{"id":"CVE-2022-42496","details":"OS command injection vulnerability in Nako3edit, editor component of nadesiko3 (PC Version) v3.3.74 and earlier allows a remote attacker to obtain appkey of the product and execute an arbitrary OS command on the product.","aliases":["GHSA-7249-8x22-4rg4"],"modified":"2026-04-12T05:07:30.992786Z","published":"2022-12-05T04:15:10.130Z","references":[{"type":"ADVISORY","url":"https://jvn.jp/en/jp/JVN56968681/index.html"},{"type":"REPORT","url":"https://github.com/kujirahand/nadesiko3/issues/1347"},{"type":"FIX","url":"https://github.com/kujirahand/nadesiko3/issues/1325"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/kujirahand/nadesiko3","events":[{"introduced":"0"},{"last_affected":"cc6c78db4683b314feb7f6e675b0be4ea3ed2794"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"3.3.74"}],"cpe":"cpe:2.3:a:kujirahand:nadesiko3:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["0.1.7","0.1.8","3.0.19","3.0.20","3.0.21","3.0.24","3.0.29","3.0.32","3.0.35","3.0.36","3.0.37","3.0.38","3.0.39","3.0.41","3.0.45","3.0.46","3.0.48","3.0.50","3.0.51","3.0.52","3.0.53","3.0.54","3.0.55","3.0.57","3.0.59","3.0.60","3.0.61","3.0.64","3.0.65","3.0.68","3.0.69","3.0.70","3.0.71","3.0.711","3.0.72","3.1.0","3.1.10","3.1.11","3.1.12","3.1.16","3.1.17","3.1.18","3.1.19","3.1.2","3.1.20","3.1.21","3.1.23","3.1.24","3.1.3","3.1.4","3.1.5","3.1.8","3.2.1","3.2.11","3.2.12","3.2.13","3.2.14","3.2.15","3.2.2","3.2.20","3.2.23","3.2.24","3.2.25","3.2.27","3.2.28","3.2.3","3.2.30","3.2.31","3.2.32","3.2.33","3.2.34","3.2.37","3.2.4","3.2.44","3.2.46","3.2.5","3.2.51","3.2.6","3.2.7","3.2.9","3.3.10","3.3.17","3.3.27","3.3.3","3.3.49","3.3.51","3.3.52","3.3.57","3.3.59","3.3.6","3.3.61","3.3.62","3.3.64","3.3.67","3.3.69","3.3.70","3.3.71","3.3.73","3.3.74"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-42496.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}