Browse all 200 CVE security advisories affecting Cybozu, Inc.. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Cybozu, Inc. is a Japanese software provider specializing in cloud-based collaboration tools, most notably the customizable platform Kabum. The company’s extensive attack surface, evidenced by approximately 200 recorded Common Vulnerabilities and Exposures (CVEs), stems largely from its highly configurable architecture. Historically, the most prevalent vulnerability classes affecting Cybozu products include Cross-Site Scripting (XSS), SQL injection, and improper access control issues that facilitate privilege escalation. These flaws often arise from complex permission systems and third-party integrations within the Kabum ecosystem. While no single catastrophic data breach has defined the company’s public security history, the high volume of disclosed CVEs indicates persistent challenges in securing dynamic, user-generated code environments. Security updates are typically released in response to these specific configuration-related flaws rather than systemic infrastructure failures, requiring administrators to maintain rigorous patch management protocols to mitigate risks associated with its flexible application development framework.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-22888 | Cybozu Garoon 安全漏洞 — Cybozu GaroonCWE-231 | 6.5AI | MediumAI | 2026-02-02 |
| CVE-2026-22881 | Cybozu Garoon 跨站脚本漏洞 — Cybozu GaroonCWE-79 | 6.1AI | MediumAI | 2026-02-02 |
| CVE-2026-20711 | Cybozu Garoon 跨站脚本漏洞 — Cybozu GaroonCWE-79 | 6.1AI | MediumAI | 2026-02-02 |
| CVE-2024-39817 | Cybozu Office 安全漏洞 — Cybozu Office | 4.3AI | MediumAI | 2024-08-06 |
| CVE-2024-39457 | Cybozu Garoon 安全漏洞 — Cybozu Garoon | 6.1AI | MediumAI | 2024-07-19 |
| CVE-2024-31397 | Cybozu Garoon 安全漏洞 — Cybozu Garoon | 4.9AI | MediumAI | 2024-06-11 |
| CVE-2024-31399 | Cybozu Garoon 安全漏洞 — Cybozu Garoon | 7.5AI | HighAI | 2024-06-11 |
| CVE-2024-31402 | Cybozu Garoon 安全漏洞 — Cybozu Garoon | 4.3AI | MediumAI | 2024-06-11 |
| CVE-2024-31398 | Cybozu Garoon 安全漏洞 — Cybozu Garoon | 4.3AI | MediumAI | 2024-06-11 |
| CVE-2024-31404 | Cybozu Garoon 安全漏洞 — Cybozu Garoon | 4.3AI | MediumAI | 2024-06-11 |
| CVE-2024-31403 | Cybozu Garoon 安全漏洞 — Cybozu Garoon | 5.4AI | MediumAI | 2024-06-11 |
| CVE-2024-31401 | Cybozu Garoon 安全漏洞 — Cybozu Garoon | 4.8AI | MediumAI | 2024-06-11 |
| CVE-2024-31400 | Cybozu Garoon 安全漏洞 — Cybozu Garoon | 8.2AI | HighAI | 2024-06-11 |
| CVE-2024-23304 | Cybozu KUNAI 安全漏洞 — Cybozu KUNAI for Android | 7.5 | - | 2024-02-06 |
| CVE-2023-46278 | Cybozu Remote Service 安全漏洞 — Cybozu Remote Service | 4.3 | - | 2023-10-31 |
| CVE-2022-26838 | Cybozu Remote Service 路径遍历漏洞 — Cybozu Remote Service | 6.5 | - | 2023-08-03 |
| CVE-2023-26595 | Cybozu Garoon 资源管理错误漏洞 — Cybozu Garoon | 6.5 | - | 2023-05-23 |
| CVE-2023-27304 | Cybozu Garoon 安全漏洞 — Cybozu Garoon | 4.3 | - | 2023-05-23 |
| CVE-2023-27384 | Cybozu Garoon 安全漏洞 — Cybozu Garoon | 4.3 | - | 2023-05-23 |
| CVE-2022-44608 | Cybozu Remote Service 资源管理错误漏洞 — Cybozu Remote Service | 6.5 | - | 2022-12-07 |
| CVE-2022-33311 | Cybozu Office 安全漏洞 — Cybozu Office | 4.3 | - | 2022-08-18 |
| CVE-2022-33151 | Cybozu Office 跨站脚本漏洞 — Cybozu Office | 6.1 | - | 2022-08-18 |
| CVE-2022-32583 | Cybozu Office 安全漏洞 — Cybozu Office | 6.5 | - | 2022-08-18 |
| CVE-2022-32544 | Cybozu Office 安全漏洞 — Cybozu Office | 4.3 | - | 2022-08-18 |
| CVE-2022-32453 | Cybozu Office 注入漏洞 — Cybozu Office | 6.5 | - | 2022-08-18 |
| CVE-2022-32283 | Cybozu Office 访问控制错误漏洞 — Cybozu Office | 4.3 | - | 2022-08-18 |
| CVE-2022-30693 | Cybozu Office 信息泄露漏洞 — Cybozu Office | 5.3 | - | 2022-08-18 |
| CVE-2022-30604 | Cybozu Office 跨站脚本漏洞 — Cybozu Office | 6.1 | - | 2022-08-18 |
| CVE-2022-29891 | Cybozu Office 访问控制错误漏洞 — Cybozu Office | 4.3 | - | 2022-08-18 |
| CVE-2022-29487 | Cybozu Office 跨站脚本漏洞 — Cybozu Office | 6.1 | - | 2022-08-18 |
This page lists every published CVE security advisory associated with Cybozu, Inc.. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.