{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2018-0598","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","assignerShortName":"jpcert","dateUpdated":"2024-08-05T03:28:11.157Z","dateReserved":"2017-11-27T00:00:00.000Z","datePublished":"2018-06-26T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2023-05-18T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Untrusted search path vulnerability in Self-extracting archive files created by IExpress bundled with Microsoft Windows allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."}],"affected":[{"vendor":"Microsoft","product":"Self-extracting archive files created by IExpress bundled with Microsoft Windows","versions":[{"version":"unspecified","status":"affected"}]}],"references":[{"url":"https://blogs.technet.microsoft.com/srd/2018/04/04/triaging-a-dll-planting-vulnerability/"},{"name":"JVN#72748502","tags":["third-party-advisory"],"url":"http://jvn.jp/en/jp/JVN72748502/index.html"},{"url":"https://msrc.microsoft.com/blog/2018/04/triaging-a-dll-planting-vulnerability/"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Untrusted search path vulnerability"}]}],"datePublic":"2018-06-26T00:00:00.000Z"},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T03:28:11.157Z"},"title":"CVE Program Container","references":[{"url":"https://blogs.technet.microsoft.com/srd/2018/04/04/triaging-a-dll-planting-vulnerability/","tags":["x_transferred"]},{"name":"JVN#72748502","tags":["third-party-advisory","x_transferred"],"url":"http://jvn.jp/en/jp/JVN72748502/index.html"},{"url":"https://msrc.microsoft.com/blog/2018/04/triaging-a-dll-planting-vulnerability/","tags":["x_transferred"]}]}]}}