First published: Mon Jul 04 2022(Updated: )
Improper input validation vulnerability in Scheduler of Cybozu Garoon 4.0.0 to 5.5.1 allows a remote authenticated attacker to alter the data of Scheduler.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Cybozu Garoon | >=4.0.0<=5.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-28692.
The vulnerability affects Cybozu Garoon versions 4.0.0 to 5.5.1.
An attacker with remote authenticated access can use this vulnerability to alter Scheduler data.
The severity rating is medium with a CVSS score of 4.3.
Yes, you can find more information about the vulnerability at the following references: [Reference 1](https://cs.cybozu.co.jp/2022/007429.html), [Reference 2](https://jvn.jp/en/jp/JVN73897863/index.html).