Search criteria
6 vulnerabilities found for unarj32.dll by micco
FKIE_CVE-2018-16190
Vulnerability from fkie_nvd - Published: 2019-02-13 18:29 - Updated: 2024-11-21 03:52
Severity ?
Summary
Untrusted search path vulnerability in UNARJ32.DLL for Win32, LHMelting for Win32, and LMLzh32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier, LHMelting for Win32 Ver 1.65.3.6 and earlier, LMLzh32.DLL Ver 2.67.1.2 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| micco | lhmelting | * | |
| micco | lmlzh32.dll | * | |
| micco | unarj32.dll | * | |
| micco | unlha32.dll | * | |
| microsoft | windows | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:micco:lhmelting:*:*:*:*:*:*:*:*",
"matchCriteriaId": "93DE5C2D-86DA-47AA-8B48-B6491A837C94",
"versionEndIncluding": "1.65.3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:micco:lmlzh32.dll:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B6C1772-34C1-4359-922B-AD3CD5851CB5",
"versionEndIncluding": "2.67.1.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:micco:unarj32.dll:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8EFBC7F4-7258-4A75-9766-31A7891D3078",
"versionEndIncluding": "1.10.1.25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:micco:unlha32.dll:*:*:*:*:*:*:*:*",
"matchCriteriaId": "39B766F3-F7DF-49EE-A97A-FC31DAC04AFC",
"versionEndIncluding": "2.67.1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "60366048-32FE-4081-A852-04319FD7A52C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Untrusted search path vulnerability in UNARJ32.DLL for Win32, LHMelting for Win32, and LMLzh32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier, LHMelting for Win32 Ver 1.65.3.6 and earlier, LMLzh32.DLL Ver 2.67.1.2 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
},
{
"lang": "es",
"value": "Vulnerabilidad de ruta de b\u00fasqueda no fiable en UNARJ32.DLL para Win32, LHMelting para Win32 y LMLzh32.DLL (UNARJ32.DLL para Win32, en versiones 1.10.1.25 y anteriores; LHMelting para Win32, en versiones 1.65.3.6 y anteriores y LMLzh32.DLL, en versiones 2.67.1.2 y anteriores) permite que un atacante obtenga privilegios mediante un DLL troyano en un directorio sin especificar."
}
],
"id": "CVE-2018-16190",
"lastModified": "2024-11-21T03:52:15.493",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-02-13T18:29:00.510",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/jp/JVN52168232/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_02.htm"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_04.htm"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_05.htm"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://micco.mars.jp/vul/2017/mhsvi20170515_03.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/jp/JVN52168232/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_02.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_04.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_05.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://micco.mars.jp/vul/2017/mhsvi20170515_03.htm"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-426"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-5912
Vulnerability from fkie_nvd - Published: 2019-02-13 18:29 - Updated: 2024-11-21 04:45
Severity ?
Summary
Untrusted search path vulnerability in the installer of UNARJ32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN83826673/index.html | Third Party Advisory | |
| vultures@jpcert.or.jp | http://micco.mars.jp/vul/2017/mhsvi20170515_01.htm | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN83826673/index.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://micco.mars.jp/vul/2017/mhsvi20170515_01.htm | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| micco | unarj32.dll | * | |
| microsoft | windows | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:micco:unarj32.dll:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8EFBC7F4-7258-4A75-9766-31A7891D3078",
"versionEndIncluding": "1.10.1.25",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "CAC3DC2D-88DE-4C33-A025-9980A333A4CB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Untrusted search path vulnerability in the installer of UNARJ32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
},
{
"lang": "es",
"value": "Una vulnerabilidad de tipo ruta de b\u00fasqueda no confiable en el instalador de UNARJ32.DLL(UNARJ32.DLL para Win32 en versiones 1.10.1.25 y anteriores) permite que un atacante consiga privilegios utilizando un archivo DLL troyano en un directorio no especificado."
}
],
"id": "CVE-2019-5912",
"lastModified": "2024-11-21T04:45:44.027",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-02-13T18:29:00.887",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/jp/JVN83826673/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_01.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/jp/JVN83826673/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_01.htm"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-426"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2019-5912 (GCVE-0-2019-5912)
Vulnerability from cvelistv5 – Published: 2019-02-13 18:00 – Updated: 2024-08-04 20:09
VLAI?
Summary
Untrusted search path vulnerability in the installer of UNARJ32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
Severity ?
No CVSS data available.
CWE
- Untrusted search path vulnerability
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Micco | The installer of UNARJ32.DLL |
Affected:
(UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T20:09:23.739Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_01.htm"
},
{
"name": "JVN#83826673",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN83826673/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "The installer of UNARJ32.DLL",
"vendor": "Micco",
"versions": [
{
"status": "affected",
"version": "(UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier)"
}
]
}
],
"datePublic": "2019-02-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Untrusted search path vulnerability in the installer of UNARJ32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Untrusted search path vulnerability",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-02-13T17:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_01.htm"
},
{
"name": "JVN#83826673",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN83826673/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2019-5912",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "The installer of UNARJ32.DLL",
"version": {
"version_data": [
{
"version_value": "(UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier)"
}
]
}
}
]
},
"vendor_name": "Micco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Untrusted search path vulnerability in the installer of UNARJ32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Untrusted search path vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://micco.mars.jp/vul/2017/mhsvi20170515_01.htm",
"refsource": "MISC",
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_01.htm"
},
{
"name": "JVN#83826673",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN83826673/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2019-5912",
"datePublished": "2019-02-13T18:00:00",
"dateReserved": "2019-01-10T00:00:00",
"dateUpdated": "2024-08-04T20:09:23.739Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-16190 (GCVE-0-2018-16190)
Vulnerability from cvelistv5 – Published: 2019-02-13 18:00 – Updated: 2024-08-05 10:17
VLAI?
Summary
Untrusted search path vulnerability in UNARJ32.DLL for Win32, LHMelting for Win32, and LMLzh32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier, LHMelting for Win32 Ver 1.65.3.6 and earlier, LMLzh32.DLL Ver 2.67.1.2 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
Severity ?
No CVSS data available.
CWE
- Untrusted search path vulnerability
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Micco | UNARJ32.DLL for Win32, LHMelting for Win32, and LMLzh32.DLL |
Affected:
(UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier, LHMelting for Win32 Ver 1.65.3.6 and earlier, LMLzh32.DLL Ver 2.67.1.2 and earlier)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T10:17:38.400Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#52168232",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN52168232/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_04.htm"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://micco.mars.jp/vul/2017/mhsvi20170515_03.htm"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_05.htm"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_02.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "UNARJ32.DLL for Win32, LHMelting for Win32, and LMLzh32.DLL",
"vendor": "Micco",
"versions": [
{
"status": "affected",
"version": "(UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier, LHMelting for Win32 Ver 1.65.3.6 and earlier, LMLzh32.DLL Ver 2.67.1.2 and earlier)"
}
]
}
],
"datePublic": "2019-02-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Untrusted search path vulnerability in UNARJ32.DLL for Win32, LHMelting for Win32, and LMLzh32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier, LHMelting for Win32 Ver 1.65.3.6 and earlier, LMLzh32.DLL Ver 2.67.1.2 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Untrusted search path vulnerability",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-02-13T17:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#52168232",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN52168232/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_04.htm"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://micco.mars.jp/vul/2017/mhsvi20170515_03.htm"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_05.htm"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_02.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2018-16190",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "UNARJ32.DLL for Win32, LHMelting for Win32, and LMLzh32.DLL",
"version": {
"version_data": [
{
"version_value": "(UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier, LHMelting for Win32 Ver 1.65.3.6 and earlier, LMLzh32.DLL Ver 2.67.1.2 and earlier)"
}
]
}
}
]
},
"vendor_name": "Micco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Untrusted search path vulnerability in UNARJ32.DLL for Win32, LHMelting for Win32, and LMLzh32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier, LHMelting for Win32 Ver 1.65.3.6 and earlier, LMLzh32.DLL Ver 2.67.1.2 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Untrusted search path vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#52168232",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN52168232/index.html"
},
{
"name": "http://micco.mars.jp/vul/2017/mhsvi20170515_04.htm",
"refsource": "MISC",
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_04.htm"
},
{
"name": "https://micco.mars.jp/vul/2017/mhsvi20170515_03.htm",
"refsource": "MISC",
"url": "https://micco.mars.jp/vul/2017/mhsvi20170515_03.htm"
},
{
"name": "http://micco.mars.jp/vul/2017/mhsvi20170515_05.htm",
"refsource": "MISC",
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_05.htm"
},
{
"name": "http://micco.mars.jp/vul/2017/mhsvi20170515_02.htm",
"refsource": "MISC",
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_02.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2018-16190",
"datePublished": "2019-02-13T18:00:00",
"dateReserved": "2018-08-30T00:00:00",
"dateUpdated": "2024-08-05T10:17:38.400Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-5912 (GCVE-0-2019-5912)
Vulnerability from nvd – Published: 2019-02-13 18:00 – Updated: 2024-08-04 20:09
VLAI?
Summary
Untrusted search path vulnerability in the installer of UNARJ32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
Severity ?
No CVSS data available.
CWE
- Untrusted search path vulnerability
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Micco | The installer of UNARJ32.DLL |
Affected:
(UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T20:09:23.739Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_01.htm"
},
{
"name": "JVN#83826673",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN83826673/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "The installer of UNARJ32.DLL",
"vendor": "Micco",
"versions": [
{
"status": "affected",
"version": "(UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier)"
}
]
}
],
"datePublic": "2019-02-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Untrusted search path vulnerability in the installer of UNARJ32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Untrusted search path vulnerability",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-02-13T17:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_01.htm"
},
{
"name": "JVN#83826673",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN83826673/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2019-5912",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "The installer of UNARJ32.DLL",
"version": {
"version_data": [
{
"version_value": "(UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier)"
}
]
}
}
]
},
"vendor_name": "Micco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Untrusted search path vulnerability in the installer of UNARJ32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Untrusted search path vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://micco.mars.jp/vul/2017/mhsvi20170515_01.htm",
"refsource": "MISC",
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_01.htm"
},
{
"name": "JVN#83826673",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN83826673/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2019-5912",
"datePublished": "2019-02-13T18:00:00",
"dateReserved": "2019-01-10T00:00:00",
"dateUpdated": "2024-08-04T20:09:23.739Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-16190 (GCVE-0-2018-16190)
Vulnerability from nvd – Published: 2019-02-13 18:00 – Updated: 2024-08-05 10:17
VLAI?
Summary
Untrusted search path vulnerability in UNARJ32.DLL for Win32, LHMelting for Win32, and LMLzh32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier, LHMelting for Win32 Ver 1.65.3.6 and earlier, LMLzh32.DLL Ver 2.67.1.2 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
Severity ?
No CVSS data available.
CWE
- Untrusted search path vulnerability
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Micco | UNARJ32.DLL for Win32, LHMelting for Win32, and LMLzh32.DLL |
Affected:
(UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier, LHMelting for Win32 Ver 1.65.3.6 and earlier, LMLzh32.DLL Ver 2.67.1.2 and earlier)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T10:17:38.400Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#52168232",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN52168232/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_04.htm"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://micco.mars.jp/vul/2017/mhsvi20170515_03.htm"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_05.htm"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_02.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "UNARJ32.DLL for Win32, LHMelting for Win32, and LMLzh32.DLL",
"vendor": "Micco",
"versions": [
{
"status": "affected",
"version": "(UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier, LHMelting for Win32 Ver 1.65.3.6 and earlier, LMLzh32.DLL Ver 2.67.1.2 and earlier)"
}
]
}
],
"datePublic": "2019-02-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Untrusted search path vulnerability in UNARJ32.DLL for Win32, LHMelting for Win32, and LMLzh32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier, LHMelting for Win32 Ver 1.65.3.6 and earlier, LMLzh32.DLL Ver 2.67.1.2 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Untrusted search path vulnerability",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-02-13T17:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#52168232",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN52168232/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_04.htm"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://micco.mars.jp/vul/2017/mhsvi20170515_03.htm"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_05.htm"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_02.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2018-16190",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "UNARJ32.DLL for Win32, LHMelting for Win32, and LMLzh32.DLL",
"version": {
"version_data": [
{
"version_value": "(UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier, LHMelting for Win32 Ver 1.65.3.6 and earlier, LMLzh32.DLL Ver 2.67.1.2 and earlier)"
}
]
}
}
]
},
"vendor_name": "Micco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Untrusted search path vulnerability in UNARJ32.DLL for Win32, LHMelting for Win32, and LMLzh32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier, LHMelting for Win32 Ver 1.65.3.6 and earlier, LMLzh32.DLL Ver 2.67.1.2 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Untrusted search path vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#52168232",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN52168232/index.html"
},
{
"name": "http://micco.mars.jp/vul/2017/mhsvi20170515_04.htm",
"refsource": "MISC",
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_04.htm"
},
{
"name": "https://micco.mars.jp/vul/2017/mhsvi20170515_03.htm",
"refsource": "MISC",
"url": "https://micco.mars.jp/vul/2017/mhsvi20170515_03.htm"
},
{
"name": "http://micco.mars.jp/vul/2017/mhsvi20170515_05.htm",
"refsource": "MISC",
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_05.htm"
},
{
"name": "http://micco.mars.jp/vul/2017/mhsvi20170515_02.htm",
"refsource": "MISC",
"url": "http://micco.mars.jp/vul/2017/mhsvi20170515_02.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2018-16190",
"datePublished": "2019-02-13T18:00:00",
"dateReserved": "2018-08-30T00:00:00",
"dateUpdated": "2024-08-05T10:17:38.400Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}