Search criteria

4 vulnerabilities found for EasyBlocks IPv6 by Plat'Home Co.,Ltd.

CVE-2020-5549 (GCVE-0-2020-5549)

Vulnerability from cvelistv5 – Published: 2020-04-08 07:50 – Updated: 2024-08-04 08:30
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in EasyBlocks IPv6 Ver. 2.0.1 and earlier and Enterprise Ver. 2.0.1 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • Cross-site request forgery
Assigner
Impacted products
Vendor Product Version
Plat'Home Co.,Ltd. EasyBlocks IPv6 Affected: Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T08:30:24.599Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.plathome.co.jp/software/ipv6-v2-0-2/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.plathome.co.jp/software/ipv6-enterprise-v2-0-2/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN89224521/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EasyBlocks IPv6",
          "vendor": "Plat\u0027Home Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in EasyBlocks IPv6 Ver. 2.0.1 and earlier and Enterprise Ver. 2.0.1 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Cross-site request forgery",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-04-08T07:50:23",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.plathome.co.jp/software/ipv6-v2-0-2/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.plathome.co.jp/software/ipv6-enterprise-v2-0-2/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/jp/JVN89224521/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2020-5549",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "EasyBlocks IPv6",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Plat\u0027Home Co.,Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in EasyBlocks IPv6 Ver. 2.0.1 and earlier and Enterprise Ver. 2.0.1 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Cross-site request forgery"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.plathome.co.jp/software/ipv6-v2-0-2/",
              "refsource": "MISC",
              "url": "https://www.plathome.co.jp/software/ipv6-v2-0-2/"
            },
            {
              "name": "https://www.plathome.co.jp/software/ipv6-enterprise-v2-0-2/",
              "refsource": "MISC",
              "url": "https://www.plathome.co.jp/software/ipv6-enterprise-v2-0-2/"
            },
            {
              "name": "https://jvn.jp/en/jp/JVN89224521/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/jp/JVN89224521/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2020-5549",
    "datePublished": "2020-04-08T07:50:23",
    "dateReserved": "2020-01-06T00:00:00",
    "dateUpdated": "2024-08-04T08:30:24.599Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-5550 (GCVE-0-2020-5550)

Vulnerability from cvelistv5 – Published: 2020-04-08 07:50 – Updated: 2024-08-04 08:30
VLAI?
Summary
Session fixation vulnerability in EasyBlocks IPv6 Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier allows remote attackers to impersonate a registered user and log in the management console, that may result in information alteration/disclosure via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • Session fixation
Assigner
Impacted products
Vendor Product Version
Plat'Home Co.,Ltd. EasyBlocks IPv6 Affected: Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T08:30:24.604Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.plathome.co.jp/software/ipv6-v2-0-2/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.plathome.co.jp/software/ipv6-enterprise-v2-0-2/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN89224521/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EasyBlocks IPv6",
          "vendor": "Plat\u0027Home Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Session fixation vulnerability in EasyBlocks IPv6 Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier allows remote attackers to impersonate a registered user and log in the management console, that may result in information alteration/disclosure via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Session fixation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-04-08T07:50:23",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.plathome.co.jp/software/ipv6-v2-0-2/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.plathome.co.jp/software/ipv6-enterprise-v2-0-2/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/jp/JVN89224521/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2020-5550",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "EasyBlocks IPv6",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Plat\u0027Home Co.,Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Session fixation vulnerability in EasyBlocks IPv6 Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier allows remote attackers to impersonate a registered user and log in the management console, that may result in information alteration/disclosure via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Session fixation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.plathome.co.jp/software/ipv6-v2-0-2/",
              "refsource": "MISC",
              "url": "https://www.plathome.co.jp/software/ipv6-v2-0-2/"
            },
            {
              "name": "https://www.plathome.co.jp/software/ipv6-enterprise-v2-0-2/",
              "refsource": "MISC",
              "url": "https://www.plathome.co.jp/software/ipv6-enterprise-v2-0-2/"
            },
            {
              "name": "https://jvn.jp/en/jp/JVN89224521/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/jp/JVN89224521/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2020-5550",
    "datePublished": "2020-04-08T07:50:23",
    "dateReserved": "2020-01-06T00:00:00",
    "dateUpdated": "2024-08-04T08:30:24.604Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-5549 (GCVE-0-2020-5549)

Vulnerability from nvd – Published: 2020-04-08 07:50 – Updated: 2024-08-04 08:30
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in EasyBlocks IPv6 Ver. 2.0.1 and earlier and Enterprise Ver. 2.0.1 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • Cross-site request forgery
Assigner
Impacted products
Vendor Product Version
Plat'Home Co.,Ltd. EasyBlocks IPv6 Affected: Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T08:30:24.599Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.plathome.co.jp/software/ipv6-v2-0-2/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.plathome.co.jp/software/ipv6-enterprise-v2-0-2/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN89224521/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EasyBlocks IPv6",
          "vendor": "Plat\u0027Home Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in EasyBlocks IPv6 Ver. 2.0.1 and earlier and Enterprise Ver. 2.0.1 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Cross-site request forgery",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-04-08T07:50:23",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.plathome.co.jp/software/ipv6-v2-0-2/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.plathome.co.jp/software/ipv6-enterprise-v2-0-2/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/jp/JVN89224521/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2020-5549",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "EasyBlocks IPv6",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Plat\u0027Home Co.,Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in EasyBlocks IPv6 Ver. 2.0.1 and earlier and Enterprise Ver. 2.0.1 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Cross-site request forgery"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.plathome.co.jp/software/ipv6-v2-0-2/",
              "refsource": "MISC",
              "url": "https://www.plathome.co.jp/software/ipv6-v2-0-2/"
            },
            {
              "name": "https://www.plathome.co.jp/software/ipv6-enterprise-v2-0-2/",
              "refsource": "MISC",
              "url": "https://www.plathome.co.jp/software/ipv6-enterprise-v2-0-2/"
            },
            {
              "name": "https://jvn.jp/en/jp/JVN89224521/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/jp/JVN89224521/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2020-5549",
    "datePublished": "2020-04-08T07:50:23",
    "dateReserved": "2020-01-06T00:00:00",
    "dateUpdated": "2024-08-04T08:30:24.599Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-5550 (GCVE-0-2020-5550)

Vulnerability from nvd – Published: 2020-04-08 07:50 – Updated: 2024-08-04 08:30
VLAI?
Summary
Session fixation vulnerability in EasyBlocks IPv6 Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier allows remote attackers to impersonate a registered user and log in the management console, that may result in information alteration/disclosure via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • Session fixation
Assigner
Impacted products
Vendor Product Version
Plat'Home Co.,Ltd. EasyBlocks IPv6 Affected: Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T08:30:24.604Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.plathome.co.jp/software/ipv6-v2-0-2/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.plathome.co.jp/software/ipv6-enterprise-v2-0-2/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN89224521/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EasyBlocks IPv6",
          "vendor": "Plat\u0027Home Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Session fixation vulnerability in EasyBlocks IPv6 Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier allows remote attackers to impersonate a registered user and log in the management console, that may result in information alteration/disclosure via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Session fixation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-04-08T07:50:23",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.plathome.co.jp/software/ipv6-v2-0-2/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.plathome.co.jp/software/ipv6-enterprise-v2-0-2/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/jp/JVN89224521/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2020-5550",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "EasyBlocks IPv6",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Plat\u0027Home Co.,Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Session fixation vulnerability in EasyBlocks IPv6 Ver. 2.0.1 and earlier, and Enterprise Ver. 2.0.1 and earlier allows remote attackers to impersonate a registered user and log in the management console, that may result in information alteration/disclosure via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Session fixation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.plathome.co.jp/software/ipv6-v2-0-2/",
              "refsource": "MISC",
              "url": "https://www.plathome.co.jp/software/ipv6-v2-0-2/"
            },
            {
              "name": "https://www.plathome.co.jp/software/ipv6-enterprise-v2-0-2/",
              "refsource": "MISC",
              "url": "https://www.plathome.co.jp/software/ipv6-enterprise-v2-0-2/"
            },
            {
              "name": "https://jvn.jp/en/jp/JVN89224521/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/jp/JVN89224521/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2020-5550",
    "datePublished": "2020-04-08T07:50:23",
    "dateReserved": "2020-01-06T00:00:00",
    "dateUpdated": "2024-08-04T08:30:24.604Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}