerability from cvelistv5
Published
2021-10-13 08:30
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability in the management screen of Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://jvn.jp/en/jp/JVN52694228/index.html | x_refsource_MISC | |
https://kb.cybozu.support/article/37424 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:22.814Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/37424" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.1.8 to 3.1.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in the management screen of Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-13T08:30:52", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/37424" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20798", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.1.8 to 3.1.9" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in the management screen of Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://jvn.jp/en/jp/JVN52694228/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "name": "https://kb.cybozu.support/article/37424", "refsource": "MISC", "url": "https://kb.cybozu.support/article/37424" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20798", "datePublished": "2021-10-13T08:30:52", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:22.814Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20805
Vulnerability from cvelistv5
Published
2021-10-13 08:31
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability in the management screen of Cybozu Remote Service 3.1.7 to 3.1.9 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://jvn.jp/en/jp/JVN52694228/index.html | x_refsource_MISC | |
https://kb.cybozu.support/article/37431 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:22.671Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/37431" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.1.7 to 3.1.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in the management screen of Cybozu Remote Service 3.1.7 to 3.1.9 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-13T08:31:03", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/37431" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20805", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.1.7 to 3.1.9" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in the management screen of Cybozu Remote Service 3.1.7 to 3.1.9 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://jvn.jp/en/jp/JVN52694228/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "name": "https://kb.cybozu.support/article/37431", "refsource": "MISC", "url": "https://kb.cybozu.support/article/37431" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20805", "datePublished": "2021-10-13T08:31:03", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:22.671Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20806
Vulnerability from cvelistv5
Published
2021-10-13 08:31
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Open redirect vulnerability in Cybozu Remote Service 3.0.0 to 3.1.9 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://jvn.jp/en/jp/JVN52694228/index.html | x_refsource_MISC | |
https://kb.cybozu.support/article/37419 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:22.509Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/37419" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.0.0 to 3.1.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Open redirect vulnerability in Cybozu Remote Service 3.0.0 to 3.1.9 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Open Redirect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-13T08:31:04", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/37419" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20806", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.0.0 to 3.1.9" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Open redirect vulnerability in Cybozu Remote Service 3.0.0 to 3.1.9 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Open Redirect" } ] } ] }, "references": { "reference_data": [ { "name": "https://jvn.jp/en/jp/JVN52694228/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "name": "https://kb.cybozu.support/article/37419", "refsource": "MISC", "url": "https://kb.cybozu.support/article/37419" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20806", "datePublished": "2021-10-13T08:31:04", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:22.509Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20797
Vulnerability from cvelistv5
Published
2021-10-13 08:30
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Cross-site script inclusion vulnerability in the management screen of Cybozu Remote Service 3.1.8 allows a remote authenticated attacker to obtain the information stored in the product. This issue occurs only when using Mozilla Firefox.
References
▼ | URL | Tags |
---|---|---|
https://jvn.jp/en/jp/JVN52694228/index.html | x_refsource_MISC | |
https://kb.cybozu.support/article/37429 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:23.130Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/37429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.1.8" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site script inclusion vulnerability in the management screen of Cybozu Remote Service 3.1.8 allows a remote authenticated attacker to obtain the information stored in the product. This issue occurs only when using Mozilla Firefox." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site script inclusion vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-13T08:30:50", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/37429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20797", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.1.8" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site script inclusion vulnerability in the management screen of Cybozu Remote Service 3.1.8 allows a remote authenticated attacker to obtain the information stored in the product. This issue occurs only when using Mozilla Firefox." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site script inclusion vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://jvn.jp/en/jp/JVN52694228/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "name": "https://kb.cybozu.support/article/37429", "refsource": "MISC", "url": "https://kb.cybozu.support/article/37429" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20797", "datePublished": "2021-10-13T08:30:50", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:23.130Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20796
Vulnerability from cvelistv5
Published
2021-10-13 08:30
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in the management screen of Cybozu Remote Service 3.1.8 allows a remote authenticated attacker to upload an arbitrary file via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://jvn.jp/en/jp/JVN52694228/index.html | x_refsource_MISC | |
https://kb.cybozu.support/article/37427 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:22.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/37427" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.1.8" } ] } ], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the management screen of Cybozu Remote Service 3.1.8 allows a remote authenticated attacker to upload an arbitrary file via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Directory traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-13T08:30:48", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/37427" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20796", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.1.8" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in the management screen of Cybozu Remote Service 3.1.8 allows a remote authenticated attacker to upload an arbitrary file via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Directory traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://jvn.jp/en/jp/JVN52694228/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "name": "https://kb.cybozu.support/article/37427", "refsource": "MISC", "url": "https://kb.cybozu.support/article/37427" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20796", "datePublished": "2021-10-13T08:30:49", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:22.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16169
Vulnerability from cvelistv5
Published
2019-01-09 22:00
Modified
2024-08-05 10:17
Severity ?
EPSS score ?
Summary
Cybozu Remote Service 3.0.0 to 3.1.0 allows remote authenticated attackers to upload and execute Java code file on the server via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://kb.cybozu.support/article/34311/ | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN23161885/index.html | third-party-advisory, x_refsource_JVN |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:38.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/34311/" }, { "name": "JVN#23161885", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN23161885/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.0.0 to 3.1.0" } ] } ], "datePublic": "2019-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Cybozu Remote Service 3.0.0 to 3.1.0 allows remote authenticated attackers to upload and execute Java code file on the server via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T21:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/34311/" }, { "name": "JVN#23161885", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "https://jvn.jp/en/jp/JVN23161885/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2018-16169", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.0.0 to 3.1.0" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cybozu Remote Service 3.0.0 to 3.1.0 allows remote authenticated attackers to upload and execute Java code file on the server via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unrestricted Upload of File with Dangerous Type" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.cybozu.support/article/34311/", "refsource": "MISC", "url": "https://kb.cybozu.support/article/34311/" }, { "name": "JVN#23161885", "refsource": "JVN", "url": "https://jvn.jp/en/jp/JVN23161885/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2018-16169", "datePublished": "2019-01-09T22:00:00", "dateReserved": "2018-08-30T00:00:00", "dateUpdated": "2024-08-05T10:17:38.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20803
Vulnerability from cvelistv5
Published
2021-10-13 08:31
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Operation restriction bypass in the management screen of Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to alter the data of the management screen.
References
▼ | URL | Tags |
---|---|---|
https://jvn.jp/en/jp/JVN52694228/index.html | x_refsource_MISC | |
https://kb.cybozu.support/article/37421 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:22.318Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/37421" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.1.8 to 3.1.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Operation restriction bypass in the management screen of Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to alter the data of the management screen." } ], "problemTypes": [ { "descriptions": [ { "description": "Access controls issue", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-13T08:31:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/37421" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20803", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.1.8 to 3.1.9" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Operation restriction bypass in the management screen of Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to alter the data of the management screen." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Access controls issue" } ] } ] }, "references": { "reference_data": [ { "name": "https://jvn.jp/en/jp/JVN52694228/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "name": "https://kb.cybozu.support/article/37421", "refsource": "MISC", "url": "https://kb.cybozu.support/article/37421" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20803", "datePublished": "2021-10-13T08:31:00", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:22.318Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16171
Vulnerability from cvelistv5
Published
2019-01-09 22:00
Modified
2024-08-05 10:17
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in Cybozu Remote Service 3.0.0 to 3.1.8 allows remote attackers to execute Java code file on the server via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://kb.cybozu.support/article/35259/ | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN23161885/index.html | third-party-advisory, x_refsource_JVN |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:38.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/35259/" }, { "name": "JVN#23161885", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN23161885/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.0.0 to 3.1.8" } ] } ], "datePublic": "2019-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Cybozu Remote Service 3.0.0 to 3.1.8 allows remote attackers to execute Java code file on the server via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Directory traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T21:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/35259/" }, { "name": "JVN#23161885", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "https://jvn.jp/en/jp/JVN23161885/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2018-16171", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.0.0 to 3.1.8" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in Cybozu Remote Service 3.0.0 to 3.1.8 allows remote attackers to execute Java code file on the server via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Directory traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.cybozu.support/article/35259/", "refsource": "MISC", "url": "https://kb.cybozu.support/article/35259/" }, { "name": "JVN#23161885", "refsource": "JVN", "url": "https://jvn.jp/en/jp/JVN23161885/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2018-16171", "datePublished": "2019-01-09T22:00:00", "dateReserved": "2018-08-30T00:00:00", "dateUpdated": "2024-08-05T10:17:38.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20795
Vulnerability from cvelistv5
Published
2021-10-13 08:30
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in the management screen of Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote attacker to hijack the authentication of administrators and unintended operations may be performed via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://kb.cybozu.support/article/37422 | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN52694228/index.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:23.059Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/37422" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.1.8 to 3.1.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the management screen of Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote attacker to hijack the authentication of administrators and unintended operations may be performed via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site request forgery", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-13T08:30:47", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/37422" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20795", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.1.8 to 3.1.9" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in the management screen of Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote attacker to hijack the authentication of administrators and unintended operations may be performed via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site request forgery" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.cybozu.support/article/37422", "refsource": "MISC", "url": "https://kb.cybozu.support/article/37422" }, { "name": "https://jvn.jp/en/jp/JVN52694228/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN52694228/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20795", "datePublished": "2021-10-13T08:30:47", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:23.059Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20800
Vulnerability from cvelistv5
Published
2021-10-13 08:30
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability in the management screen of Cybozu Remote Service 3.1.8 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://jvn.jp/en/jp/JVN52694228/index.html | x_refsource_MISC | |
https://kb.cybozu.support/article/37420 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:22.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/37420" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.1.8" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in the management screen of Cybozu Remote Service 3.1.8 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-13T08:30:55", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/37420" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20800", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.1.8" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in the management screen of Cybozu Remote Service 3.1.8 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://jvn.jp/en/jp/JVN52694228/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "name": "https://kb.cybozu.support/article/37420", "refsource": "MISC", "url": "https://kb.cybozu.support/article/37420" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20800", "datePublished": "2021-10-13T08:30:55", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:22.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26838
Vulnerability from cvelistv5
Published
2023-08-03 13:16
Modified
2024-10-17 14:14
Severity ?
EPSS score ?
Summary
Path traversal vulnerability in Importing Mobile Device Data of Cybozu Remote Service 3.1.2 allows a remote authenticated attacker to cause a denial-of-service (DoS) condition.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:11:44.596Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN52694228/" }, { "tags": [ "x_transferred" ], "url": "https://kb.cybozu.support/article/37653/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-26838", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T14:13:52.450913Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T14:14:01.224Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.1.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Path traversal vulnerability in Importing Mobile Device Data of Cybozu Remote Service 3.1.2 allows a remote authenticated attacker to cause a denial-of-service (DoS) condition." } ], "problemTypes": [ { "descriptions": [ { "description": "Path traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-03T13:16:16.712Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://jvn.jp/en/jp/JVN52694228/" }, { "url": "https://kb.cybozu.support/article/37653/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-26838", "datePublished": "2023-08-03T13:16:16.712Z", "dateReserved": "2022-04-04T08:48:57.871Z", "dateUpdated": "2024-10-17T14:14:01.224Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46278
Vulnerability from cvelistv5
Published
2023-10-31 23:01
Modified
2024-09-05 19:48
Severity ?
EPSS score ?
Summary
Uncontrolled resource consumption vulnerability in Cybozu Remote Service 4.1.0 to 4.1.1 allows a remote authenticated attacker to consume huge storage space or cause significantly delayed communication.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:37:40.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cs.cybozu.co.jp/2023/010657.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN94132951/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46278", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-05T19:46:13.224011Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-05T19:48:06.827Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "4.1.0 to 4.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption vulnerability in Cybozu Remote Service 4.1.0 to 4.1.1 allows a remote authenticated attacker to consume huge storage space or cause significantly delayed communication." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Resource Consumption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-31T23:01:20.135Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://cs.cybozu.co.jp/2023/010657.html" }, { "url": "https://jvn.jp/en/jp/JVN94132951/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-46278", "datePublished": "2023-10-31T23:01:20.135Z", "dateReserved": "2023-10-20T05:37:36.463Z", "dateUpdated": "2024-09-05T19:48:06.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20804
Vulnerability from cvelistv5
Published
2021-10-13 08:31
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to cause a denial of service (DoS) condition via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://jvn.jp/en/jp/JVN52694228/index.html | x_refsource_MISC | |
https://kb.cybozu.support/article/37426 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:22.817Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/37426" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.1.8 to 3.1.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to cause a denial of service (DoS) condition via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-service (DoS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-13T08:31:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/37426" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20804", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.1.8 to 3.1.9" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to cause a denial of service (DoS) condition via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-service (DoS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jvn.jp/en/jp/JVN52694228/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "name": "https://kb.cybozu.support/article/37426", "refsource": "MISC", "url": "https://kb.cybozu.support/article/37426" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20804", "datePublished": "2021-10-13T08:31:01", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:22.817Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44608
Vulnerability from cvelistv5
Published
2022-12-07 00:00
Modified
2024-08-03 13:54
Severity ?
EPSS score ?
Summary
Uncontrolled resource consumption vulnerability in Cybozu Remote Service 4.0.0 to 4.0.3 allows a remote authenticated attacker to consume huge storage space, which may result in a denial-of-service (DoS) condition.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cs.cybozu.co.jp/2022/007754.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN87895771/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "4.0.0 to 4.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption vulnerability in Cybozu Remote Service 4.0.0 to 4.0.3 allows a remote authenticated attacker to consume huge storage space, which may result in a denial-of-service (DoS) condition." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Resource Consumption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-07T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://cs.cybozu.co.jp/2022/007754.html" }, { "url": "https://jvn.jp/en/jp/JVN87895771/index.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-44608", "datePublished": "2022-12-07T00:00:00", "dateReserved": "2022-11-20T00:00:00", "dateUpdated": "2024-08-03T13:54:03.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20802
Vulnerability from cvelistv5
Published
2021-10-13 08:30
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
HTTP header injection vulnerability in Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote attacker to alter the information stored in the product.
References
▼ | URL | Tags |
---|---|---|
https://jvn.jp/en/jp/JVN52694228/index.html | x_refsource_MISC | |
https://kb.cybozu.support/article/37428 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:22.625Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/37428" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.1.8 to 3.1.9" } ] } ], "descriptions": [ { "lang": "en", "value": "HTTP header injection vulnerability in Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote attacker to alter the information stored in the product." } ], "problemTypes": [ { "descriptions": [ { "description": "HTTP header injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-13T08:30:58", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/37428" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20802", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.1.8 to 3.1.9" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HTTP header injection vulnerability in Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote attacker to alter the information stored in the product." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "HTTP header injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://jvn.jp/en/jp/JVN52694228/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "name": "https://kb.cybozu.support/article/37428", "refsource": "MISC", "url": "https://kb.cybozu.support/article/37428" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20802", "datePublished": "2021-10-13T08:30:58", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:22.625Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20801
Vulnerability from cvelistv5
Published
2021-10-13 08:30
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to conduct XML External Entity (XXE) attacks and obtain the information stored in the product via unspecified vectors. This issue occurs only when using Mozilla Firefox.
References
▼ | URL | Tags |
---|---|---|
https://jvn.jp/en/jp/JVN52694228/index.html | x_refsource_MISC | |
https://kb.cybozu.support/article/37423 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:22.673Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/37423" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.1.8 to 3.1.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to conduct XML External Entity (XXE) attacks and obtain the information stored in the product via unspecified vectors. This issue occurs only when using Mozilla Firefox." } ], "problemTypes": [ { "descriptions": [ { "description": "XML external entities (XXE)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-13T08:30:56", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/37423" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20801", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.1.8 to 3.1.9" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to conduct XML External Entity (XXE) attacks and obtain the information stored in the product via unspecified vectors. This issue occurs only when using Mozilla Firefox." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XML external entities (XXE)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jvn.jp/en/jp/JVN52694228/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "name": "https://kb.cybozu.support/article/37423", "refsource": "MISC", "url": "https://kb.cybozu.support/article/37423" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20801", "datePublished": "2021-10-13T08:30:57", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:22.673Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16172
Vulnerability from cvelistv5
Published
2019-01-09 22:00
Modified
2024-08-05 10:17
Severity ?
EPSS score ?
Summary
Improper countermeasure against clickjacking attack in client certificates management screen was discovered in Cybozu Remote Service 3.0.0 to 3.1.8, that allows remote attackers to trick a user to delete the registered client certificate.
References
▼ | URL | Tags |
---|---|---|
https://kb.cybozu.support/article/35260/ | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN23161885/index.html | third-party-advisory, x_refsource_JVN |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:38.320Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/35260/" }, { "name": "JVN#23161885", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN23161885/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.0.0 to 3.1.8" } ] } ], "datePublic": "2019-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper countermeasure against clickjacking attack in client certificates management screen was discovered in Cybozu Remote Service 3.0.0 to 3.1.8, that allows remote attackers to trick a user to delete the registered client certificate." } ], "problemTypes": [ { "descriptions": [ { "description": "User Interface (UI) Misrepresentation of Critical Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T21:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/35260/" }, { "name": "JVN#23161885", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "https://jvn.jp/en/jp/JVN23161885/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2018-16172", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.0.0 to 3.1.8" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper countermeasure against clickjacking attack in client certificates management screen was discovered in Cybozu Remote Service 3.0.0 to 3.1.8, that allows remote attackers to trick a user to delete the registered client certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "User Interface (UI) Misrepresentation of Critical Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.cybozu.support/article/35260/", "refsource": "MISC", "url": "https://kb.cybozu.support/article/35260/" }, { "name": "JVN#23161885", "refsource": "JVN", "url": "https://jvn.jp/en/jp/JVN23161885/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2018-16172", "datePublished": "2019-01-09T22:00:00", "dateReserved": "2018-08-30T00:00:00", "dateUpdated": "2024-08-05T10:17:38.320Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16170
Vulnerability from cvelistv5
Published
2019-01-09 22:00
Modified
2024-08-05 10:17
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in Cybozu Remote Service 3.0.0 to 3.1.8 for Windows allows remote authenticated attackers to read arbitrary files via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://kb.cybozu.support/article/34301/ | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN23161885/index.html | third-party-advisory, x_refsource_JVN |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:38.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/34301/" }, { "name": "JVN#23161885", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN23161885/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.0.0 to 3.1.8 for Windows" } ] } ], "datePublic": "2019-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Cybozu Remote Service 3.0.0 to 3.1.8 for Windows allows remote authenticated attackers to read arbitrary files via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Directory traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T21:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/34301/" }, { "name": "JVN#23161885", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "https://jvn.jp/en/jp/JVN23161885/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2018-16170", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.0.0 to 3.1.8 for Windows" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in Cybozu Remote Service 3.0.0 to 3.1.8 for Windows allows remote authenticated attackers to read arbitrary files via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Directory traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.cybozu.support/article/34301/", "refsource": "MISC", "url": "https://kb.cybozu.support/article/34301/" }, { "name": "JVN#23161885", "refsource": "JVN", "url": "https://jvn.jp/en/jp/JVN23161885/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2018-16170", "datePublished": "2019-01-09T22:00:00", "dateReserved": "2018-08-30T00:00:00", "dateUpdated": "2024-08-05T10:17:38.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20807
Vulnerability from cvelistv5
Published
2021-10-13 08:31
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability in the management screen of Cybozu Remote Service 3.0.0 to 3.1.9 allows a remote attacker to inject an arbitrary script via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://jvn.jp/en/jp/JVN52694228/index.html | x_refsource_MISC | |
https://kb.cybozu.support/article/37430 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:22.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/37430" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.0.0 to 3.1.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in the management screen of Cybozu Remote Service 3.0.0 to 3.1.9 allows a remote attacker to inject an arbitrary script via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-13T08:31:06", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/37430" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20807", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.0.0 to 3.1.9" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in the management screen of Cybozu Remote Service 3.0.0 to 3.1.9 allows a remote attacker to inject an arbitrary script via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://jvn.jp/en/jp/JVN52694228/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "name": "https://kb.cybozu.support/article/37430", "refsource": "MISC", "url": "https://kb.cybozu.support/article/37430" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20807", "datePublished": "2021-10-13T08:31:06", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:22.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20799
Vulnerability from cvelistv5
Published
2021-10-13 08:30
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability in the management screen of Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://jvn.jp/en/jp/JVN52694228/index.html | x_refsource_MISC | |
https://kb.cybozu.support/article/37425 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Cybozu, Inc. | Cybozu Remote Service |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:22.605Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.cybozu.support/article/37425" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cybozu Remote Service", "vendor": "Cybozu, Inc.", "versions": [ { "status": "affected", "version": "3.1.8 to 3.1.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in the management screen of Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-13T08:30:53", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kb.cybozu.support/article/37425" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20799", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cybozu Remote Service", "version": { "version_data": [ { "version_value": "3.1.8 to 3.1.9" } ] } } ] }, "vendor_name": "Cybozu, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in the management screen of Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://jvn.jp/en/jp/JVN52694228/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN52694228/index.html" }, { "name": "https://kb.cybozu.support/article/37425", "refsource": "MISC", "url": "https://kb.cybozu.support/article/37425" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20799", "datePublished": "2021-10-13T08:30:53", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:22.605Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }