{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T14:58:24.349","vulnerabilities":[{"cve":{"id":"CVE-2016-4902","sourceIdentifier":"vultures@jpcert.or.jp","published":"2017-06-09T16:29:00.187","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Untrusted search path vulnerability in The Public Certification Service for Individuals \"The JPKI user's software (for Windows 7 and later)\" Ver3.0.1 and earlier, The Public Certification Service for Individuals \"The JPKI user's software (for Windows Vista)\" Ver3.0.1 and earlier and The Public Certification Service for Individuals \"The JPKI user's software\" Ver2.6 and earlier allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory."},{"lang":"es","value":"Vulnerabilidad en la ruta de busqueda no confiable en The Public Certification Service for Individuals \"the JPKI user's software (para Windows 7 y posteriores\" en su versión 3.0.1 y anteriores, The Public Certification Service for Individuals \" The JPKI user's software (para windows Vista)\" en su versión 3.0.1 y anteriores y The Public Certification Service for Individuals \"The JPKI user's software \" en su versión 2.6 y anteriores permite a un atacante remoto la obtención de privilegios mediante un troyano DLL en un directorio no específico."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-426"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jpki:the_public_certification_service_for_individuals:*:*:*:*:*:*:*:*","versionEndIncluding":"2.6","matchCriteriaId":"FAF6DA38-9883-45BF-80DE-68FD8269209A"},{"vulnerable":true,"criteria":"cpe:2.3:a:jpki:the_public_certification_service_for_individuals_for_windows_7:*:*:*:*:*:*:*:*","versionEndIncluding":"3.0.1","matchCriteriaId":"899E2433-30DB-46BF-9D12-62C443CCD964"},{"vulnerable":true,"criteria":"cpe:2.3:a:jpki:the_public_certification_service_for_individuals_for_windows_vista:*:*:*:*:*:*:*:*","versionEndIncluding":"3.0.1","matchCriteriaId":"1D0E17CF-8E23-4E27-B352-CDD5B8DF8DB9"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/94087","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://jvn.jp/en/jp/JVN91002412/index.html","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/94087","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://jvn.jp/en/jp/JVN91002412/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}}]}