All the vulnerabilites related to JustSystems Corporation - JUST Government
jvndb-2017-000076
Vulnerability from jvndb
Published
2017-04-20 15:11
Modified
2017-06-01 13:40
Severity ?
Summary
Multiple JustSystems products including Hanako may insecurely load Dynamic Link Libraries
Details
Hanako and multiple software suites containing Hanako provided by JustSystems Corporation contain an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. Eiji James Yoshida of Security Professionals Network Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000076.html",
  "dc:date": "2017-06-01T13:40+09:00",
  "dcterms:issued": "2017-04-20T15:11+09:00",
  "dcterms:modified": "2017-06-01T13:40+09:00",
  "description": "Hanako and multiple software suites containing Hanako provided by JustSystems Corporation contain an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries.\r\n\r\nEiji James Yoshida of Security Professionals Network Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000076.html",
  "sec:cpe": [
    {
      "#text": "cpe:/a:justsystems:hanako",
      "@product": "Hanako",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:hanako_police",
      "@product": "Hanako Police",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:hanako_pro",
      "@product": "Hanako Pro",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:justschool",
      "@product": "Just School",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:just_frontier",
      "@product": "Just Frontier",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:just_government",
      "@product": "JUST Government",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:just_jump",
      "@product": "Just Jump",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:just_office",
      "@product": "JUST Office",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:just_police",
      "@product": "JUST Police",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    }
  ],
  "sec:cvss": [
    {
      "@score": "6.8",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
      "@version": "2.0"
    },
    {
      "@score": "7.8",
      "@severity": "High",
      "@type": "Base",
      "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "@version": "3.0"
    }
  ],
  "sec:identifier": "JVNDB-2017-000076",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN54268888/index.html",
      "@id": "JVN#54268888",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2154",
      "@id": "CVE-2017-2154",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2017-2154",
      "@id": "CVE-2017-2154",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-Other",
      "@title": "No Mapping(CWE-Other)"
    }
  ],
  "title": "Multiple JustSystems products including Hanako may insecurely load Dynamic Link Libraries"
}

jvndb-2023-000102
Vulnerability from jvndb
Published
2023-10-19 15:16
Modified
2024-05-16 16:44
Severity ?
Summary
Multiple vulnerabilities in JustSystems products
Details
Multiple products provided by JustSystems Corporation contain multiple vulnerabilities listed below. * Use after free (CWE-416) - CVE-2023-34366 * Integer overflow (CWE-190) - CVE-2023-38127 * Access of resource using incompatible type (Type confusion) (CWE-843) - CVE-2023-38128 * Improper validation of array index (CWE-129) - CVE-2023-35126 Cisco Talos Security Intelligence & Research Group reported these vulnerabilities to JustSystems Corporation and coordinated. JustSystems Corporation and JPCERT/CC published respective advisories in order to notify users of the solution through JVN.
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000102.html",
  "dc:date": "2024-05-16T16:44+09:00",
  "dcterms:issued": "2023-10-19T15:16+09:00",
  "dcterms:modified": "2024-05-16T16:44+09:00",
  "description": "Multiple products provided by JustSystems Corporation contain multiple vulnerabilities listed below.\r\n\r\n  * Use after free (CWE-416) - CVE-2023-34366\r\n  * Integer overflow (CWE-190) - CVE-2023-38127\r\n  * Access of resource using incompatible type (Type confusion) (CWE-843) - CVE-2023-38128\r\n  * Improper validation of array index (CWE-129) - CVE-2023-35126\r\n\r\nCisco Talos Security Intelligence \u0026 Research Group reported these vulnerabilities to JustSystems Corporation and coordinated. JustSystems Corporation and JPCERT/CC published respective advisories in order to notify users of the solution through JVN.",
  "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000102.html",
  "sec:cpe": [
    {
      "#text": "cpe:/a:justsystems:ichitaro",
      "@product": "Ichitaro",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:just_government",
      "@product": "JUST Government",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:just_office",
      "@product": "JUST Office",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:just_police",
      "@product": "JUST Police",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:rakuraku_hagaki",
      "@product": "Rakuraku Hagaki",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    }
  ],
  "sec:cvss": [
    {
      "@score": "1.9",
      "@severity": "Low",
      "@type": "Base",
      "@vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
      "@version": "2.0"
    },
    {
      "@score": "3.3",
      "@severity": "Low",
      "@type": "Base",
      "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
      "@version": "3.0"
    }
  ],
  "sec:identifier": "JVNDB-2023-000102",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN28846531/index.html",
      "@id": "JVN#28846531",
      "@source": "JVN"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34366",
      "@id": "CVE-2023-34366",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-38127",
      "@id": "CVE-2023-38127",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-38128",
      "@id": "CVE-2023-38128",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-35126",
      "@id": "CVE-2023-35126",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34366",
      "@id": "CVE-2023-34366",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-38127",
      "@id": "CVE-2023-38127",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-38128",
      "@id": "CVE-2023-38128",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-35126",
      "@id": "CVE-2023-35126",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-119",
      "@title": "Buffer Errors(CWE-119)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-Other",
      "@title": "No Mapping(CWE-Other)"
    }
  ],
  "title": "Multiple vulnerabilities in JustSystems products"
}

jvndb-2023-000031
Vulnerability from jvndb
Published
2023-04-04 15:22
Modified
2024-05-29 17:32
Severity ?
Summary
Multiple vulnerabilities in JustSystems products
Details
Multiple products provided by JustSystems Corporation contain multiple vulnerabilities listed below. <ul><li>Use After Free (CWE-416) - CVE-2022-43664</li> <li>Heap-based Buffer Overflow (CWE-122) - CVE-2022-45115</li> <li>Free of Memory not on the Heap (CWE-590) - CVE-2023-22291</li> <li>Heap-based Buffer Overflow (CWE-122) - CVE-2023-22660</li></ul> Cisco Talos Security Intelligence & Research Group reported these vulnerabilities to JustSystems Corporation and coordinated. JustSystems Corporation and JPCERT/CC published respective advisories in order to notify users of the solutions through JVN.
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000031.html",
  "dc:date": "2024-05-29T17:32+09:00",
  "dcterms:issued": "2023-04-04T15:22+09:00",
  "dcterms:modified": "2024-05-29T17:32+09:00",
  "description": "Multiple products provided by JustSystems Corporation contain multiple vulnerabilities listed below.\r\n\u003cul\u003e\u003cli\u003eUse After Free (CWE-416) - CVE-2022-43664\u003c/li\u003e\r\n\u003cli\u003eHeap-based Buffer Overflow (CWE-122) - CVE-2022-45115\u003c/li\u003e\r\n\u003cli\u003eFree of Memory not on the Heap (CWE-590) - CVE-2023-22291\u003c/li\u003e\r\n\u003cli\u003eHeap-based Buffer Overflow (CWE-122) - CVE-2023-22660\u003c/li\u003e\u003c/ul\u003e\r\nCisco Talos Security Intelligence \u0026 Research Group reported these vulnerabilities to JustSystems Corporation and coordinated. JustSystems Corporation and JPCERT/CC published respective advisories in order to notify users of the solutions through JVN.",
  "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-000031.html",
  "sec:cpe": [
    {
      "#text": "cpe:/a:justsystems:hanako",
      "@product": "Hanako",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:homepage_builder_21",
      "@product": "Homepage Builder 21",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:ichitaro",
      "@product": "Ichitaro",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:just_government",
      "@product": "JUST Government",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:just_office",
      "@product": "JUST Office",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:just_police",
      "@product": "JUST Police",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:label_mighty",
      "@product": "Label Mighty",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:rakuraku_hagaki",
      "@product": "Rakuraku Hagaki",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    }
  ],
  "sec:cvss": [
    {
      "@score": "6.8",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
      "@version": "2.0"
    },
    {
      "@score": "7.8",
      "@severity": "High",
      "@type": "Base",
      "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "@version": "3.0"
    }
  ],
  "sec:identifier": "JVNDB-2023-000031",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN79149117/index.html",
      "@id": "JVN#79149117",
      "@source": "JVN"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2022-43664",
      "@id": "CVE-2022-43664",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2022-45115",
      "@id": "CVE-2022-45115",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-22291",
      "@id": "CVE-2023-22291",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-22660",
      "@id": "CVE-2023-22660",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-43664",
      "@id": "CVE-2022-43664",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-45115",
      "@id": "CVE-2022-45115",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-22291",
      "@id": "CVE-2023-22291",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-22660",
      "@id": "CVE-2023-22660",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-119",
      "@title": "Buffer Errors(CWE-119)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-Other",
      "@title": "No Mapping(CWE-Other)"
    }
  ],
  "title": "Multiple vulnerabilities in JustSystems products"
}