Refine your search

2 vulnerabilities found for by WAM!NET Japan K.K.

CVE-2016-7844 (GCVE-0-2016-7844)
Vulnerability from cvelistv5
Published
2017-08-02 16:00
Modified
2024-08-06 02:04
Severity ?
CWE
  • OS Command Injection
Summary
GigaCC OFFICE ver.2.3 and earlier allows remote attackers to execute arbitrary OS commands via specially crafted mail template.
Impacted products
Vendor Product Version
WAM!NET Japan K.K. GigaCC OFFICE Version: ver.2.3 and earlier
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:04:56.137Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://asp.gigacc.com/user/publicurl/view.do%3Bjsessionid=28438FE401A764B7CEDB3664AB2AC67C.ap04?job=view\u0026direct=true\u0026TI=9l1sf6jfp0bafkv9bh2e5fs43k\u0026ID=9qbnmp2qetc5u9vc8crqbl804s"
          },
          {
            "name": "95680",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/95680"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU91417143/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "GigaCC OFFICE",
          "vendor": "WAM!NET Japan K.K.",
          "versions": [
            {
              "status": "affected",
              "version": "ver.2.3 and earlier"
            }
          ]
        }
      ],
      "datePublic": "2017-08-02T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "GigaCC OFFICE ver.2.3 and earlier allows remote attackers to execute arbitrary OS commands via specially crafted mail template."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "OS Command Injection",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-03T09:57:01.000Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://asp.gigacc.com/user/publicurl/view.do%3Bjsessionid=28438FE401A764B7CEDB3664AB2AC67C.ap04?job=view\u0026direct=true\u0026TI=9l1sf6jfp0bafkv9bh2e5fs43k\u0026ID=9qbnmp2qetc5u9vc8crqbl804s"
        },
        {
          "name": "95680",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/95680"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/vu/JVNVU91417143/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2016-7844",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "GigaCC OFFICE",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "ver.2.3 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "WAM!NET Japan K.K."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "GigaCC OFFICE ver.2.3 and earlier allows remote attackers to execute arbitrary OS commands via specially crafted mail template."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "OS Command Injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://asp.gigacc.com/user/publicurl/view.do;jsessionid=28438FE401A764B7CEDB3664AB2AC67C.ap04?job=view\u0026direct=true\u0026TI=9l1sf6jfp0bafkv9bh2e5fs43k\u0026ID=9qbnmp2qetc5u9vc8crqbl804s",
              "refsource": "MISC",
              "url": "https://asp.gigacc.com/user/publicurl/view.do;jsessionid=28438FE401A764B7CEDB3664AB2AC67C.ap04?job=view\u0026direct=true\u0026TI=9l1sf6jfp0bafkv9bh2e5fs43k\u0026ID=9qbnmp2qetc5u9vc8crqbl804s"
            },
            {
              "name": "95680",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/95680"
            },
            {
              "name": "https://jvn.jp/en/vu/JVNVU91417143/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/vu/JVNVU91417143/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2016-7844",
    "datePublished": "2017-08-02T16:00:00.000Z",
    "dateReserved": "2016-09-09T00:00:00.000Z",
    "dateUpdated": "2024-08-06T02:04:56.137Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-7845 (GCVE-0-2016-7845)
Vulnerability from cvelistv5
Published
2017-08-02 16:00
Modified
2024-08-06 02:04
Severity ?
CWE
  • Unrestricted Upload of File with Dangerous Type
Summary
GigaCC OFFICE ver.2.3 and earlier allows remote attackers to upload arbitrary files as a user profile image, which may be exploited for unauthorized file sharing.
Impacted products
Vendor Product Version
WAM!NET Japan K.K. GigaCC OFFICE Version: ver.2.3 and earlier
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:04:56.047Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://asp.gigacc.com/user/publicurl/view.do%3Bjsessionid=28438FE401A764B7CEDB3664AB2AC67C.ap04?job=view\u0026direct=true\u0026TI=9l1sf6jfp0bafkv9bh2e5fs43k\u0026ID=9qbnmp2qetc5u9vc8crqbl804s"
          },
          {
            "name": "95680",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/95680"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU91417143/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "GigaCC OFFICE",
          "vendor": "WAM!NET Japan K.K.",
          "versions": [
            {
              "status": "affected",
              "version": "ver.2.3 and earlier"
            }
          ]
        }
      ],
      "datePublic": "2017-08-02T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "GigaCC OFFICE ver.2.3 and earlier allows remote attackers to upload arbitrary files as a user profile image, which may be exploited for unauthorized file sharing."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Unrestricted Upload of File with Dangerous Type",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-03T09:57:01.000Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://asp.gigacc.com/user/publicurl/view.do%3Bjsessionid=28438FE401A764B7CEDB3664AB2AC67C.ap04?job=view\u0026direct=true\u0026TI=9l1sf6jfp0bafkv9bh2e5fs43k\u0026ID=9qbnmp2qetc5u9vc8crqbl804s"
        },
        {
          "name": "95680",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/95680"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/vu/JVNVU91417143/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2016-7845",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "GigaCC OFFICE",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "ver.2.3 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "WAM!NET Japan K.K."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "GigaCC OFFICE ver.2.3 and earlier allows remote attackers to upload arbitrary files as a user profile image, which may be exploited for unauthorized file sharing."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Unrestricted Upload of File with Dangerous Type"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://asp.gigacc.com/user/publicurl/view.do;jsessionid=28438FE401A764B7CEDB3664AB2AC67C.ap04?job=view\u0026direct=true\u0026TI=9l1sf6jfp0bafkv9bh2e5fs43k\u0026ID=9qbnmp2qetc5u9vc8crqbl804s",
              "refsource": "MISC",
              "url": "https://asp.gigacc.com/user/publicurl/view.do;jsessionid=28438FE401A764B7CEDB3664AB2AC67C.ap04?job=view\u0026direct=true\u0026TI=9l1sf6jfp0bafkv9bh2e5fs43k\u0026ID=9qbnmp2qetc5u9vc8crqbl804s"
            },
            {
              "name": "95680",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/95680"
            },
            {
              "name": "https://jvn.jp/en/vu/JVNVU91417143/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/vu/JVNVU91417143/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2016-7845",
    "datePublished": "2017-08-02T16:00:00.000Z",
    "dateReserved": "2016-09-09T00:00:00.000Z",
    "dateUpdated": "2024-08-06T02:04:56.047Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}