Show plain JSON{"id": "CVE-2016-4902", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}]}, "published": "2017-06-09T16:29:00.187", "references": [{"url": "http://www.securityfocus.com/bid/94087", "tags": ["Third Party Advisory", "VDB Entry"], "source": "vultures@jpcert.or.jp"}, {"url": "https://jvn.jp/en/jp/JVN91002412/index.html", "tags": ["Third Party Advisory", "VDB Entry"], "source": "vultures@jpcert.or.jp"}, {"url": "http://www.securityfocus.com/bid/94087", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://jvn.jp/en/jp/JVN91002412/index.html", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-426"}]}], "descriptions": [{"lang": "en", "value": "Untrusted search path vulnerability in The Public Certification Service for Individuals \"The JPKI user's software (for Windows 7 and later)\" Ver3.0.1 and earlier, The Public Certification Service for Individuals \"The JPKI user's software (for Windows Vista)\" Ver3.0.1 and earlier and The Public Certification Service for Individuals \"The JPKI user's software\" Ver2.6 and earlier allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory."}, {"lang": "es", "value": "Vulnerabilidad en la ruta de busqueda no confiable en The Public Certification Service for Individuals \"the JPKI user's software (para Windows 7 y posteriores\" en su versi\u00f3n 3.0.1 y anteriores, The Public Certification Service for Individuals \" The JPKI user's software (para windows Vista)\" en su versi\u00f3n 3.0.1 y anteriores y The Public Certification Service for Individuals \"The JPKI user's software \" en su versi\u00f3n 2.6 y anteriores permite a un atacante remoto la obtenci\u00f3n de privilegios mediante un troyano DLL en un directorio no espec\u00edfico."}], "lastModified": "2025-04-20T01:37:25.860", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:jpki:the_public_certification_service_for_individuals:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FAF6DA38-9883-45BF-80DE-68FD8269209A", "versionEndIncluding": "2.6"}, {"criteria": "cpe:2.3:a:jpki:the_public_certification_service_for_individuals_for_windows_7:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "899E2433-30DB-46BF-9D12-62C443CCD964", "versionEndIncluding": "3.0.1"}, {"criteria": "cpe:2.3:a:jpki:the_public_certification_service_for_individuals_for_windows_vista:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D0E17CF-8E23-4E27-B352-CDD5B8DF8DB9", "versionEndIncluding": "3.0.1"}], "operator": "OR"}]}], "sourceIdentifier": "vultures@jpcert.or.jp"}