Vulnerabilites related to justsystems - hanako
Vulnerability from fkie_nvd
Published
2013-03-01 05:40
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in JustSystems Ichitaro 2006 and 2007, Ichitaro Government 2006 and 2007, Ichitaro Portable with oreplug, Hanako 2006 through 2013, Hanako Police, Hanako Police 3, and Hanako Police 2010 allows remote attackers to execute arbitrary code via a crafted file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
justsystems | hanako | 2006 | |
justsystems | hanako | 2007 | |
justsystems | hanako | 2008 | |
justsystems | hanako | 2009 | |
justsystems | hanako | 2010 | |
justsystems | hanako | 2011 | |
justsystems | hanako | 2012 | |
justsystems | hanako | 2013 | |
justsystems | hanako_police | - | |
justsystems | hanako_police | 2010 | |
justsystems | hanako_police3 | - | |
justsystems | ichitaro | 2006 | |
justsystems | ichitaro | 2006 | |
justsystems | ichitaro | 2007 | |
justsystems | ichitaro | 2007 | |
justsystems | ichitaro_portable | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:justsystems:hanako:2006:*:*:*:*:*:*:*", "matchCriteriaId": "B99AFDF7-D3AE-4565-9AE2-85642724DC00", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:hanako:2007:*:*:*:*:*:*:*", "matchCriteriaId": "934D152B-FD10-418D-8C08-28BD45442B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:hanako:2008:*:*:*:*:*:*:*", "matchCriteriaId": "BAAA97A6-E654-4882-AFA5-6D5B404672D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:hanako:2009:*:*:*:*:*:*:*", "matchCriteriaId": "5BE91EAC-860C-4E31-8DCE-4F7092B12250", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:hanako:2010:*:*:*:*:*:*:*", "matchCriteriaId": "0BCBC102-5EBD-4427-B741-40DF5EEB1AEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:hanako:2011:*:*:*:*:*:*:*", "matchCriteriaId": "2F1615FC-6D1D-4333-85E3-3C77F23EC2E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:hanako:2012:*:*:*:*:*:*:*", "matchCriteriaId": "D1D9903B-4F6F-4D25-A5EB-3D4C5791B2F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:hanako:2013:*:*:*:*:*:*:*", "matchCriteriaId": "289D3E55-483B-407F-A1C9-5DCF21E14F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:hanako_police:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F075EDD-D4AE-48A1-AD62-D1F4E9FD2E65", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:hanako_police:2010:*:*:*:*:*:*:*", "matchCriteriaId": "361E77E7-DD90-4E3D-BFA7-3C48C7DED979", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:hanako_police3:-:*:*:*:*:*:*:*", "matchCriteriaId": "66B9E254-5474-4615-BDBA-A9A8B2D009F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:ichitaro:2006:*:*:*:*:*:*:*", "matchCriteriaId": "9E7E7611-56FC-4379-99FE-8D42046FA9C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:ichitaro:2006:-:government:*:*:*:*:*", "matchCriteriaId": "AA38365F-0FB9-4570-8A38-4FCC9AADA267", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:ichitaro:2007:*:*:*:*:*:*:*", "matchCriteriaId": "A749FA56-6DE2-48A4-902C-6EB7E6575BA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:ichitaro:2007:-:government:*:*:*:*:*", "matchCriteriaId": "6A5C721C-CA01-4C6A-AC7C-C07FC3A333D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:ichitaro_portable:-:oreplug:*:*:*:*:*:*", "matchCriteriaId": "9DD0D5AC-5B8D-44FF-9E83-52F79775883C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in JustSystems Ichitaro 2006 and 2007, Ichitaro Government 2006 and 2007, Ichitaro Portable with oreplug, Hanako 2006 through 2013, Hanako Police, Hanako Police 3, and Hanako Police 2010 allows remote attackers to execute arbitrary code via a crafted file." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en JustSystems Ichitaro v2006 y 2007, el Gobierno Ichitaro 2006 y 2007, Ichitaro port\u00e1til con oreplug, Hanako 2006 hasta 2013, Hanako Polic\u00eda, Polic\u00eda Hanako 3 y Hanako Police 2010 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo manipulado." } ], "id": "CVE-2013-0707", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-03-01T05:40:17.647", "references": [ { "source": "vultures@jpcert.or.jp", "url": "http://jvn.jp/en/jp/JVN16817324/index.html" }, { "source": "vultures@jpcert.or.jp", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000015" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.justsystems.com/jp/info/js13001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN16817324/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.justsystems.com/jp/info/js13001.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-28 16:59
Modified
2025-04-20 01:37
Severity ?
Summary
Untrusted search path vulnerability in Hanako 2017, Hanako 2016, Hanako 2015, Hanako Pro 3, JUST Office 3 [Standard], JUST Office 3 [Eco Print Package], JUST Office 3 & Tri-De DataProtect Package, JUST Government 3, JUST Jump Class 2, JUST Frontier 3, JUST School 6 Premium, Hanako Police 5, JUST Police 3, Hanako 2017 trial version allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN54268888/index.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | https://www.justsystems.com/jp/info/js17002.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN54268888/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.justsystems.com/jp/info/js17002.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
justsystems | hanako | 2015 | |
justsystems | hanako | 2016 | |
justsystems | hanako | 2017 | |
justsystems | hanako | 2017 | |
justsystems | hanako_police | 5 | |
justsystems | hanako_pro | 3 | |
justsystems | just_frontier | 3 | |
justsystems | just_government | 3 | |
justsystems | just_jump_class | 2 | |
justsystems | just_office | 3 | |
justsystems | just_office | 3 | |
justsystems | just_office | 3 | |
justsystems | just_police | 3 | |
justsystems | just_school | 6 | |
justsystems | just_school | 6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:justsystems:hanako:2015:*:*:*:*:*:*:*", "matchCriteriaId": "D7048C6C-0CE8-4642-A5C4-2D27E8B9CEA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:hanako:2016:*:*:*:*:*:*:*", "matchCriteriaId": "AB3FF218-7C81-44D2-9A17-D83205685973", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:hanako:2017:*:*:*:*:*:*:*", "matchCriteriaId": "776ED90F-323C-4A61-888A-43A9C562C64A", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:hanako:2017:*:*:*:trial_version:*:*:*", "matchCriteriaId": "57895402-E3E8-49A2-8FA6-8A1D15E8E1C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:hanako_police:5:*:*:*:*:*:*:*", "matchCriteriaId": "D59D8562-98D0-41B2-B558-596C89C9D522", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:hanako_pro:3:*:*:*:*:*:*:*", "matchCriteriaId": "16485AD9-56B0-4BFB-993C-7B94F325412D", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:just_frontier:3:*:*:*:*:*:*:*", "matchCriteriaId": "A99D14B3-56D2-470A-A9B3-B7503EBDC0F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:just_government:3:*:*:*:*:*:*:*", "matchCriteriaId": "B20409BA-5D02-423B-B9D4-B912D9148E72", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:just_jump_class:2:*:*:*:*:*:*:*", "matchCriteriaId": "F3FE275B-F4CD-48E1-9063-A70BBD02327F", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:just_office:3:*:*:*:eco_print_pack:*:*:*", "matchCriteriaId": "0CF5451A-6B63-4057-BCC4-9AB43ED32384", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:just_office:3:*:*:*:standard:*:*:*", "matchCriteriaId": "BCE3335A-F74F-46AC-8376-3E5E2D4A90FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:just_office:3:*:*:*:tri-de_dataprotect_pack:*:*:*", "matchCriteriaId": "B0B3FDCA-63D0-47BA-8B99-6565857123E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:just_police:3:*:*:*:*:*:*:*", "matchCriteriaId": "B9F17734-FC13-4E08-B350-C6C0CDCD17D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:just_school:6:*:*:*:*:*:*:*", "matchCriteriaId": "1874BEA7-E29B-42AD-B111-9EBAEBCAB39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:justsystems:just_school:6:*:*:*:premium:*:*:*", "matchCriteriaId": "7434D5C9-DC0B-4E76-A9DC-D8AA1F50A4F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in Hanako 2017, Hanako 2016, Hanako 2015, Hanako Pro 3, JUST Office 3 [Standard], JUST Office 3 [Eco Print Package], JUST Office 3 \u0026 Tri-De DataProtect Package, JUST Government 3, JUST Jump Class 2, JUST Frontier 3, JUST School 6 Premium, Hanako Police 5, JUST Police 3, Hanako 2017 trial version allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory." }, { "lang": "es", "value": "Una vulnerabilidad de ruta (path) de b\u00fasqueda no confiable en Hanako 2017, Hanako 2016, Hanako 2015, Hanako Pro 3, JUST Office 3 [Est\u00e1ndar], Just Office 3 [Eco Print Package], JUST Office 3 \u0026 Tri-De DataProtect Package, JUST Government 3, JUST Jump Class 2, JUST Frontier 3, JUST School 6 Premium, Hanako Police 5, JUST Police 3, Hanako 2017 versi\u00f3n de prueba, permite a los atacantes remotos alcanzar privilegios por medio de un archivo DLL de tipo caballo de troya en un directorio no especificado." } ], "id": "CVE-2017-2154", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-28T16:59:02.090", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/en/jp/JVN54268888/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.justsystems.com/jp/info/js17002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/en/jp/JVN54268888/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.justsystems.com/jp/info/js17002.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2013-0707 (GCVE-0-2013-0707)
Vulnerability from cvelistv5
Published
2013-03-01 02:00
Modified
2024-09-16 19:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in JustSystems Ichitaro 2006 and 2007, Ichitaro Government 2006 and 2007, Ichitaro Portable with oreplug, Hanako 2006 through 2013, Hanako Police, Hanako Police 3, and Hanako Police 2010 allows remote attackers to execute arbitrary code via a crafted file.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVNDB-2013-000015", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000015" }, { "name": "JVN#16817324", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN16817324/index.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.justsystems.com/jp/info/js13001.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in JustSystems Ichitaro 2006 and 2007, Ichitaro Government 2006 and 2007, Ichitaro Portable with oreplug, Hanako 2006 through 2013, Hanako Police, Hanako Police 3, and Hanako Police 2010 allows remote attackers to execute arbitrary code via a crafted file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-01T02:00:00Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVNDB-2013-000015", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000015" }, { "name": "JVN#16817324", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN16817324/index.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.justsystems.com/jp/info/js13001.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2013-0707", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in JustSystems Ichitaro 2006 and 2007, Ichitaro Government 2006 and 2007, Ichitaro Portable with oreplug, Hanako 2006 through 2013, Hanako Police, Hanako Police 3, and Hanako Police 2010 allows remote attackers to execute arbitrary code via a crafted file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "JVNDB-2013-000015", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000015" }, { "name": "JVN#16817324", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN16817324/index.html" }, { "name": "http://www.justsystems.com/jp/info/js13001.html", "refsource": "CONFIRM", "url": "http://www.justsystems.com/jp/info/js13001.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2013-0707", "datePublished": "2013-03-01T02:00:00Z", "dateReserved": "2012-12-28T00:00:00Z", "dateUpdated": "2024-09-16T19:35:50.586Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-2154 (GCVE-0-2017-2154)
Vulnerability from cvelistv5
Published
2017-04-28 16:00
Modified
2024-08-05 13:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Untrusted search path vulnerability in Hanako 2017, Hanako 2016, Hanako 2015, Hanako Pro 3, JUST Office 3 [Standard], JUST Office 3 [Eco Print Package], JUST Office 3 & Tri-De DataProtect Package, JUST Government 3, JUST Jump Class 2, JUST Frontier 3, JUST School 6 Premium, Hanako Police 5, JUST Police 3, Hanako 2017 trial version allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:48:03.525Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVN#54268888", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN54268888/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.justsystems.com/jp/info/js17002.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in Hanako 2017, Hanako 2016, Hanako 2015, Hanako Pro 3, JUST Office 3 [Standard], JUST Office 3 [Eco Print Package], JUST Office 3 \u0026 Tri-De DataProtect Package, JUST Government 3, JUST Jump Class 2, JUST Frontier 3, JUST School 6 Premium, Hanako Police 5, JUST Police 3, Hanako 2017 trial version allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-05-11T14:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVN#54268888", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "https://jvn.jp/en/jp/JVN54268888/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.justsystems.com/jp/info/js17002.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2017-2154", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path vulnerability in Hanako 2017, Hanako 2016, Hanako 2015, Hanako Pro 3, JUST Office 3 [Standard], JUST Office 3 [Eco Print Package], JUST Office 3 \u0026 Tri-De DataProtect Package, JUST Government 3, JUST Jump Class 2, JUST Frontier 3, JUST School 6 Premium, Hanako Police 5, JUST Police 3, Hanako 2017 trial version allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "JVN#54268888", "refsource": "JVN", "url": "https://jvn.jp/en/jp/JVN54268888/index.html" }, { "name": "https://www.justsystems.com/jp/info/js17002.html", "refsource": "MISC", "url": "https://www.justsystems.com/jp/info/js17002.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2017-2154", "datePublished": "2017-04-28T16:00:00", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-08-05T13:48:03.525Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }