All the vulnerabilites related to Digital Arts Inc. - i-FILTER
cve-2018-16180
Vulnerability from cvelistv5
Published
2019-01-09 22:00
Modified
2024-08-05 10:17
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability in i-FILTER Ver.9.50R05 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://jvn.jp/en/jp/JVN32155106/index.html | third-party-advisory, x_refsource_JVN | |
https://download.daj.co.jp/user/ifilter/V9/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Digital Arts Inc. | i-FILTER |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:37.625Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVN#32155106", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN32155106/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://download.daj.co.jp/user/ifilter/V9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "i-FILTER", "vendor": "Digital Arts Inc.", "versions": [ { "status": "affected", "version": "Ver.9.50R05 and earlier" } ] } ], "datePublic": "2019-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in i-FILTER Ver.9.50R05 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T21:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVN#32155106", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "https://jvn.jp/en/jp/JVN32155106/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://download.daj.co.jp/user/ifilter/V9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2018-16180", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "i-FILTER", "version": { "version_data": [ { "version_value": "Ver.9.50R05 and earlier" } ] } } ] }, "vendor_name": "Digital Arts Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in i-FILTER Ver.9.50R05 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "JVN#32155106", "refsource": "JVN", "url": "https://jvn.jp/en/jp/JVN32155106/index.html" }, { "name": "https://download.daj.co.jp/user/ifilter/V9/", "refsource": "MISC", "url": "https://download.daj.co.jp/user/ifilter/V9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2018-16180", "datePublished": "2019-01-09T22:00:00", "dateReserved": "2018-08-30T00:00:00", "dateUpdated": "2024-08-05T10:17:37.625Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16181
Vulnerability from cvelistv5
Published
2019-01-09 22:00
Modified
2024-08-05 10:17
Severity ?
EPSS score ?
Summary
HTTP header injection vulnerability in i-FILTER Ver.9.50R05 and earlier may allow remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks that may result in an arbitrary script injection or setting an arbitrary cookie values via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://jvn.jp/en/jp/JVN32155106/index.html | third-party-advisory, x_refsource_JVN | |
https://download.daj.co.jp/user/ifilter/V9/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Digital Arts Inc. | i-FILTER |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:38.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVN#32155106", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN32155106/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://download.daj.co.jp/user/ifilter/V9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "i-FILTER", "vendor": "Digital Arts Inc.", "versions": [ { "status": "affected", "version": "Ver.9.50R05 and earlier" } ] } ], "datePublic": "2019-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "HTTP header injection vulnerability in i-FILTER Ver.9.50R05 and earlier may allow remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks that may result in an arbitrary script injection or setting an arbitrary cookie values via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "HTTP header injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T21:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVN#32155106", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "https://jvn.jp/en/jp/JVN32155106/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://download.daj.co.jp/user/ifilter/V9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2018-16181", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "i-FILTER", "version": { "version_data": [ { "version_value": "Ver.9.50R05 and earlier" } ] } } ] }, "vendor_name": "Digital Arts Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HTTP header injection vulnerability in i-FILTER Ver.9.50R05 and earlier may allow remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks that may result in an arbitrary script injection or setting an arbitrary cookie values via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "HTTP header injection" } ] } ] }, "references": { "reference_data": [ { "name": "JVN#32155106", "refsource": "JVN", "url": "https://jvn.jp/en/jp/JVN32155106/index.html" }, { "name": "https://download.daj.co.jp/user/ifilter/V9/", "refsource": "MISC", "url": "https://download.daj.co.jp/user/ifilter/V9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2018-16181", "datePublished": "2019-01-09T22:00:00", "dateReserved": "2018-08-30T00:00:00", "dateUpdated": "2024-08-05T10:17:38.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
jvndb-2017-000223
Vulnerability from jvndb
Published
2017-09-29 13:54
Modified
2017-09-29 13:54
Severity ?
Summary
Install program and Installer of i-filter 6.0 may insecurely load Dynamic Link Libraries and invoke executable files
Details
i-filter 6.0 provided by Digital Arts Inc. is web filtering and parental control software. The install program is designed to download the installer via the internet and execute it. The i-filter 6.0 install program and installer contain the following vulnerabilities.
Eili Masami of Tachibana Lab. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Digital Arts Inc. | i-filter |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000223.html", "dc:date": "2017-09-29T13:54+09:00", "dcterms:issued": "2017-09-29T13:54+09:00", "dcterms:modified": "2017-09-29T13:54+09:00", "description": "i-filter 6.0 provided by Digital Arts Inc. is web filtering and parental control software. The install program is designed to download the installer via the internet and execute it. The i-filter 6.0 install program and installer contain the following vulnerabilities. \r\n\r\nEili Masami of Tachibana Lab. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000223.html", "sec:cpe": { "#text": "cpe:/a:daj:i-filter_installer", "@product": "i-filter", "@vendor": "Digital Arts Inc.", "@version": "2.2" }, "sec:cvss": [ { "@score": "6.8", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "@version": "2.0" }, { "@score": "7.8", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "@version": "3.0" } ], "sec:identifier": "JVNDB-2017-000223", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN75929834/index.html", "@id": "JVN#75929834", "@source": "JVN" }, { "#text": "https://jvn.jp/en/ta/JVNTA91240916/index.html", "@id": "JVNTA#91240916", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10858", "@id": "CVE-2017-10858", "@source": "CVE" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10859", "@id": "CVE-2017-10859", "@source": "CVE" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10860", "@id": "CVE-2017-10860", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2017-10858", "@id": "CVE-2017-10858", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2017-10859", "@id": "CVE-2017-10859", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2017-10860", "@id": "CVE-2017-10860", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "Install program and Installer of i-filter 6.0 may insecurely load Dynamic Link Libraries and invoke executable files" }
jvndb-2018-000129
Vulnerability from jvndb
Published
2018-12-07 14:30
Modified
2019-08-27 11:45
Severity ?
Summary
Multiple vulnerabilities in i-FILTER
Details
i-FILTER provided by Digital Arts Inc. contains multiple vulnerabilities listed below.
* Cross-site scripting (CWE-79) - CVE-2018-16180
* HTTP header injection (CWE-113) - CVE-2018-16181
Keigo Yamazaki of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN32155106/index.html | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16180 | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16181 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2018-16180 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2018-16181 | |
Improper Input Validation(CWE-20) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html | |
Cross-site Scripting(CWE-79) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
Digital Arts Inc. | i-FILTER |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000129.html", "dc:date": "2019-08-27T11:45+09:00", "dcterms:issued": "2018-12-07T14:30+09:00", "dcterms:modified": "2019-08-27T11:45+09:00", "description": "i-FILTER provided by Digital Arts Inc. contains multiple vulnerabilities listed below.\r\n* Cross-site scripting (CWE-79) - CVE-2018-16180\r\n* HTTP header injection (CWE-113) - CVE-2018-16181\r\n\r\nKeigo Yamazaki of LAC Co., Ltd. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000129.html", "sec:cpe": { "#text": "cpe:/a:daj:i-filter", "@product": "i-FILTER", "@vendor": "Digital Arts Inc.", "@version": "2.2" }, "sec:cvss": [ { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "6.1", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2018-000129", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN32155106/index.html", "@id": "JVN#32155106", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16180", "@id": "CVE-2018-16180", "@source": "CVE" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16181", "@id": "CVE-2018-16181", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2018-16180", "@id": "CVE-2018-16180", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2018-16181", "@id": "CVE-2018-16181", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-20", "@title": "Improper Input Validation(CWE-20)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "Multiple vulnerabilities in i-FILTER" }
jvndb-2022-000008
Vulnerability from jvndb
Published
2022-03-04 14:12
Modified
2022-03-04 14:12
Severity ?
Summary
i-FILTER vulnerable to improper check for certificate revocation
Details
i-FILTER provided by Digital Arts Inc. is vulnerable to improper check for certificate revocation (CWE-299) .
Digital Arts Inc. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Digital Arts Inc. coordinated under the Information Security Early Warning Partnership.
References
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000008.html", "dc:date": "2022-03-04T14:12+09:00", "dcterms:issued": "2022-03-04T14:12+09:00", "dcterms:modified": "2022-03-04T14:12+09:00", "description": "i-FILTER provided by Digital Arts Inc. is vulnerable to improper check for certificate revocation (CWE-299) .\r\n\r\nDigital Arts Inc. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Digital Arts Inc. coordinated under the Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000008.html", "sec:cpe": [ { "#text": "cpe:/a:daj:i-filter", "@product": "i-FILTER", "@vendor": "Digital Arts Inc.", "@version": "2.2" }, { "#text": "cpe:/a:daj:i-filter_browser_%26_cloud_multiagent", "@product": "i-FILTER Browser \u0026 Cloud MultiAgent for Windows", "@vendor": "Digital Arts Inc.", "@version": "2.2" } ], "sec:cvss": [ { "@score": "4.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "@version": "2.0" }, { "@score": "4.8", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2022-000008", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN33214411/index.html", "@id": "JVN#33214411", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-21170", "@id": "CVE-2022-21170", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-21170", "@id": "CVE-2022-21170", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "i-FILTER vulnerable to improper check for certificate revocation" }