Vulnerabilites related to appleple - a-blog_cms
CVE-2022-23810 (GCVE-0-2022-23810)
Vulnerability from cvelistv5
Published
2022-02-24 09:50
Modified
2024-08-03 03:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Template injection (Improper Neutralization of Special Elements Used in a Template Engine)
Summary
Template injection (Improper Neutralization of Special Elements Used in a Template Engine) vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to obtain an arbitrary file on the server via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
appleple inc. | a-blog cms |
Version: Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:51:45.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN14706307/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Template injection (Improper Neutralization of Special Elements Used in a Template Engine) vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to obtain an arbitrary file on the server via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Template injection (Improper Neutralization of Special Elements Used in a Template Engine)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-24T09:50:28", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN14706307/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-23810", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "a-blog cms", "version": { "version_data": [ { "version_value": "Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1" } ] } } ] }, "vendor_name": "appleple inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Template injection (Improper Neutralization of Special Elements Used in a Template Engine) vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to obtain an arbitrary file on the server via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Template injection (Improper Neutralization of Special Elements Used in a Template Engine)" } ] } ] }, "references": { "reference_data": [ { "name": "https://developer.a-blogcms.jp/blog/news/security-202202.html", "refsource": "MISC", "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "name": "https://jvn.jp/en/jp/JVN14706307/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN14706307/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-23810", "datePublished": "2022-02-24T09:50:28", "dateReserved": "2022-02-16T00:00:00", "dateUpdated": "2024-08-03T03:51:45.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-25559 (GCVE-0-2024-25559)
Vulnerability from cvelistv5
Published
2024-02-15 04:32
Modified
2024-11-01 20:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- User Interface (UI) Misrepresentation of Critical Information
Summary
URL spoofing vulnerability exists in a-blog cms Ver.3.1.0 to Ver.3.1.8. If an attacker sends a specially crafted request, the administrator of the product may be forced to access an arbitrary website when clicking a link in the audit log.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
appleple inc. | a-blog cms |
Version: Ver.3.1.0 to Ver.3.1.8 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:44:09.680Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-48966481.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN48966481/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-25559", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-16T15:40:13.733974Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-01T20:52:44.326Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.3.1.0 to Ver.3.1.8" } ] } ], "descriptions": [ { "lang": "en", "value": "URL spoofing vulnerability exists in a-blog cms Ver.3.1.0 to Ver.3.1.8. If an attacker sends a specially crafted request, the administrator of the product may be forced to access an arbitrary website when clicking a link in the audit log." } ], "problemTypes": [ { "descriptions": [ { "description": "User Interface (UI) Misrepresentation of Critical Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-15T04:32:37.608Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-48966481.html" }, { "url": "https://jvn.jp/en/jp/JVN48966481/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-25559", "datePublished": "2024-02-15T04:32:37.608Z", "dateReserved": "2024-02-08T01:35:27.596Z", "dateUpdated": "2024-11-01T20:52:44.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-31103 (GCVE-0-2025-31103)
Vulnerability from cvelistv5
Published
2025-03-31 04:54
Modified
2025-03-31 12:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-502 - Deserialization of untrusted data
Summary
Untrusted data deserialization vulnerability exists in a-blog cms. Processing a specially crafted request may store arbitrary files on the server where the product is running. This can be leveraged to execute an arbitrary script on the server.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | appleple inc. | a-blog cms (Ver.3.1.x series) |
Version: prior to Ver.3.1.37 |
||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-31103", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T12:59:04.427491Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T12:59:20.794Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "a-blog cms (Ver.3.1.x series)", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.1.37" } ] }, { "product": "a-blog cms (Ver.3.0.x series)", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.0.41" } ] }, { "product": "a-blog cms (Ver.2.11.x series)", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.11.70" } ] }, { "product": "a-blog cms (Ver.2.10.x series)", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.10.58" } ] }, { "product": "a-blog cms (Ver.2.9.x series)", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.9.46" } ] }, { "product": "a-blog cms (Ver. 2.8.x series)", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.8.80" } ] } ], "descriptions": [ { "lang": "en", "value": "Untrusted data deserialization vulnerability exists in a-blog cms. Processing a specially crafted request may store arbitrary files on the server where the product is running. This can be leveraged to execute an arbitrary script on the server." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "Deserialization of untrusted data", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-31T04:54:03.868Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/security-update202503.html" }, { "url": "https://developer.a-blogcms.jp/blog/news/entry-4197.html" }, { "url": "https://jvn.jp/en/jp/JVN66982699/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-31103", "datePublished": "2025-03-31T04:54:03.868Z", "dateReserved": "2025-03-26T09:54:15.256Z", "dateUpdated": "2025-03-31T12:59:20.794Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-21142 (GCVE-0-2022-21142)
Vulnerability from cvelistv5
Published
2022-02-24 09:50
Modified
2024-08-03 02:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Authentication bypass
Summary
Authentication bypass vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.74, Ver.2.9.x series versions prior to Ver.2.9.39, Ver.2.10.x series versions prior to Ver.2.10.43, and Ver.2.11.x series versions prior to Ver.2.11.41 allows a remote unauthenticated attacker to bypass authentication under the specific condition.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
appleple inc. | a-blog cms |
Version: Ver.2.8.x series versions prior to Ver.2.8.74, Ver.2.9.x series versions prior to Ver.2.9.39, Ver.2.10.x series versions prior to Ver.2.10.43, and Ver.2.11.x series versions prior to Ver.2.11.41 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:31:59.241Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN14706307/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.2.8.x series versions prior to Ver.2.8.74, Ver.2.9.x series versions prior to Ver.2.9.39, Ver.2.10.x series versions prior to Ver.2.10.43, and Ver.2.11.x series versions prior to Ver.2.11.41" } ] } ], "descriptions": [ { "lang": "en", "value": "Authentication bypass vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.74, Ver.2.9.x series versions prior to Ver.2.9.39, Ver.2.10.x series versions prior to Ver.2.10.43, and Ver.2.11.x series versions prior to Ver.2.11.41 allows a remote unauthenticated attacker to bypass authentication under the specific condition." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-24T09:50:25", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN14706307/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-21142", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "a-blog cms", "version": { "version_data": [ { "version_value": "Ver.2.8.x series versions prior to Ver.2.8.74, Ver.2.9.x series versions prior to Ver.2.9.39, Ver.2.10.x series versions prior to Ver.2.10.43, and Ver.2.11.x series versions prior to Ver.2.11.41" } ] } } ] }, "vendor_name": "appleple inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Authentication bypass vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.74, Ver.2.9.x series versions prior to Ver.2.9.39, Ver.2.10.x series versions prior to Ver.2.10.43, and Ver.2.11.x series versions prior to Ver.2.11.41 allows a remote unauthenticated attacker to bypass authentication under the specific condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authentication bypass" } ] } ] }, "references": { "reference_data": [ { "name": "https://developer.a-blogcms.jp/blog/news/security-202202.html", "refsource": "MISC", "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "name": "https://jvn.jp/en/jp/JVN14706307/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN14706307/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-21142", "datePublished": "2022-02-24T09:50:26", "dateReserved": "2022-02-16T00:00:00", "dateUpdated": "2024-08-03T02:31:59.241Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-23183 (GCVE-0-2024-23183)
Vulnerability from cvelistv5
Published
2024-01-23 09:39
Modified
2025-06-20 19:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-site scripting (XSS)
Summary
Cross-site scripting vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute an arbitrary script on the logged-in user's web browser.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | appleple inc. | a-blog cms Ver.3.1.x series |
Version: prior to Ver.3.1.7 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:59:31.779Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN34565930/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-23183", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-23T14:26:51.427740Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-20T19:11:32.290Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "a-blog cms Ver.3.1.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.1.7" } ] }, { "product": "a-blog cms Ver.3.0.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.0.29" } ] }, { "product": "a-blog cms Ver.2.11.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.11.58" } ] }, { "product": "a-blog cms Ver.2.10.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.10.50" } ] }, { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.2.9.0 and earlier " } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute an arbitrary script on the logged-in user\u0027s web browser." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-23T09:39:05.114Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "url": "https://jvn.jp/en/jp/JVN34565930/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-23183", "datePublished": "2024-01-23T09:39:05.114Z", "dateReserved": "2024-01-12T05:24:51.969Z", "dateUpdated": "2025-06-20T19:11:32.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-1178 (GCVE-0-2016-1178)
Vulnerability from cvelistv5
Published
2017-04-12 22:00
Modified
2024-08-05 22:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The session management of the comment functionality in appleple a-blog cms 2.6.0.1 and earlier allows remote attackers to obtain or modify sensitive data via unspecified vectors.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:48:13.077Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVN#03975805", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN03975805/index.html" }, { "name": "JVNDB-2016-000047", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000047.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/patch/entry-2363.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The session management of the comment functionality in appleple a-blog cms 2.6.0.1 and earlier allows remote attackers to obtain or modify sensitive data via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-12T21:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVN#03975805", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN03975805/index.html" }, { "name": "JVNDB-2016-000047", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000047.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://developer.a-blogcms.jp/blog/patch/entry-2363.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2016-1178", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The session management of the comment functionality in appleple a-blog cms 2.6.0.1 and earlier allows remote attackers to obtain or modify sensitive data via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "JVN#03975805", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN03975805/index.html" }, { "name": "JVNDB-2016-000047", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000047.html" }, { "name": "https://developer.a-blogcms.jp/blog/patch/entry-2363.html", "refsource": "CONFIRM", "url": "https://developer.a-blogcms.jp/blog/patch/entry-2363.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2016-1178", "datePublished": "2017-04-12T22:00:00", "dateReserved": "2015-12-26T00:00:00", "dateUpdated": "2024-08-05T22:48:13.077Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-31394 (GCVE-0-2024-31394)
Vulnerability from cvelistv5
Published
2024-05-22 04:35
Modified
2025-03-27 15:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Directory traversal
Summary
Directory traversal vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with an editor or higher privilege who can log in to the product may obtain arbitrary files on the server.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | appleple inc. | a-blog cms Ver.3.1.x series |
Version: prior to Ver.3.1.12 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-31394", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-22T17:10:48.613952Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-27T15:03:43.986Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:52:56.577Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN70977403/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "a-blog cms Ver.3.1.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.1.12" } ] }, { "product": "a-blog cms Ver.3.0.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.0.32" } ] }, { "product": "a-blog cms Ver.2.11.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.11.61" } ] }, { "product": "a-blog cms Ver.2.10.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.10.53" } ] }, { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.2.9 and earlier " } ] } ], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with an editor or higher privilege who can log in to the product may obtain arbitrary files on the server." } ], "problemTypes": [ { "descriptions": [ { "description": "Directory traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-22T04:35:31.768Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "url": "https://jvn.jp/en/jp/JVN70977403/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-31394", "datePublished": "2024-05-22T04:35:31.768Z", "dateReserved": "2024-04-03T02:24:22.988Z", "dateUpdated": "2025-03-27T15:03:43.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-23348 (GCVE-0-2024-23348)
Vulnerability from cvelistv5
Published
2024-01-23 09:39
Modified
2025-05-30 14:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Improper input validation
Summary
Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary JavaScript code by uploading a specially crafted SVG file.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | appleple inc. | a-blog cms Ver.3.1.x series |
Version: prior to Ver.3.1.7 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:59:32.154Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN34565930/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-23348", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-08T17:30:48.646555Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-30T14:19:38.246Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "a-blog cms Ver.3.1.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.1.7" } ] }, { "product": "a-blog cms Ver.3.0.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.0.29" } ] }, { "product": "a-blog cms Ver.2.11.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.11.58" } ] }, { "product": "a-blog cms Ver.2.10.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.10.50" } ] }, { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.2.9.0 and earlier " } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary JavaScript code by uploading a specially crafted SVG file." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper input validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-23T09:39:14.190Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "url": "https://jvn.jp/en/jp/JVN34565930/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-23348", "datePublished": "2024-01-23T09:39:14.190Z", "dateReserved": "2024-01-15T23:36:05.944Z", "dateUpdated": "2025-05-30T14:19:38.246Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-23916 (GCVE-0-2022-23916)
Vulnerability from cvelistv5
Published
2022-02-24 09:50
Modified
2024-08-03 03:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-site scripting
Summary
Cross-site scripting vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. This vulnerability is different from CVE-2022-24374.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
appleple inc. | a-blog cms |
Version: Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:59:22.651Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN14706307/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. This vulnerability is different from CVE-2022-24374." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-24T09:50:30", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN14706307/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-23916", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "a-blog cms", "version": { "version_data": [ { "version_value": "Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1" } ] } } ] }, "vendor_name": "appleple inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. This vulnerability is different from CVE-2022-24374." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://developer.a-blogcms.jp/blog/news/security-202202.html", "refsource": "MISC", "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "name": "https://jvn.jp/en/jp/JVN14706307/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN14706307/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-23916", "datePublished": "2022-02-24T09:50:30", "dateReserved": "2022-02-16T00:00:00", "dateUpdated": "2024-08-03T03:59:22.651Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-31395 (GCVE-0-2024-31395)
Vulnerability from cvelistv5
Published
2024-05-22 04:35
Modified
2024-10-31 14:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-site scripting (XSS)
Summary
Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with an editor or higher privilege who can log in to the product may execute an arbitrary script on the web browser of the user who accessed the schedule management page.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | appleple inc. | a-blog cms Ver.3.1.x series |
Version: prior to Ver.3.1.12 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-31395", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-22T14:24:22.284116Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-31T14:53:49.233Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:52:56.829Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN70977403/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "a-blog cms Ver.3.1.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.1.12" } ] }, { "product": "a-blog cms Ver.3.0.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.0.32" } ] }, { "product": "a-blog cms Ver.2.11.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.11.61" } ] }, { "product": "a-blog cms Ver.2.10.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.10.53" } ] }, { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.2.9 and earlier " } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with an editor or higher privilege who can log in to the product may execute an arbitrary script on the web browser of the user who accessed the schedule management page." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-22T04:35:37.216Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "url": "https://jvn.jp/en/jp/JVN70977403/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-31395", "datePublished": "2024-05-22T04:35:37.216Z", "dateReserved": "2024-04-03T02:24:22.988Z", "dateUpdated": "2024-10-31T14:53:49.233Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-23782 (GCVE-0-2024-23782)
Vulnerability from cvelistv5
Published
2024-01-28 23:09
Modified
2025-06-02 19:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-site scripting (XSS)
Summary
Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier versions. If this vulnerability is exploited, a user with a contributor or higher privilege may execute an arbitrary script on the web browser of the user who accessed the website using the product.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | appleple inc. | a-blog cms Ver.3.1.x series |
Version: prior to Ver.3.1.7 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:13:08.244Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN34565930/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-23782", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-29T16:03:01.341879Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-02T19:47:56.058Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "a-blog cms Ver.3.1.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.1.7" } ] }, { "product": "a-blog cms Ver.3.0.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.0.29" } ] }, { "product": "a-blog cms Ver.2.11.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.11.58" } ] }, { "product": "a-blog cms Ver.2.10.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.10.50" } ] }, { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.2.9.0 and earlier " } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier versions. If this vulnerability is exploited, a user with a contributor or higher privilege may execute an arbitrary script on the web browser of the user who accessed the website using the product." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-28T23:09:13.092Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "url": "https://jvn.jp/en/jp/JVN34565930/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-23782", "datePublished": "2024-01-28T23:09:13.092Z", "dateReserved": "2024-01-22T07:59:48.826Z", "dateUpdated": "2025-06-02T19:47:56.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-23181 (GCVE-0-2024-23181)
Vulnerability from cvelistv5
Published
2024-01-23 09:38
Modified
2025-06-20 19:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-site scripting (XSS)
Summary
Cross-site scripting vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote unauthenticated attacker to execute an arbitrary script on the logged-in user's web browser.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | appleple inc. | a-blog cms Ver.3.1.x series |
Version: prior to Ver.3.1.7 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:59:32.204Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN34565930/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-23181", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-23T13:49:49.168842Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-20T19:10:49.356Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "a-blog cms Ver.3.1.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.1.7" } ] }, { "product": "a-blog cms Ver.3.0.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.0.29" } ] }, { "product": "a-blog cms Ver.2.11.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.11.58" } ] }, { "product": "a-blog cms Ver.2.10.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.10.50" } ] }, { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.2.9.0 and earlier " } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote unauthenticated attacker to execute an arbitrary script on the logged-in user\u0027s web browser." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-23T09:38:08.211Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "url": "https://jvn.jp/en/jp/JVN34565930/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-23181", "datePublished": "2024-01-23T09:38:08.211Z", "dateReserved": "2024-01-12T05:24:51.969Z", "dateUpdated": "2025-06-20T19:10:49.356Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-6034 (GCVE-0-2019-6034)
Vulnerability from cvelistv5
Published
2019-12-26 15:16
Modified
2024-08-04 20:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Script injection
Summary
a-blog cms versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x) allows arbitrary scripts to be executed in the context of the application due to unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
appleple inc. | a-blog cms |
Version: versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:16:23.649Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://developer.a-blogcms.jp/download/legacy.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN10377257/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x)" } ] } ], "descriptions": [ { "lang": "en", "value": "a-blog cms versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x) allows arbitrary scripts to be executed in the context of the application due to unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Script injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-26T15:16:50", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://developer.a-blogcms.jp/download/legacy.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://jvn.jp/en/jp/JVN10377257/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2019-6034", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "a-blog cms", "version": { "version_data": [ { "version_value": "versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x)" } ] } } ] }, "vendor_name": "appleple inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "a-blog cms versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x) allows arbitrary scripts to be executed in the context of the application due to unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Script injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://developer.a-blogcms.jp/download/legacy.html", "refsource": "MISC", "url": "https://developer.a-blogcms.jp/download/legacy.html" }, { "name": "http://jvn.jp/en/jp/JVN10377257/index.html", "refsource": "MISC", "url": "http://jvn.jp/en/jp/JVN10377257/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2019-6034", "datePublished": "2019-12-26T15:16:50", "dateReserved": "2019-01-10T00:00:00", "dateUpdated": "2024-08-04T20:16:23.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-31396 (GCVE-0-2024-31396)
Vulnerability from cvelistv5
Published
2024-05-22 04:35
Modified
2024-08-02 01:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Code injection
Summary
Code injection vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12 and Ver.3.0.x series versions prior to Ver.3.0.32. If this vulnerability is exploited, a user with an administrator or higher privilege who can log in to the product may execute an arbitrary command on the server.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | appleple inc. | a-blog cms Ver.3.1.x series |
Version: prior to Ver.3.1.12 |
||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:appleple:a-blog_cms:3.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "a-blog_cms", "vendor": "appleple", "versions": [ { "lessThan": "3.1.12", "status": "affected", "version": "3.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:appleple:a-blog_cms:3.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "a-blog_cms", "vendor": "appleple", "versions": [ { "lessThan": "3.0.32", "status": "affected", "version": "3.0.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-31396", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-22T17:39:52.677007Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-23T20:44:24.938Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:52:56.923Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN70977403/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "a-blog cms Ver.3.1.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.1.12" } ] }, { "product": "a-blog cms Ver.3.0.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.0.32" } ] } ], "descriptions": [ { "lang": "en", "value": "Code injection vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12 and Ver.3.0.x series versions prior to Ver.3.0.32. If this vulnerability is exploited, a user with an administrator or higher privilege who can log in to the product may execute an arbitrary command on the server." } ], "problemTypes": [ { "descriptions": [ { "description": "Code injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-22T04:35:42.765Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "url": "https://jvn.jp/en/jp/JVN70977403/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-31396", "datePublished": "2024-05-22T04:35:42.765Z", "dateReserved": "2024-04-03T08:01:33.449Z", "dateUpdated": "2024-08-02T01:52:56.923Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-24374 (GCVE-0-2022-24374)
Vulnerability from cvelistv5
Published
2022-02-24 09:50
Modified
2024-08-03 04:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-site scripting
Summary
Cross-site scripting vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. This vulnerability is different from CVE-2022-23916.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
appleple inc. | a-blog cms |
Version: Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:07:02.425Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN14706307/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. This vulnerability is different from CVE-2022-23916." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-24T09:50:32", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN14706307/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-24374", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "a-blog cms", "version": { "version_data": [ { "version_value": "Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1" } ] } } ] }, "vendor_name": "appleple inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. This vulnerability is different from CVE-2022-23916." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://developer.a-blogcms.jp/blog/news/security-202202.html", "refsource": "MISC", "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "name": "https://jvn.jp/en/jp/JVN14706307/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN14706307/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-24374", "datePublished": "2022-02-24T09:50:32", "dateReserved": "2022-02-16T00:00:00", "dateUpdated": "2024-08-03T04:07:02.425Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-27279 (GCVE-0-2024-27279)
Vulnerability from cvelistv5
Published
2024-03-12 08:19
Modified
2024-10-31 18:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Directory traversal
Summary
Directory traversal vulnerability exists in a-blog cms Ver.3.1.x series Ver.3.1.9 and earlier, Ver.3.0.x series Ver.3.0.30 and earlier, Ver.2.11.x series Ver.2.11.59 and earlier, Ver.2.10.x series Ver.2.10.51 and earlier, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with editor or higher privilege who can login to the product may obtain arbitrary files on the server including password files.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | appleple inc. | a-blog cms Ver.3.1.x series |
Version: Ver.3.1.9 and earlier |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T00:27:59.741Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-48443978.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN48443978/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-27279", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-12T20:11:57.193866Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-31T18:12:32.261Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "a-blog cms Ver.3.1.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.3.1.9 and earlier" } ] }, { "product": "a-blog cms Ver.3.0.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.3.0.30 and earlier" } ] }, { "product": "a-blog cms Ver.2.11.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.2.11.59 and earlier" } ] }, { "product": "a-blog cms Ver.2.10.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.2.10.51 and earlier" } ] }, { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.2.9 and earlier " } ] } ], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability exists in a-blog cms Ver.3.1.x series Ver.3.1.9 and earlier, Ver.3.0.x series Ver.3.0.30 and earlier, Ver.2.11.x series Ver.2.11.59 and earlier, Ver.2.10.x series Ver.2.10.51 and earlier, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with editor or higher privilege who can login to the product may obtain arbitrary files on the server including password files." } ], "problemTypes": [ { "descriptions": [ { "description": "Directory traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-12T08:19:48.705Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-48443978.html" }, { "url": "https://jvn.jp/en/jp/JVN48443978/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-27279", "datePublished": "2024-03-12T08:19:48.705Z", "dateReserved": "2024-02-22T02:26:33.074Z", "dateUpdated": "2024-10-31T18:12:32.261Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-6033 (GCVE-0-2019-6033)
Vulnerability from cvelistv5
Published
2019-12-26 15:16
Modified
2024-08-04 20:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-site scripting
Summary
Cross-site scripting vulnerability in a-blog cms versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
appleple inc. | a-blog cms |
Version: versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:16:24.521Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://developer.a-blogcms.jp/download/legacy.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN10377257/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x)" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in a-blog cms versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-26T15:16:50", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://developer.a-blogcms.jp/download/legacy.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://jvn.jp/en/jp/JVN10377257/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2019-6033", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "a-blog cms", "version": { "version_data": [ { "version_value": "versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x)" } ] } } ] }, "vendor_name": "appleple inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in a-blog cms versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://developer.a-blogcms.jp/download/legacy.html", "refsource": "MISC", "url": "https://developer.a-blogcms.jp/download/legacy.html" }, { "name": "http://jvn.jp/en/jp/JVN10377257/index.html", "refsource": "MISC", "url": "http://jvn.jp/en/jp/JVN10377257/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2019-6033", "datePublished": "2019-12-26T15:16:50", "dateReserved": "2019-01-10T00:00:00", "dateUpdated": "2024-08-04T20:16:24.521Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-23182 (GCVE-0-2024-23182)
Vulnerability from cvelistv5
Published
2024-01-23 09:38
Modified
2025-05-30 14:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Relative path traversal
Summary
Relative path traversal vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to delete arbitrary files on the server.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | appleple inc. | a-blog cms Ver.3.1.x series |
Version: prior to Ver.3.1.7 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:59:32.082Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN34565930/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-23182", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-08T17:35:32.973909Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-30T14:19:44.009Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "a-blog cms Ver.3.1.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.1.7" } ] }, { "product": "a-blog cms Ver.3.0.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.0.29" } ] }, { "product": "a-blog cms Ver.2.11.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.11.58" } ] }, { "product": "a-blog cms Ver.2.10.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.10.50" } ] }, { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.2.9.0 and earlier " } ] } ], "descriptions": [ { "lang": "en", "value": "Relative path traversal vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to delete arbitrary files on the server." } ], "problemTypes": [ { "descriptions": [ { "description": "Relative path traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-23T09:38:58.906Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "url": "https://jvn.jp/en/jp/JVN34565930/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-23182", "datePublished": "2024-01-23T09:38:58.906Z", "dateReserved": "2024-01-12T05:24:51.969Z", "dateUpdated": "2025-05-30T14:19:44.009Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-23180 (GCVE-0-2024-23180)
Vulnerability from cvelistv5
Published
2024-01-23 09:37
Modified
2025-06-04 15:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Improper input validation
Summary
Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary code by uploading a specially crafted SVG file.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | appleple inc. | a-blog cms Ver.3.1.x series |
Version: prior to Ver.3.1.7 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:59:31.845Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN34565930/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-23180", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-01-26T16:26:53.058447Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-04T15:09:52.447Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "a-blog cms Ver.3.1.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.1.7" } ] }, { "product": "a-blog cms Ver.3.0.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.0.29" } ] }, { "product": "a-blog cms Ver.2.11.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.11.58" } ] }, { "product": "a-blog cms Ver.2.10.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.10.50" } ] }, { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.2.9.0 and earlier " } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary code by uploading a specially crafted SVG file." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper input validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-23T09:37:22.303Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "url": "https://jvn.jp/en/jp/JVN34565930/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-23180", "datePublished": "2024-01-23T09:37:22.303Z", "dateReserved": "2024-01-12T05:24:51.968Z", "dateUpdated": "2025-06-04T15:09:52.447Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-30420 (GCVE-0-2024-30420)
Vulnerability from cvelistv5
Published
2024-05-22 04:35
Modified
2024-08-19 19:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Server-Side Request Forgery (SSRF)
Summary
Server-side request forgery (SSRF) vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12 and Ver.3.0.x series versions prior to Ver.3.0.32. If this vulnerability is exploited, a user with an administrator or higher privilege who can log in to the product may obtain arbitrary files on the server and information on the internal server that is not disclosed to the public.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | appleple inc. | a-blog cms Ver.3.1.x series |
Version: prior to Ver.3.1.12 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.390Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN70977403/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "a-blog_cms", "vendor": "appleple", "versions": [ { "lessThan": "3.1.12", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "3.0.32", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-30420", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-19T19:22:17.028297Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918 Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-19T19:36:17.408Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "a-blog cms Ver.3.1.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.1.12" } ] }, { "product": "a-blog cms Ver.3.0.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.0.32" } ] } ], "descriptions": [ { "lang": "en", "value": "Server-side request forgery (SSRF) vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12 and Ver.3.0.x series versions prior to Ver.3.0.32. If this vulnerability is exploited, a user with an administrator or higher privilege who can log in to the product may obtain arbitrary files on the server and information on the internal server that is not disclosed to the public." } ], "problemTypes": [ { "descriptions": [ { "description": "Server-Side Request Forgery (SSRF)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-22T04:35:26.240Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "url": "https://jvn.jp/en/jp/JVN70977403/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-30420", "datePublished": "2024-05-22T04:35:26.240Z", "dateReserved": "2024-03-27T03:59:36.078Z", "dateUpdated": "2024-08-19T19:36:17.408Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-1179 (GCVE-0-2016-1179)
Vulnerability from cvelistv5
Published
2017-04-12 22:00
Modified
2024-08-05 22:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in the standard template of the comment functionality in appleple a-blog cms 2.6.0.1 and earlier allows remote attackers to inject arbitrary web script or HTML.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:48:13.487Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVNDB-2016-000046", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000046.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/patch/entry-2363.html" }, { "name": "JVN#73166466", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN73166466/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the standard template of the comment functionality in appleple a-blog cms 2.6.0.1 and earlier allows remote attackers to inject arbitrary web script or HTML." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-12T21:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVNDB-2016-000046", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000046.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://developer.a-blogcms.jp/blog/patch/entry-2363.html" }, { "name": "JVN#73166466", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN73166466/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2016-1179", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the standard template of the comment functionality in appleple a-blog cms 2.6.0.1 and earlier allows remote attackers to inject arbitrary web script or HTML." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "JVNDB-2016-000046", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000046.html" }, { "name": "https://developer.a-blogcms.jp/blog/patch/entry-2363.html", "refsource": "CONFIRM", "url": "https://developer.a-blogcms.jp/blog/patch/entry-2363.html" }, { "name": "JVN#73166466", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN73166466/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2016-1179", "datePublished": "2017-04-12T22:00:00", "dateReserved": "2015-12-26T00:00:00", "dateUpdated": "2024-08-05T22:48:13.487Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-30419 (GCVE-0-2024-30419)
Vulnerability from cvelistv5
Published
2024-05-22 04:35
Modified
2024-08-02 01:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-site scripting (XSS)
Summary
Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with a contributor or higher privilege who can log in to the product may execute an arbitrary script on the web browser of the user who accessed the website using the product.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | appleple inc. | a-blog cms Ver.3.1.x series |
Version: prior to Ver.3.1.12 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "a-blog_cms", "vendor": "appleple", "versions": [ { "lessThan": "3.1.12", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.0.32", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThan": "2.11.61", "status": "affected", "version": "2.11.0", "versionType": "custom" }, { "lessThan": "2.10.53", "status": "affected", "version": "2.10.0", "versionType": "custom" }, { "lessThanOrEqual": "2.9", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-30419", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-22T14:36:51.156737Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T16:16:04.625Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.430Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN70977403/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "a-blog cms Ver.3.1.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.1.12" } ] }, { "product": "a-blog cms Ver.3.0.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.3.0.32" } ] }, { "product": "a-blog cms Ver.2.11.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.11.61" } ] }, { "product": "a-blog cms Ver.2.10.x series", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "prior to Ver.2.10.53" } ] }, { "product": "a-blog cms", "vendor": "appleple inc.", "versions": [ { "status": "affected", "version": "Ver.2.9 and earlier " } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with a contributor or higher privilege who can log in to the product may execute an arbitrary script on the web browser of the user who accessed the website using the product." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-22T04:35:09.652Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "url": "https://jvn.jp/en/jp/JVN70977403/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-30419", "datePublished": "2024-05-22T04:35:09.652Z", "dateReserved": "2024-03-27T03:59:36.078Z", "dateUpdated": "2024-08-02T01:32:07.430Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2024-05-22 05:15
Modified
2025-05-12 14:23
Severity ?
Summary
Server-side request forgery (SSRF) vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12 and Ver.3.0.x series versions prior to Ver.3.0.32. If this vulnerability is exploited, a user with an administrator or higher privilege who can log in to the product may obtain arbitrary files on the server and information on the internal server that is not disclosed to the public.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/JVN-70977403.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN70977403/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/JVN-70977403.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN70977403/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5CDA3C7-736D-4E64-B2E0-7C45C702DF32", "versionEndExcluding": "3.0.32", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "358CC9AE-9361-45BA-B28D-1AE64536FA46", "versionEndExcluding": "3.1.12", "versionStartIncluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Server-side request forgery (SSRF) vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12 and Ver.3.0.x series versions prior to Ver.3.0.32. If this vulnerability is exploited, a user with an administrator or higher privilege who can log in to the product may obtain arbitrary files on the server and information on the internal server that is not disclosed to the public." }, { "lang": "es", "value": "La vulnerabilidad de Server-Side Request Forgery (SSRF) existe en las versiones de la serie a-blog cms Ver.3.1.x anteriores a la Ver.3.1.12 y en las versiones de la serie Ver.3.0.x anteriores a la Ver.3.0.32. Si se explota esta vulnerabilidad, un usuario con privilegios de administrador o superiores que pueda iniciar sesi\u00f3n en el producto puede obtener archivos arbitrarios en el servidor e informaci\u00f3n en el servidor interno que no se divulga al p\u00fablico." } ], "id": "CVE-2024-30420", "lastModified": "2025-05-12T14:23:35.353", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-05-22T05:15:52.983", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN70977403/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN70977403/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-22 05:15
Modified
2025-05-12 14:23
Severity ?
Summary
Code injection vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12 and Ver.3.0.x series versions prior to Ver.3.0.32. If this vulnerability is exploited, a user with an administrator or higher privilege who can log in to the product may execute an arbitrary command on the server.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/JVN-70977403.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN70977403/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/JVN-70977403.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN70977403/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5CDA3C7-736D-4E64-B2E0-7C45C702DF32", "versionEndExcluding": "3.0.32", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "358CC9AE-9361-45BA-B28D-1AE64536FA46", "versionEndExcluding": "3.1.12", "versionStartIncluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Code injection vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12 and Ver.3.0.x series versions prior to Ver.3.0.32. If this vulnerability is exploited, a user with an administrator or higher privilege who can log in to the product may execute an arbitrary command on the server." }, { "lang": "es", "value": "La vulnerabilidad de inyecci\u00f3n de c\u00f3digo existe en las versiones de la serie a-blog cms Ver.3.1.x anteriores a la Ver.3.1.12 y en las versiones de la serie Ver.3.0.x anteriores a la Ver.3.0.32. Si se explota esta vulnerabilidad, un usuario con privilegios de administrador o superiores que pueda iniciar sesi\u00f3n en el producto puede ejecutar un comando arbitrario en el servidor." } ], "id": "CVE-2024-31396", "lastModified": "2025-05-12T14:23:37.797", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-05-22T05:15:53.183", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN70977403/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN70977403/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-22 05:15
Modified
2025-05-12 14:23
Severity ?
Summary
Directory traversal vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with an editor or higher privilege who can log in to the product may obtain arbitrary files on the server.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/JVN-70977403.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN70977403/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/JVN-70977403.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN70977403/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "49BBE24F-A0EA-49F6-B2C2-732AF0DA0F87", "versionEndExcluding": "2.10.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "38B5399B-4410-471F-AC10-82E4946957F0", "versionEndExcluding": "2.11.61", "versionStartIncluding": "2.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5CDA3C7-736D-4E64-B2E0-7C45C702DF32", "versionEndExcluding": "3.0.32", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "358CC9AE-9361-45BA-B28D-1AE64536FA46", "versionEndExcluding": "3.1.12", "versionStartIncluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with an editor or higher privilege who can log in to the product may obtain arbitrary files on the server." }, { "lang": "es", "value": "La vulnerabilidad de Directory traversal existe en las versiones de la serie a-blog cms Ver.3.1.x anteriores a la Ver.3.1.12, versiones de la serie Ver.3.0.x anteriores a la Ver.3.0.32, versiones de la serie Ver.2.11.x anteriores a la Ver. 2.11.61, versiones de la serie Ver.2.10.x anteriores a la Ver.2.10.53 y Ver.2.9 y versiones anteriores. Si se explota esta vulnerabilidad, un usuario con un editor o un privilegio superior que pueda iniciar sesi\u00f3n en el producto puede obtener archivos arbitrarios en el servidor." } ], "id": "CVE-2024-31394", "lastModified": "2025-05-12T14:23:14.540", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-05-22T05:15:53.053", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN70977403/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN70977403/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-15 05:15
Modified
2025-05-13 15:12
Severity ?
Summary
URL spoofing vulnerability exists in a-blog cms Ver.3.1.0 to Ver.3.1.8. If an attacker sends a specially crafted request, the administrator of the product may be forced to access an arbitrary website when clicking a link in the audit log.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/JVN-48966481.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN48966481/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/JVN-48966481.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN48966481/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC8BCA56-5D76-4878-A297-55061CB7516B", "versionEndIncluding": "3.1.8", "versionStartIncluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "URL spoofing vulnerability exists in a-blog cms Ver.3.1.0 to Ver.3.1.8. If an attacker sends a specially crafted request, the administrator of the product may be forced to access an arbitrary website when clicking a link in the audit log." }, { "lang": "es", "value": "Existe una vulnerabilidad de suplantaci\u00f3n de URL en a-blog cms Ver.3.1.0 a Ver.3.1.8. Si un atacante env\u00eda una solicitud especialmente manipulada, el administrador del producto puede verse obligado a acceder a un sitio web arbitrario al hacer clic en un enlace del registro de auditor\u00eda." } ], "id": "CVE-2024-25559", "lastModified": "2025-05-13T15:12:52.413", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-02-15T05:15:10.870", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-48966481.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN48966481/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-48966481.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN48966481/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-03-12 09:15
Modified
2025-05-13 15:13
Severity ?
Summary
Directory traversal vulnerability exists in a-blog cms Ver.3.1.x series Ver.3.1.9 and earlier, Ver.3.0.x series Ver.3.0.30 and earlier, Ver.2.11.x series Ver.2.11.59 and earlier, Ver.2.10.x series Ver.2.10.51 and earlier, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with editor or higher privilege who can login to the product may obtain arbitrary files on the server including password files.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/JVN-48443978.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN48443978/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/JVN-48443978.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN48443978/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "78FD364E-37B6-47A4-93E3-64196D5484B1", "versionEndIncluding": "2.10.51", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "34273351-2450-40F2-B9E9-454C46B6271F", "versionEndIncluding": "2.11.59", "versionStartIncluding": "2.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "7864AE5E-5964-4583-AA42-271352F5E4DA", "versionEndIncluding": "3.0.30", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2DC06A-9858-41F5-9E2C-08D85C95101C", "versionEndIncluding": "3.1.9", "versionStartIncluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability exists in a-blog cms Ver.3.1.x series Ver.3.1.9 and earlier, Ver.3.0.x series Ver.3.0.30 and earlier, Ver.2.11.x series Ver.2.11.59 and earlier, Ver.2.10.x series Ver.2.10.51 and earlier, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with editor or higher privilege who can login to the product may obtain arbitrary files on the server including password files." }, { "lang": "es", "value": "Existe una vulnerabilidad de Directory traversal en a-blog cms Serie Ver.3.1.x Ver.3.1.9 y anteriores, Serie Ver.3.0.x Ver.3.0.30 y anteriores, Serie Ver.2.11.x Ver.2.11.59 y anteriores, Serie Ver.2.10.x Ver.2.10.51 y anteriores, y Ver.2.9 y versiones anteriores. Si se explota esta vulnerabilidad, un usuario con privilegios de editor o superiores que pueda iniciar sesi\u00f3n en el producto puede obtener archivos arbitrarios en el servidor, incluidos archivos de contrase\u00f1as." } ], "id": "CVE-2024-27279", "lastModified": "2025-05-13T15:13:51.827", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-03-12T09:15:10.070", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-48443978.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN48443978/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-48443978.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN48443978/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-26 16:15
Modified
2024-11-21 04:45
Severity ?
Summary
a-blog cms versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x) allows arbitrary scripts to be executed in the context of the application due to unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN10377257/index.html | Third Party Advisory | |
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/download/legacy.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN10377257/index.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/download/legacy.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9ED24E2-AD03-43D4-98AD-A95757388724", "versionEndExcluding": "2.8.64", "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFFAE441-77B2-4DED-A4AC-6A78973ADD2F", "versionEndExcluding": "2.9.6", "versionStartIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "E57E7C53-614B-4064-9B04-AACB28BD326A", "versionEndExcluding": "2.10.23", "versionStartIncluding": "2.10.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "a-blog cms versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x) allows arbitrary scripts to be executed in the context of the application due to unspecified vectors." }, { "lang": "es", "value": "a-blog cms versiones anteriores a Ver.2.10.23 (versiones Ver.2.10.x), Ver.2.9.26 (versiones Ver.2.9.x) y Ver.2.8.64 (versiones Ver.2.8.x), permite scripts arbitrarios para ser ejecutados en el contexto de la aplicaci\u00f3n debido a vectores no especificados." } ], "id": "CVE-2019-6034", "lastModified": "2024-11-21T04:45:57.183", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-26T16:15:12.887", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "http://jvn.jp/en/jp/JVN10377257/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/download/legacy.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://jvn.jp/en/jp/JVN10377257/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/download/legacy.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-23 10:15
Modified
2025-05-30 15:15
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary JavaScript code by uploading a specially crafted SVG file.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/JVN-34565930.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN34565930/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/JVN-34565930.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN34565930/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "2879B3D6-4E10-494B-B221-61CF4FA3B2D7", "versionEndIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "957FC43C-7DBF-445F-952D-2C3AFC3DAF53", "versionEndExcluding": "2.10.50", "versionStartIncluding": "2.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B9C6A38-B9F3-4B83-872E-4A7FCF10A2CF", "versionEndExcluding": "2.11.58", "versionStartIncluding": "2.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "43352BBA-DDE8-4542-A8E1-10762B634972", "versionEndExcluding": "3.0.29", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "E42BDC5D-3F5F-45E4-9135-0AA3E4DA94CE", "versionEndExcluding": "3.1.7", "versionStartIncluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary JavaScript code by uploading a specially crafted SVG file." }, { "lang": "es", "value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en las versiones de la serie a-blog cms Ver.3.1.x anteriores a la Ver.3.1.7, versiones de la serie Ver.3.0.x anteriores a la Ver.3.0.29, versiones de la serie Ver.2.11.x anteriores a la Ver. 2.11.58, versiones de la serie Ver.2.10.x anteriores a la Ver.2.10.50 y Ver.2.9.0 y anteriores permiten a un atacante remoto autenticado ejecutar c\u00f3digo JavaScript arbitrario cargando un archivo SVG especialmente manipulado." } ], "id": "CVE-2024-23348", "lastModified": "2025-05-30T15:15:35.877", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-01-23T10:15:10.637", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN34565930/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN34565930/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-24 15:15
Modified
2024-11-21 06:50
Severity ?
Summary
Cross-site scripting vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. This vulnerability is different from CVE-2022-23916.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/security-202202.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN14706307/index.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/security-202202.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN14706307/index.html | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | 3.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F010318-C88D-4F0D-9648-CD8CEE015D3B", "versionEndExcluding": "2.8.75", "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0320EBA-DACA-4E38-AAF7-BFB93414BECC", "versionEndExcluding": "2.9.40", "versionStartIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D0763C8-A9C0-4A27-B4DF-456C4AF75D82", "versionEndExcluding": "2.10.44", "versionStartIncluding": "2.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "C92C05DD-EF1E-4CD2-9F4A-846DBC2C89A0", "versionEndExcluding": "2.11.42", "versionStartIncluding": "2.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "521E93AF-17C4-4AB0-9FDA-9C997E74608A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. This vulnerability is different from CVE-2022-23916." }, { "lang": "es", "value": "Una vulnerabilidad de tipo Cross-site scripting en a-blog cms versiones Ver.2.8.x series anteriores a Ver.2.8.75, versiones Ver.2.9.x series anteriores a Ver.2.9.40, versiones Ver.2.10.x series anteriores a Ver.2.10.44, versiones Ver.2.11.x series anteriores a Ver.2.11.42 y versiones Ver.3.0.x series anteriores a Ver.3.0.1, permite a un atacante remoto autenticado inyectar un script arbitrario por medio de vectores no especificados. Esta vulnerabilidad es diferente de CVE-2022-23916" } ], "id": "CVE-2022-24374", "lastModified": "2024-11-21T06:50:17.380", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-24T15:15:29.287", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN14706307/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN14706307/index.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-26 16:15
Modified
2024-11-21 04:45
Severity ?
Summary
Cross-site scripting vulnerability in a-blog cms versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN10377257/index.html | Third Party Advisory | |
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/download/legacy.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN10377257/index.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/download/legacy.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9ED24E2-AD03-43D4-98AD-A95757388724", "versionEndExcluding": "2.8.64", "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFFAE441-77B2-4DED-A4AC-6A78973ADD2F", "versionEndExcluding": "2.9.6", "versionStartIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "E57E7C53-614B-4064-9B04-AACB28BD326A", "versionEndExcluding": "2.10.23", "versionStartIncluding": "2.10.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in a-blog cms versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." }, { "lang": "es", "value": "Una vulnerabilidad de tipo cross-site scripting en a-blog cms versiones anteriores a Ver.2.10.23 (versiones Ver.2.10.x), Ver.2.9.26 (versiones Ver.2.9.x) y Ver.2.8.64 (versiones Ver.2.8. x), permite a atacantes remotos inyectar script web o HTML arbitrario por medio de vectores no especificados." } ], "id": "CVE-2019-6033", "lastModified": "2024-11-21T04:45:57.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-26T16:15:12.793", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "http://jvn.jp/en/jp/JVN10377257/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/download/legacy.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://jvn.jp/en/jp/JVN10377257/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/download/legacy.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-23 10:15
Modified
2025-06-20 20:15
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Cross-site scripting vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote unauthenticated attacker to execute an arbitrary script on the logged-in user's web browser.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/JVN-34565930.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN34565930/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/JVN-34565930.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN34565930/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "2879B3D6-4E10-494B-B221-61CF4FA3B2D7", "versionEndIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "957FC43C-7DBF-445F-952D-2C3AFC3DAF53", "versionEndExcluding": "2.10.50", "versionStartIncluding": "2.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B9C6A38-B9F3-4B83-872E-4A7FCF10A2CF", "versionEndExcluding": "2.11.58", "versionStartIncluding": "2.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "43352BBA-DDE8-4542-A8E1-10762B634972", "versionEndExcluding": "3.0.29", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "E42BDC5D-3F5F-45E4-9135-0AA3E4DA94CE", "versionEndExcluding": "3.1.7", "versionStartIncluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote unauthenticated attacker to execute an arbitrary script on the logged-in user\u0027s web browser." }, { "lang": "es", "value": "Vulnerabilidad de cross-site scripting en las versiones de la serie a-blog cms Ver.3.1.x anteriores a la Ver.3.1.7, versiones de la serie Ver.3.0.x anteriores a la Ver.3.0.29, versiones de la serie Ver.2.11.x anteriores a la Ver. .2.11.58, versiones de la serie Ver.2.10.x anteriores a la Ver.2.10.50 y Ver.2.9.0 y anteriores permiten a un atacante remoto no autenticado ejecutar un script arbitrario en el navegador web del usuario que ha iniciado sesi\u00f3n." } ], "id": "CVE-2024-23181", "lastModified": "2025-06-20T20:15:30.830", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-01-23T10:15:10.493", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN34565930/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN34565930/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-22 05:15
Modified
2025-05-12 14:23
Severity ?
Summary
Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with an editor or higher privilege who can log in to the product may execute an arbitrary script on the web browser of the user who accessed the schedule management page.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/JVN-70977403.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN70977403/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/JVN-70977403.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN70977403/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "49BBE24F-A0EA-49F6-B2C2-732AF0DA0F87", "versionEndExcluding": "2.10.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "38B5399B-4410-471F-AC10-82E4946957F0", "versionEndExcluding": "2.11.61", "versionStartIncluding": "2.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5CDA3C7-736D-4E64-B2E0-7C45C702DF32", "versionEndExcluding": "3.0.32", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "358CC9AE-9361-45BA-B28D-1AE64536FA46", "versionEndExcluding": "3.1.12", "versionStartIncluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with an editor or higher privilege who can log in to the product may execute an arbitrary script on the web browser of the user who accessed the schedule management page." }, { "lang": "es", "value": "La vulnerabilidad de Cross-Site Scripting existe en las versiones de la serie a-blog cms Ver.3.1.x anteriores a la Ver.3.1.12, versiones de la serie Ver.3.0.x anteriores a la Ver.3.0.32, versiones de la serie Ver.2.11.x anteriores a Ver.2.11.61, versiones de la serie Ver.2.10.x anteriores a Ver.2.10.53 y Ver.2.9 y versiones anteriores. Si se explota esta vulnerabilidad, un usuario con un privilegio de editor o superior que pueda iniciar sesi\u00f3n en el producto puede ejecutar un script arbitrario en el navegador web del usuario que accedi\u00f3 a la p\u00e1gina de administraci\u00f3n de programaci\u00f3n." } ], "id": "CVE-2024-31395", "lastModified": "2025-05-12T14:23:17.680", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-05-22T05:15:53.120", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN70977403/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN70977403/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-23 10:15
Modified
2025-06-04 16:15
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary code by uploading a specially crafted SVG file.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/JVN-34565930.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN34565930/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/JVN-34565930.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN34565930/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "2879B3D6-4E10-494B-B221-61CF4FA3B2D7", "versionEndIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "957FC43C-7DBF-445F-952D-2C3AFC3DAF53", "versionEndExcluding": "2.10.50", "versionStartIncluding": "2.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B9C6A38-B9F3-4B83-872E-4A7FCF10A2CF", "versionEndExcluding": "2.11.58", "versionStartIncluding": "2.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "43352BBA-DDE8-4542-A8E1-10762B634972", "versionEndExcluding": "3.0.29", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "E42BDC5D-3F5F-45E4-9135-0AA3E4DA94CE", "versionEndExcluding": "3.1.7", "versionStartIncluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary code by uploading a specially crafted SVG file." }, { "lang": "es", "value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en las versiones de la serie a-blog cms Ver.3.1.x anteriores a la Ver.3.1.7, versiones de la serie Ver.3.0.x anteriores a la Ver.3.0.29, versiones de la serie Ver.2.11.x anteriores a la Ver. 2.11.58, versiones de la serie Ver.2.10.x anteriores a la Ver.2.10.50 y Ver.2.9.0 y anteriores permiten a un atacante remoto autenticado ejecutar c\u00f3digo arbitrario cargando un archivo SVG especialmente manipulado." } ], "id": "CVE-2024-23180", "lastModified": "2025-06-04T16:15:29.313", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-01-23T10:15:10.440", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN34565930/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN34565930/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-24 15:15
Modified
2024-11-21 06:49
Severity ?
Summary
Template injection (Improper Neutralization of Special Elements Used in a Template Engine) vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to obtain an arbitrary file on the server via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/security-202202.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN14706307/index.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/security-202202.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN14706307/index.html | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | 3.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F010318-C88D-4F0D-9648-CD8CEE015D3B", "versionEndExcluding": "2.8.75", "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0320EBA-DACA-4E38-AAF7-BFB93414BECC", "versionEndExcluding": "2.9.40", "versionStartIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D0763C8-A9C0-4A27-B4DF-456C4AF75D82", "versionEndExcluding": "2.10.44", "versionStartIncluding": "2.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "C92C05DD-EF1E-4CD2-9F4A-846DBC2C89A0", "versionEndExcluding": "2.11.42", "versionStartIncluding": "2.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "521E93AF-17C4-4AB0-9FDA-9C997E74608A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Template injection (Improper Neutralization of Special Elements Used in a Template Engine) vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to obtain an arbitrary file on the server via unspecified vectors." }, { "lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n de plantillas (Neutralizaci\u00f3n Inapropiada de Elementos Especiales Usados en un Motor de Plantillas) en a-blog cms versiones Ver.2.8.x series anteriores a Ver.2.8.75, versiones Ver.2.9.x anteriores a Ver.2.9.40, versiones Ver.2 .10.x series versiones anteriores a Ver.2.10.44, versiones Ver.2.11.x series versiones anteriores a Ver.2.11.42, y versiones Ver.3.0.x series versiones anteriores a Ver.3.0.1, permite a un atacante remoto autenticado obtener un archivo arbitrario en el servidor por medio de vectores no especificados" } ], "id": "CVE-2022-23810", "lastModified": "2024-11-21T06:49:17.847", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-24T15:15:28.810", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN14706307/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN14706307/index.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-31 05:15
Modified
2025-05-13 15:15
Severity ?
Summary
Untrusted data deserialization vulnerability exists in a-blog cms. Processing a specially crafted request may store arbitrary files on the server where the product is running. This can be leveraged to execute an arbitrary script on the server.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/entry-4197.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/security-update202503.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN66982699/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "60F04B77-7245-4462-A93E-B6EABF10070A", "versionEndIncluding": "2.8.80", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E221BFF-CC8F-4CA6-ACF3-259586C36F43", "versionEndIncluding": "2.9.46", "versionStartIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "94D68E7F-750D-41C6-A7AF-50B817B5C717", "versionEndExcluding": "2.10.58", "versionStartIncluding": "2.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "58C9FB4E-2C16-4989-9E08-3AE7BDD80518", "versionEndExcluding": "2.11.70", "versionStartIncluding": "2.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7985F2B-BF4C-4B00-9988-D184037229A1", "versionEndExcluding": "3.0.41", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "666198C0-5D1D-442F-8659-358F7AC09A0B", "versionEndExcluding": "3.1.37", "versionStartIncluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted data deserialization vulnerability exists in a-blog cms. Processing a specially crafted request may store arbitrary files on the server where the product is running. This can be leveraged to execute an arbitrary script on the server." }, { "lang": "es", "value": "Existe una vulnerabilidad de deserializaci\u00f3n de datos no confiables en a-blog CMS. Al procesar una solicitud especialmente manipulada, se pueden almacenar archivos arbitrarios en el servidor donde se ejecuta el producto. Esto puede aprovecharse para ejecutar un script arbitrario en el servidor." } ], "id": "CVE-2025-31103", "lastModified": "2025-05-13T15:15:19.237", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "vultures@jpcert.or.jp", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-31T05:15:16.500", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/entry-4197.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/security-update202503.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN66982699/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "vultures@jpcert.or.jp", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-23 10:15
Modified
2025-05-30 15:15
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Summary
Relative path traversal vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to delete arbitrary files on the server.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/JVN-34565930.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN34565930/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/JVN-34565930.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN34565930/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "2879B3D6-4E10-494B-B221-61CF4FA3B2D7", "versionEndIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "957FC43C-7DBF-445F-952D-2C3AFC3DAF53", "versionEndExcluding": "2.10.50", "versionStartIncluding": "2.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B9C6A38-B9F3-4B83-872E-4A7FCF10A2CF", "versionEndExcluding": "2.11.58", "versionStartIncluding": "2.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "43352BBA-DDE8-4542-A8E1-10762B634972", "versionEndExcluding": "3.0.29", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "E42BDC5D-3F5F-45E4-9135-0AA3E4DA94CE", "versionEndExcluding": "3.1.7", "versionStartIncluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Relative path traversal vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to delete arbitrary files on the server." }, { "lang": "es", "value": "Vulnerabilidad de path traversal relativo en las versiones de la serie a-blog cms Ver.3.1.x anteriores a la Ver.3.1.7, versiones de la serie Ver.3.0.x anteriores a la Ver.3.0.29, versiones de la serie Ver.2.11.x anteriores a la Ver. 2.11.58, versiones de la serie Ver.2.10.x anteriores a Ver.2.10.50 y Ver.2.9.0 y anteriores permiten a un atacante remoto autenticado eliminar archivos arbitrarios en el servidor." } ], "id": "CVE-2024-23182", "lastModified": "2025-05-30T15:15:34.027", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-01-23T10:15:10.540", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN34565930/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN34565930/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-24 15:15
Modified
2024-11-21 06:43
Severity ?
Summary
Authentication bypass vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.74, Ver.2.9.x series versions prior to Ver.2.9.39, Ver.2.10.x series versions prior to Ver.2.10.43, and Ver.2.11.x series versions prior to Ver.2.11.41 allows a remote unauthenticated attacker to bypass authentication under the specific condition.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/security-202202.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN14706307/index.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/security-202202.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN14706307/index.html | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "C264EA3A-AED8-4E83-8376-AB508E776879", "versionEndExcluding": "2.8.74", "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "D668F55E-6205-4700-96B1-39C244C5A0E1", "versionEndExcluding": "2.9.39", "versionStartIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "F60CDC66-6FE9-4240-B9FB-F1F6179E0FB2", "versionEndExcluding": "2.10.43", "versionStartIncluding": "2.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "95E3272E-1F03-481B-B4CD-37BA56C1A3EE", "versionEndExcluding": "2.11.41", "versionStartIncluding": "2.11.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authentication bypass vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.74, Ver.2.9.x series versions prior to Ver.2.9.39, Ver.2.10.x series versions prior to Ver.2.10.43, and Ver.2.11.x series versions prior to Ver.2.11.41 allows a remote unauthenticated attacker to bypass authentication under the specific condition." }, { "lang": "es", "value": "Una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en a-blog cms versiones Ver.2.8.x anteriores a Ver.2.8.74, versiones Ver.2.9.x anteriores a Ver.2.9.39, versiones Ver.2.10.x anteriores a Ver.2.10.43 y versiones Ver.2.11.x anteriores a Ver.2.11.41, permite a un atacante remoto no autenticado omitir la autenticaci\u00f3n bajo una condici\u00f3n espec\u00edfica" } ], "id": "CVE-2022-21142", "lastModified": "2024-11-21T06:43:58.737", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-24T15:15:27.807", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN14706307/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN14706307/index.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-290" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-12 22:59
Modified
2025-04-20 01:37
Severity ?
Summary
The session management of the comment functionality in appleple a-blog cms 2.6.0.1 and earlier allows remote attackers to obtain or modify sensitive data via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN03975805/index.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000047.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/patch/entry-2363.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN03975805/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000047.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/patch/entry-2363.html | Broken Link |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DA4D6AF-8FD4-4C09-B4E3-D5291AF39BD8", "versionEndIncluding": "2.6.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The session management of the comment functionality in appleple a-blog cms 2.6.0.1 and earlier allows remote attackers to obtain or modify sensitive data via unspecified vectors." }, { "lang": "es", "value": "La sesi\u00f3n de administraci\u00f3n de la funcionalidad de comentarios en appleple a-blog cms 2.6.0.1 y versiones anteriores permite a atacantes remotos a obtener o modificar informaci\u00f3n sensible a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2016-1178", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-12T22:59:00.273", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN03975805/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000047.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Broken Link" ], "url": "https://developer.a-blogcms.jp/blog/patch/entry-2363.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN03975805/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000047.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://developer.a-blogcms.jp/blog/patch/entry-2363.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-28 23:15
Modified
2025-06-02 20:15
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier versions. If this vulnerability is exploited, a user with a contributor or higher privilege may execute an arbitrary script on the web browser of the user who accessed the website using the product.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/JVN-34565930.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN34565930/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/JVN-34565930.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN34565930/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "733522A6-B4FD-4162-AB01-5BD359E4C808", "versionEndExcluding": "2.10.50", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B9C6A38-B9F3-4B83-872E-4A7FCF10A2CF", "versionEndExcluding": "2.11.58", "versionStartIncluding": "2.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "43352BBA-DDE8-4542-A8E1-10762B634972", "versionEndExcluding": "3.0.29", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "E42BDC5D-3F5F-45E4-9135-0AA3E4DA94CE", "versionEndExcluding": "3.1.7", "versionStartIncluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier versions. If this vulnerability is exploited, a user with a contributor or higher privilege may execute an arbitrary script on the web browser of the user who accessed the website using the product." }, { "lang": "es", "value": "La vulnerabilidad de cross site scripting existe en las versiones de la serie a-blog cms Ver.3.1.x anteriores a la Ver.3.1.7, versiones de la serie Ver.3.0.x anteriores a la Ver.3.0.29, versiones de la serie Ver.2.11.x anteriores a Ver.2.11.58, versiones de la serie Ver.2.10.x anteriores a Ver.2.10.50 y Ver.2.9.0 y versiones anteriores. Si se explota esta vulnerabilidad, un usuario con un privilegio de colaborador o superior puede ejecutar un script arbitrario en el navegador web del usuario que accedi\u00f3 al sitio web utilizando el producto." } ], "id": "CVE-2024-23782", "lastModified": "2025-06-02T20:15:21.780", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-01-28T23:15:58.350", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN34565930/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN34565930/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-24 15:15
Modified
2024-11-21 06:49
Severity ?
Summary
Cross-site scripting vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. This vulnerability is different from CVE-2022-24374.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/security-202202.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN14706307/index.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/security-202202.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN14706307/index.html | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | 3.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F010318-C88D-4F0D-9648-CD8CEE015D3B", "versionEndExcluding": "2.8.75", "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0320EBA-DACA-4E38-AAF7-BFB93414BECC", "versionEndExcluding": "2.9.40", "versionStartIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D0763C8-A9C0-4A27-B4DF-456C4AF75D82", "versionEndExcluding": "2.10.44", "versionStartIncluding": "2.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "C92C05DD-EF1E-4CD2-9F4A-846DBC2C89A0", "versionEndExcluding": "2.11.42", "versionStartIncluding": "2.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "521E93AF-17C4-4AB0-9FDA-9C997E74608A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. This vulnerability is different from CVE-2022-24374." }, { "lang": "es", "value": "La vulnerabilidad de scripting cruzado en a-blog cms versiones Ver.2.8.x series anteriores a Ver.2.8.75, versiones Ver.2.9.x series anteriores a Ver.2.9.40, versiones Ver.2.10.x series anteriores a Ver.2.10.44, versiones Ver.2.11.x series anteriores a Ver.2.11.42 y versiones Ver.3.0.x series anteriores a Ver.3.0.1, permite a un atacante remoto autenticado inyectar un script arbitrario por medio de vectores no especificados. Esta vulnerabilidad es diferente de CVE-2022-24374" } ], "id": "CVE-2022-23916", "lastModified": "2024-11-21T06:49:27.417", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-24T15:15:28.867", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN14706307/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/security-202202.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN14706307/index.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-23 10:15
Modified
2025-06-20 20:15
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Cross-site scripting vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute an arbitrary script on the logged-in user's web browser.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/JVN-34565930.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN34565930/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/JVN-34565930.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN34565930/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "2879B3D6-4E10-494B-B221-61CF4FA3B2D7", "versionEndIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "957FC43C-7DBF-445F-952D-2C3AFC3DAF53", "versionEndExcluding": "2.10.50", "versionStartIncluding": "2.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B9C6A38-B9F3-4B83-872E-4A7FCF10A2CF", "versionEndExcluding": "2.11.58", "versionStartIncluding": "2.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "43352BBA-DDE8-4542-A8E1-10762B634972", "versionEndExcluding": "3.0.29", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "E42BDC5D-3F5F-45E4-9135-0AA3E4DA94CE", "versionEndExcluding": "3.1.7", "versionStartIncluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute an arbitrary script on the logged-in user\u0027s web browser." }, { "lang": "es", "value": "Vulnerabilidad de cross-site scripting en las versiones de la serie a-blog cms Ver.3.1.x anteriores a la Ver.3.1.7, versiones de la serie Ver.3.0.x anteriores a la Ver.3.0.29, versiones de la serie Ver.2.11.x anteriores a la Ver. .2.11.58, versiones de la serie Ver.2.10.x anteriores a la Ver.2.10.50 y Ver.2.9.0 y anteriores permiten a un atacante remoto autenticado ejecutar un script arbitrario en el navegador web del usuario que ha iniciado sesi\u00f3n." } ], "id": "CVE-2024-23183", "lastModified": "2025-06-20T20:15:31.003", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-01-23T10:15:10.590", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN34565930/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-34565930.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN34565930/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-22 05:15
Modified
2025-05-12 14:23
Severity ?
Summary
Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with a contributor or higher privilege who can log in to the product may execute an arbitrary script on the web browser of the user who accessed the website using the product.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/news/JVN-70977403.html | Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN70977403/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/news/JVN-70977403.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN70977403/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * | |
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "49BBE24F-A0EA-49F6-B2C2-732AF0DA0F87", "versionEndExcluding": "2.10.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "38B5399B-4410-471F-AC10-82E4946957F0", "versionEndExcluding": "2.11.61", "versionStartIncluding": "2.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5CDA3C7-736D-4E64-B2E0-7C45C702DF32", "versionEndExcluding": "3.0.32", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "358CC9AE-9361-45BA-B28D-1AE64536FA46", "versionEndExcluding": "3.1.12", "versionStartIncluding": "3.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with a contributor or higher privilege who can log in to the product may execute an arbitrary script on the web browser of the user who accessed the website using the product." }, { "lang": "es", "value": "La vulnerabilidad de Cross-Site Scripting existe en las versiones de la serie a-blog cms Ver.3.1.x anteriores a la Ver.3.1.12, versiones de la serie Ver.3.0.x anteriores a la Ver.3.0.32, versiones de la serie Ver.2.11.x anteriores a Ver.2.11.61, versiones de la serie Ver.2.10.x anteriores a Ver.2.10.53 y Ver.2.9 y versiones anteriores. Si se explota esta vulnerabilidad, un usuario con un privilegio de colaborador o superior que pueda iniciar sesi\u00f3n en el producto puede ejecutar un script arbitrario en el navegador web del usuario que accedi\u00f3 al sitio web utilizando el producto." } ], "id": "CVE-2024-30419", "lastModified": "2025-05-12T14:23:06.877", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-05-22T05:15:52.137", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN70977403/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN70977403/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-12 22:59
Modified
2025-04-20 01:37
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the standard template of the comment functionality in appleple a-blog cms 2.6.0.1 and earlier allows remote attackers to inject arbitrary web script or HTML.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN73166466/index.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000046.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | https://developer.a-blogcms.jp/blog/patch/entry-2363.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN73166466/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000046.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.a-blogcms.jp/blog/patch/entry-2363.html | Broken Link |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
appleple | a-blog_cms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DA4D6AF-8FD4-4C09-B4E3-D5291AF39BD8", "versionEndIncluding": "2.6.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the standard template of the comment functionality in appleple a-blog cms 2.6.0.1 and earlier allows remote attackers to inject arbitrary web script or HTML." }, { "lang": "es", "value": "Vulnerabilidad (XSS) en la plantilla est\u00e1ndar de la funcionalidad de comentarios en appleple a-blog cms 2.6.0.1 y versiones anteriores permite a atacantes remotos a inyectar secuencias de comandos de web o HTML arbitrario." } ], "id": "CVE-2016-1179", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-12T22:59:00.303", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN73166466/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000046.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Broken Link" ], "url": "https://developer.a-blogcms.jp/blog/patch/entry-2363.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN73166466/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000046.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://developer.a-blogcms.jp/blog/patch/entry-2363.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }