{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T14:32:29.731","vulnerabilities":[{"cve":{"id":"CVE-2018-16190","sourceIdentifier":"vultures@jpcert.or.jp","published":"2019-02-13T18:29:00.510","lastModified":"2024-11-21T03:52:15.493","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Untrusted search path vulnerability in UNARJ32.DLL for Win32, LHMelting for Win32, and LMLzh32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier, LHMelting for Win32 Ver 1.65.3.6 and earlier, LMLzh32.DLL Ver 2.67.1.2 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."},{"lang":"es","value":"Vulnerabilidad de ruta de búsqueda no fiable en UNARJ32.DLL para Win32, LHMelting para Win32 y LMLzh32.DLL (UNARJ32.DLL para Win32, en versiones 1.10.1.25 y anteriores; LHMelting para Win32, en versiones 1.65.3.6 y anteriores y LMLzh32.DLL, en versiones 2.67.1.2 y anteriores) permite que un atacante obtenga privilegios mediante un DLL troyano en un directorio sin especificar."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-426"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:micco:lhmelting:*:*:*:*:*:*:*:*","versionEndIncluding":"1.65.3.6","matchCriteriaId":"93DE5C2D-86DA-47AA-8B48-B6491A837C94"},{"vulnerable":true,"criteria":"cpe:2.3:a:micco:lmlzh32.dll:*:*:*:*:*:*:*:*","versionEndIncluding":"2.67.1.2","matchCriteriaId":"3B6C1772-34C1-4359-922B-AD3CD5851CB5"},{"vulnerable":true,"criteria":"cpe:2.3:a:micco:unarj32.dll:*:*:*:*:*:*:*:*","versionEndIncluding":"1.10.1.25","matchCriteriaId":"8EFBC7F4-7258-4A75-9766-31A7891D3078"},{"vulnerable":true,"criteria":"cpe:2.3:a:micco:unlha32.dll:*:*:*:*:*:*:*:*","versionEndIncluding":"2.67.1.2","matchCriteriaId":"39B766F3-F7DF-49EE-A97A-FC31DAC04AFC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*","matchCriteriaId":"60366048-32FE-4081-A852-04319FD7A52C"}]}]}],"references":[{"url":"http://jvn.jp/en/jp/JVN52168232/index.html","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]},{"url":"http://micco.mars.jp/vul/2017/mhsvi20170515_02.htm","source":"vultures@jpcert.or.jp","tags":["Patch","Vendor Advisory"]},{"url":"http://micco.mars.jp/vul/2017/mhsvi20170515_04.htm","source":"vultures@jpcert.or.jp","tags":["Patch","Vendor Advisory"]},{"url":"http://micco.mars.jp/vul/2017/mhsvi20170515_05.htm","source":"vultures@jpcert.or.jp","tags":["Patch","Vendor Advisory"]},{"url":"https://micco.mars.jp/vul/2017/mhsvi20170515_03.htm","source":"vultures@jpcert.or.jp","tags":["Patch","Vendor Advisory"]},{"url":"http://jvn.jp/en/jp/JVN52168232/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://micco.mars.jp/vul/2017/mhsvi20170515_02.htm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://micco.mars.jp/vul/2017/mhsvi20170515_04.htm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://micco.mars.jp/vul/2017/mhsvi20170515_05.htm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://micco.mars.jp/vul/2017/mhsvi20170515_03.htm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}