All the vulnerabilites related to hitachi - electronic_form_workflow_-_standard_set
cve-2007-4564
Vulnerability from cvelistv5
Published
2007-08-28 01:00
Modified
2024-08-07 15:01
Severity ?
Summary
Cosminexus Manager in Cosminexus Application Server 07-00 and later might assign the wrong user's group permissions to logical user server processes, which allows local users to gain privileges.
References
http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.htmlx_refsource_CONFIRM
http://www.securityfocus.com/bid/25434vdb-entry, x_refsource_BID
http://osvdb.org/37855vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/26589third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/36245vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:01:09.517Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
          },
          {
            "name": "25434",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25434"
          },
          {
            "name": "37855",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37855"
          },
          {
            "name": "26589",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26589"
          },
          {
            "name": "cosminexus-group-security-bypass(36245)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cosminexus Manager in Cosminexus Application Server 07-00 and later might assign the wrong user\u0027s group permissions to logical user server processes, which allows local users to gain privileges."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
        },
        {
          "name": "25434",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25434"
        },
        {
          "name": "37855",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37855"
        },
        {
          "name": "26589",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26589"
        },
        {
          "name": "cosminexus-group-security-bypass(36245)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4564",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cosminexus Manager in Cosminexus Application Server 07-00 and later might assign the wrong user\u0027s group permissions to logical user server processes, which allows local users to gain privileges."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html",
              "refsource": "CONFIRM",
              "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
            },
            {
              "name": "25434",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25434"
            },
            {
              "name": "37855",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37855"
            },
            {
              "name": "26589",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26589"
            },
            {
              "name": "cosminexus-group-security-bypass(36245)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4564",
    "datePublished": "2007-08-28T01:00:00",
    "dateReserved": "2007-08-27T00:00:00",
    "dateUpdated": "2024-08-07T15:01:09.517Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-4563
Vulnerability from cvelistv5
Published
2007-08-28 01:00
Modified
2024-08-07 15:01
Severity ?
Summary
Cosminexus Manager in Cosminexus Application Server 06-50 and later might assign the wrong user's group permissions to logical J2EE server processes, which allows local users to gain privileges.
References
http://osvdb.org/37854vdb-entry, x_refsource_OSVDB
http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.htmlx_refsource_CONFIRM
http://www.securityfocus.com/bid/25434vdb-entry, x_refsource_BID
http://secunia.com/advisories/26589third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/36245vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:01:09.889Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "37854",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37854"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
          },
          {
            "name": "25434",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25434"
          },
          {
            "name": "26589",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26589"
          },
          {
            "name": "cosminexus-group-security-bypass(36245)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cosminexus Manager in Cosminexus Application Server 06-50 and later might assign the wrong user\u0027s group permissions to logical J2EE server processes, which allows local users to gain privileges."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "37854",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37854"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
        },
        {
          "name": "25434",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25434"
        },
        {
          "name": "26589",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26589"
        },
        {
          "name": "cosminexus-group-security-bypass(36245)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4563",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cosminexus Manager in Cosminexus Application Server 06-50 and later might assign the wrong user\u0027s group permissions to logical J2EE server processes, which allows local users to gain privileges."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "37854",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37854"
            },
            {
              "name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html",
              "refsource": "CONFIRM",
              "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
            },
            {
              "name": "25434",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25434"
            },
            {
              "name": "26589",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26589"
            },
            {
              "name": "cosminexus-group-security-bypass(36245)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4563",
    "datePublished": "2007-08-28T01:00:00",
    "dateReserved": "2007-08-27T00:00:00",
    "dateUpdated": "2024-08-07T15:01:09.889Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2007-08-28 01:17
Modified
2024-11-21 00:35
Severity ?
Summary
Cosminexus Manager in Cosminexus Application Server 07-00 and later might assign the wrong user's group permissions to logical user server processes, which allows local users to gain privileges.
Impacted products
Vendor Product Version
hitachi cosminexus_application_server_enterprise 06_50
hitachi cosminexus_application_server_enterprise 06_50
hitachi cosminexus_application_server_enterprise 06_50
hitachi cosminexus_application_server_enterprise 06_50
hitachi cosminexus_application_server_enterprise 06_50
hitachi cosminexus_application_server_enterprise 06_50_b
hitachi cosminexus_application_server_enterprise 06_50_c
hitachi cosminexus_application_server_enterprise 06_50_c_1
hitachi cosminexus_application_server_enterprise 06_50_c_1
hitachi cosminexus_application_server_enterprise 06_50_e_1
hitachi cosminexus_application_server_enterprise 06_50_f
hitachi cosminexus_application_server_enterprise 06_51
hitachi cosminexus_application_server_enterprise 06_51_b_1
hitachi cosminexus_application_server_enterprise 06_51_c
hitachi cosminexus_application_server_standard 06_50
hitachi cosminexus_application_server_standard 06_50
hitachi cosminexus_application_server_standard 06_50
hitachi cosminexus_application_server_standard 06_50
hitachi cosminexus_application_server_standard 06_50
hitachi cosminexus_application_server_standard 06_50_b
hitachi cosminexus_application_server_standard 06_50_c
hitachi cosminexus_application_server_standard 06_50_c_1
hitachi cosminexus_application_server_standard 06_50_c_1
hitachi cosminexus_application_server_standard 06_50_e_1
hitachi cosminexus_application_server_standard 06_50_f
hitachi cosminexus_application_server_standard 06_51
hitachi cosminexus_application_server_standard 06_51
hitachi cosminexus_application_server_standard 06_51_b_1
hitachi cosminexus_application_server_standard 06_51_c
hitachi electronic_form_workflow_-_standard_set 07_00
hitachi electronic_form_workflow_-_standard_set 07_00_b
hitachi electronic_form_workflow_-professional_library_set 07_00
hitachi electronic_form_workflow_-professional_library_set 07_00_b
hitachi ucosminexus_application_server_enterprise 06_70
hitachi ucosminexus_application_server_enterprise 06_70
hitachi ucosminexus_application_server_enterprise 06_70_a
hitachi ucosminexus_application_server_enterprise 06_70_a
hitachi ucosminexus_application_server_enterprise 06_70_b
hitachi ucosminexus_application_server_enterprise 06_70_b
hitachi ucosminexus_application_server_enterprise 06_70_b
hitachi ucosminexus_application_server_enterprise 06_70_b
hitachi ucosminexus_application_server_enterprise 06_70_b_1
hitachi ucosminexus_application_server_enterprise 06_70_d
hitachi ucosminexus_application_server_enterprise 06_70_g
hitachi ucosminexus_application_server_enterprise 06_71
hitachi ucosminexus_application_server_enterprise 06_71_b
hitachi ucosminexus_application_server_enterprise 06_71_b
hitachi ucosminexus_application_server_enterprise 06_71_c
hitachi ucosminexus_application_server_enterprise 06_72_1
hitachi ucosminexus_application_server_enterprise 06_72_b
hitachi ucosminexus_application_server_enterprise 06_72_b
hitachi ucosminexus_application_server_enterprise 06_72_g
hitachi ucosminexus_application_server_enterprise 07-00-01
hitachi ucosminexus_application_server_enterprise 07_00
hitachi ucosminexus_application_server_enterprise 07_00
hitachi ucosminexus_application_server_enterprise 07_00
hitachi ucosminexus_application_server_enterprise 07_00
hitachi ucosminexus_application_server_enterprise 07_00_12
hitachi ucosminexus_application_server_enterprise 07_10
hitachi ucosminexus_application_server_enterprise 07_10
hitachi ucosminexus_application_server_enterprise 07_10
hitachi ucosminexus_application_server_enterprise 07_10
hitachi ucosminexus_application_server_enterprise 07_10
hitachi ucosminexus_application_server_enterprise 07_10_1
hitachi ucosminexus_application_server_enterprise 07_10_06
hitachi ucosminexus_application_server_enterprise 07_10_08
hitachi ucosminexus_application_server_standard 06_70
hitachi ucosminexus_application_server_standard 06_70_a
hitachi ucosminexus_application_server_standard 06_70_a
hitachi ucosminexus_application_server_standard 06_70_b
hitachi ucosminexus_application_server_standard 06_70_b
hitachi ucosminexus_application_server_standard 06_70_b
hitachi ucosminexus_application_server_standard 06_70_b
hitachi ucosminexus_application_server_standard 06_70_b_1
hitachi ucosminexus_application_server_standard 06_70_c
hitachi ucosminexus_application_server_standard 06_70_d
hitachi ucosminexus_application_server_standard 06_71
hitachi ucosminexus_application_server_standard 06_71_b
hitachi ucosminexus_application_server_standard 06_72_1
hitachi ucosminexus_application_server_standard 06_72_b_1
hitachi ucosminexus_application_server_standard 06_72_c
hitachi ucosminexus_application_server_standard 06_72_d
hitachi ucosminexus_application_server_standard 06_72_g
hitachi ucosminexus_application_server_standard 07_00
hitachi ucosminexus_application_server_standard 07_00
hitachi ucosminexus_application_server_standard 07_00
hitachi ucosminexus_application_server_standard 07_00
hitachi ucosminexus_application_server_standard 07_00_1
hitachi ucosminexus_application_server_standard 07_10
hitachi ucosminexus_application_server_standard 07_10
hitachi ucosminexus_application_server_standard 07_10
hitachi ucosminexus_application_server_standard 07_10
hitachi ucosminexus_service_platform 07_00
hitachi ucosminexus_service_platform 07_10
hitachi ucosminexus_service_platform 07_10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:aix:*:*:*:*:*",
              "matchCriteriaId": "F7AA2F96-CF8B-47ED-87EA-75DF8D90E3AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "236D9E91-37DE-4D43-90A4-765800D76DBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:linux:*:*:*:*:*",
              "matchCriteriaId": "49F54B21-D9CF-41B7-88F9-C70261925B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "5D1C24CE-3B20-44B5-BE21-2FAD1CCC9EEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "C9A0DB59-010E-4945-A6B1-694269838299",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_b:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "90219723-B2D7-4E35-94E0-B12FF452AA99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_c:*:linux:*:*:*:*:*",
              "matchCriteriaId": "BE770156-FDF2-4818-A7F8-9062D7132CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_c_1:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "74E73757-B69E-461D-B0BC-06FA6D321E5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_c_1:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "13E1CC0C-4322-4F78-B24D-638AF7D7CD70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_e_1:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "662B20FF-8BB3-431E-A1DD-251A587B399E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_f:*:aix:*:*:*:*:*",
              "matchCriteriaId": "995EA2B9-DC6E-4393-BAFC-9A5550DE653A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_51:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "8C494CF0-A0AF-4435-B273-0A0754985640",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_51_b_1:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "2B4131DA-3B12-459E-AE98-978FB496270C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_51_c:*:linux:*:*:*:*:*",
              "matchCriteriaId": "1A137E25-6B8A-4861-8DEA-F19DCBDFD955",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:aix:*:*:*:*:*",
              "matchCriteriaId": "6F823A2E-4D86-4C9B-ABDA-252B72FA0113",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "F4511C24-ADD2-4DB6-A21C-25AEE1BCD9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "FA466BD3-AD09-44FB-99AE-4D5F883C32F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:linux:*:*:*:*:*",
              "matchCriteriaId": "D4BEEF1B-27CE-476C-BDF7-1922D94D8BF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "AE9F2873-D1B8-40C5-BBE7-85D8875FAABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_b:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "79422655-ECE2-41DD-8319-747B0DDF22CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_c:*:linux:*:*:*:*:*",
              "matchCriteriaId": "E5D936F5-A4BA-4303-8185-0E3B9DD21E98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_c_1:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "8D272DC2-7A28-478D-B6F2-B0A6825A4E37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_c_1:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "1AE1BC52-7D66-4156-A965-3392D0F25F97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_e_1:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "58D341DC-1558-42AD-A328-6ABE3DD4142E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_f:*:aix:*:*:*:*:*",
              "matchCriteriaId": "3BAB8404-E909-4DDD-9D1E-145FCDAB9C3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_51:*:linux:*:*:*:*:*",
              "matchCriteriaId": "456D38AB-D5B4-47C4-AA93-B82CD97CEBAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_51:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "A5A2201A-F2EF-4324-9D48-D11908E12261",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_51_b_1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "310697C7-2238-492A-BAD5-D9F7C3A568F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_51_c:*:linux:*:*:*:*:*",
              "matchCriteriaId": "A5B8211D-EA3C-49BA-A37B-A6BFBBA00F8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_-_standard_set:07_00:*:linux:*:*:*:*:*",
              "matchCriteriaId": "7E107823-9EF7-4716-9C75-1BB0E3432CA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_-_standard_set:07_00_b:*:linux:*:*:*:*:*",
              "matchCriteriaId": "226CB6F1-1E01-40E5-97D9-5FD93EF74B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_-professional_library_set:07_00:*:linux:*:*:*:*:*",
              "matchCriteriaId": "1D153999-0B49-4C8F-B949-3FDBCD67906C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_-professional_library_set:07_00_b:*:linux:*:*:*:*:*",
              "matchCriteriaId": "455233D1-131E-4384-857C-8165974DCA48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70:*:aix:*:*:*:*:*",
              "matchCriteriaId": "18967E4A-3D79-49AD-97B1-EB4328949729",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "7E7A6668-41D5-4AF3-9A20-EEC00781F68C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_a:*:aix:*:*:*:*:*",
              "matchCriteriaId": "D9DFC8FF-7618-42A6-A8DB-4D7A75DE5C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_a:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "6E676236-8986-45F8-B720-84A5156B6DDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b:*:aix:*:*:*:*:*",
              "matchCriteriaId": "43BA2D74-289E-4201-8F4B-78E8E64CA358",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "51A48F4D-6E53-4CD0-BEBA-8882393A7A73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "B55FE085-3CCD-4DF9-A2BD-F22FC4EF940A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "2D3E1E8D-D75F-49AB-B086-58EF334A084F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b_1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "982584F4-A3EA-4B71-B084-8A80927092CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_d:*:aix:*:*:*:*:*",
              "matchCriteriaId": "F60ED027-FD72-47F8-9230-DAEF1B218B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_g:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "6B7B56A8-E705-4B9D-8763-EF281F875802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_71:*:linux:*:*:*:*:*",
              "matchCriteriaId": "D4B082D2-0E8C-4442-9E92-7867C0D3F1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_71_b:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "7B06B22B-5DE0-4AD3-9056-80FE5D02EC13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_71_b:*:linux:*:*:*:*:*",
              "matchCriteriaId": "19B0E862-F36A-4419-B8AC-BB3B0B28A3BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_71_c:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "B7E09F38-1B66-404B-9E22-A1B2D1464AE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_72_1:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "26D40FE4-7956-4D87-9DA2-99E6F62B6525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_72_b:*:linux:*:*:*:*:*",
              "matchCriteriaId": "F16F6336-42F5-4941-B700-73DAEDE83E7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_72_b:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "191D1364-D6F1-4778-B765-7AF0D18439BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_72_g:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "D363EB0D-F881-45ED-A3E0-1148BC648889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07-00-01:*:linux:*:*:*:*:*",
              "matchCriteriaId": "45A8B520-1678-47D2-8D1B-AB6BA818DBE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:aix:*:*:*:*:*",
              "matchCriteriaId": "F6FE70C8-749C-40A0-B087-14FDB6097CD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "2FE5D346-61E9-489B-9529-AA559E111DCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:linux:*:*:*:*:*",
              "matchCriteriaId": "E0E60F8E-0116-4215-8E52-1A663ECB834B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "4FAC97A3-04E7-425C-AD8F-B75838E975FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_12:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "A5934C16-A21C-4275-89CA-B1287F8BAFE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:aix:*:*:*:*:*",
              "matchCriteriaId": "48E93BDB-BB6D-4D1C-B3DD-3518E045F753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "82648C13-1D91-4C4C-A17B-64BCC5A24147",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "12382EE9-4D34-4724-9023-5F6C48944F4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux:*:*:*:*:*",
              "matchCriteriaId": "8453ECF8-9419-4AD3-9541-B362FA58E4E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "B0316DD8-E2EB-4953-96BC-894B87D6C815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_1:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "01D417A7-FB2E-4813-AEF3-9F136AB8106B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_06:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "ED59C48E-BA08-4E29-BB01-9F22CC20D7C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_08:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "FE697045-8D42-43E0-8C98-7961E21E2B32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "673C833D-A7F8-4941-B7F9-AC17E67FB717",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_a:*:aix:*:*:*:*:*",
              "matchCriteriaId": "E9E62188-DCA4-4749-A451-9A12E9F53B5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_a:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "569AC136-11EE-47A6-8150-F983768AE58B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b:*:aix:*:*:*:*:*",
              "matchCriteriaId": "65CA666D-E597-45C2-9DBF-DD728B5480AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "5DEB6A9B-A029-4F70-95E7-16DD33D736E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "5F8C5DC3-CF27-4AED-B97B-03DFCD743746",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "39E1498C-6267-4266-B7E6-A1E70CF25A03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b_1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "CAA364D2-B6AB-4BEE-BBC6-D9C9BED57CC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_c:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "A68736B4-66E3-45E4-9B3A-222E0F4463BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_d:*:aix:*:*:*:*:*",
              "matchCriteriaId": "A62CCAA4-8156-4E05-8A96-81558F478C59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_71:*:linux:*:*:*:*:*",
              "matchCriteriaId": "45D28BE6-DA8F-433B-84FA-35965A7C02A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_71_b:*:linux:*:*:*:*:*",
              "matchCriteriaId": "D0DF3D57-8E23-4293-883A-BDF555CA7048",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_1:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "8C8743DB-CCA4-4519-847E-7FDA353026F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_b_1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "9BBE9283-5E06-4F2E-AA14-4B536C20AC61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_c:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "386B6C72-C5EF-47A0-B6F5-E0B50C042FEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_d:*:aix:*:*:*:*:*",
              "matchCriteriaId": "13509F94-3953-4E87-BBB5-02FA5EACC024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_g:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "B4B51A86-7C91-454D-8A71-6E652ACE948C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:aix:*:*:*:*:*",
              "matchCriteriaId": "1F7055A9-7A8A-4EB0-B202-220825B3FBEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "4919D1DA-37C9-4C18-8F5B-C0BC6F6915D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:linux:*:*:*:*:*",
              "matchCriteriaId": "20ED59C6-CD06-4FE1-A484-A7E642F33AFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "58266C54-32FE-4E5D-94A8-4291A87208EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "725FA408-39B0-4A14-946C-6BDAB6E0FE4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "930CA326-7B3E-4C46-8DD1-CB17CD0CC5FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "6511A0F9-6B01-49E1-8693-B6EC044DDB3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux:*:*:*:*:*",
              "matchCriteriaId": "0E5A504F-C4B1-44EC-A7AC-8690CF925B0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "84BE463B-0A3E-477C-B912-966625887D65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00:*:linux:*:*:*:*:*",
              "matchCriteriaId": "0CADDEE7-D529-4644-9A5F-6235AD072CCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:aix:*:*:*:*:*",
              "matchCriteriaId": "1D1DAE56-DEA3-45C3-AFD7-1C40F6C62CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:linux:*:*:*:*:*",
              "matchCriteriaId": "CED6A3B7-F58D-47BE-81DB-59AC0DFC7F41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cosminexus Manager in Cosminexus Application Server 07-00 and later might assign the wrong user\u0027s group permissions to logical user server processes, which allows local users to gain privileges."
    },
    {
      "lang": "es",
      "value": "Cosminexus Manager en Cosminexus Application Server 07-00 y posteriores podr\u00edan asignar permisos de grupos de usuarios de forma incorrecta a procesos del servidor de l\u00f3gica de usuario, el cual permite a usuarios locales ganar privilegios."
    }
  ],
  "id": "CVE-2007-4564",
  "lastModified": "2024-11-21T00:35:54.183",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-08-28T01:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/37855"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26589"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/25434"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/37855"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26589"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/25434"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-08-28 01:17
Modified
2024-11-21 00:35
Severity ?
Summary
Cosminexus Manager in Cosminexus Application Server 06-50 and later might assign the wrong user's group permissions to logical J2EE server processes, which allows local users to gain privileges.
Impacted products
Vendor Product Version
hitachi cosminexus_application_server_enterprise 06_50
hitachi cosminexus_application_server_enterprise 06_50
hitachi cosminexus_application_server_enterprise 06_50
hitachi cosminexus_application_server_enterprise 06_50
hitachi cosminexus_application_server_enterprise 06_50
hitachi cosminexus_application_server_enterprise 06_50_b
hitachi cosminexus_application_server_enterprise 06_50_c
hitachi cosminexus_application_server_enterprise 06_50_c_1
hitachi cosminexus_application_server_enterprise 06_50_c_1
hitachi cosminexus_application_server_enterprise 06_50_e_1
hitachi cosminexus_application_server_enterprise 06_50_f
hitachi cosminexus_application_server_enterprise 06_51
hitachi cosminexus_application_server_enterprise 06_51_b_1
hitachi cosminexus_application_server_enterprise 06_51_c
hitachi cosminexus_application_server_standard 06_50
hitachi cosminexus_application_server_standard 06_50
hitachi cosminexus_application_server_standard 06_50
hitachi cosminexus_application_server_standard 06_50
hitachi cosminexus_application_server_standard 06_50
hitachi cosminexus_application_server_standard 06_50_b
hitachi cosminexus_application_server_standard 06_50_c
hitachi cosminexus_application_server_standard 06_50_c_1
hitachi cosminexus_application_server_standard 06_50_c_1
hitachi cosminexus_application_server_standard 06_50_e_1
hitachi cosminexus_application_server_standard 06_50_f
hitachi cosminexus_application_server_standard 06_51
hitachi cosminexus_application_server_standard 06_51
hitachi cosminexus_application_server_standard 06_51_b_1
hitachi cosminexus_application_server_standard 06_51_c
hitachi electronic_form_workflow_-_standard_set 07_00
hitachi electronic_form_workflow_-_standard_set 07_00_b
hitachi electronic_form_workflow_-professional_library_set 07_00
hitachi electronic_form_workflow_-professional_library_set 07_00_b
hitachi ucosminexus_application_server_enterprise 06_70
hitachi ucosminexus_application_server_enterprise 06_70
hitachi ucosminexus_application_server_enterprise 06_70_a
hitachi ucosminexus_application_server_enterprise 06_70_a
hitachi ucosminexus_application_server_enterprise 06_70_b
hitachi ucosminexus_application_server_enterprise 06_70_b
hitachi ucosminexus_application_server_enterprise 06_70_b
hitachi ucosminexus_application_server_enterprise 06_70_b
hitachi ucosminexus_application_server_enterprise 06_70_b_1
hitachi ucosminexus_application_server_enterprise 06_70_d
hitachi ucosminexus_application_server_enterprise 06_70_g
hitachi ucosminexus_application_server_enterprise 06_71
hitachi ucosminexus_application_server_enterprise 06_71_b
hitachi ucosminexus_application_server_enterprise 06_71_b
hitachi ucosminexus_application_server_enterprise 06_71_c
hitachi ucosminexus_application_server_enterprise 06_72_1
hitachi ucosminexus_application_server_enterprise 06_72_b
hitachi ucosminexus_application_server_enterprise 06_72_b
hitachi ucosminexus_application_server_enterprise 06_72_g
hitachi ucosminexus_application_server_enterprise 07-00-01
hitachi ucosminexus_application_server_enterprise 07_00
hitachi ucosminexus_application_server_enterprise 07_00
hitachi ucosminexus_application_server_enterprise 07_00
hitachi ucosminexus_application_server_enterprise 07_00
hitachi ucosminexus_application_server_enterprise 07_00_12
hitachi ucosminexus_application_server_enterprise 07_10
hitachi ucosminexus_application_server_enterprise 07_10
hitachi ucosminexus_application_server_enterprise 07_10
hitachi ucosminexus_application_server_enterprise 07_10
hitachi ucosminexus_application_server_enterprise 07_10
hitachi ucosminexus_application_server_enterprise 07_10_1
hitachi ucosminexus_application_server_enterprise 07_10_06
hitachi ucosminexus_application_server_enterprise 07_10_08
hitachi ucosminexus_application_server_standard 06_70
hitachi ucosminexus_application_server_standard 06_70_a
hitachi ucosminexus_application_server_standard 06_70_a
hitachi ucosminexus_application_server_standard 06_70_b
hitachi ucosminexus_application_server_standard 06_70_b
hitachi ucosminexus_application_server_standard 06_70_b
hitachi ucosminexus_application_server_standard 06_70_b
hitachi ucosminexus_application_server_standard 06_70_b_1
hitachi ucosminexus_application_server_standard 06_70_c
hitachi ucosminexus_application_server_standard 06_70_d
hitachi ucosminexus_application_server_standard 06_71
hitachi ucosminexus_application_server_standard 06_71_b
hitachi ucosminexus_application_server_standard 06_72_1
hitachi ucosminexus_application_server_standard 06_72_b_1
hitachi ucosminexus_application_server_standard 06_72_c
hitachi ucosminexus_application_server_standard 06_72_d
hitachi ucosminexus_application_server_standard 06_72_g
hitachi ucosminexus_application_server_standard 07_00
hitachi ucosminexus_application_server_standard 07_00
hitachi ucosminexus_application_server_standard 07_00
hitachi ucosminexus_application_server_standard 07_00
hitachi ucosminexus_application_server_standard 07_00_1
hitachi ucosminexus_application_server_standard 07_10
hitachi ucosminexus_application_server_standard 07_10
hitachi ucosminexus_application_server_standard 07_10
hitachi ucosminexus_application_server_standard 07_10
hitachi ucosminexus_service_platform 07_00
hitachi ucosminexus_service_platform 07_10
hitachi ucosminexus_service_platform 07_10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:aix:*:*:*:*:*",
              "matchCriteriaId": "F7AA2F96-CF8B-47ED-87EA-75DF8D90E3AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "236D9E91-37DE-4D43-90A4-765800D76DBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:linux:*:*:*:*:*",
              "matchCriteriaId": "49F54B21-D9CF-41B7-88F9-C70261925B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "5D1C24CE-3B20-44B5-BE21-2FAD1CCC9EEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "C9A0DB59-010E-4945-A6B1-694269838299",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_b:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "90219723-B2D7-4E35-94E0-B12FF452AA99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_c:*:linux:*:*:*:*:*",
              "matchCriteriaId": "BE770156-FDF2-4818-A7F8-9062D7132CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_c_1:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "74E73757-B69E-461D-B0BC-06FA6D321E5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_c_1:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "13E1CC0C-4322-4F78-B24D-638AF7D7CD70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_e_1:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "662B20FF-8BB3-431E-A1DD-251A587B399E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_f:*:aix:*:*:*:*:*",
              "matchCriteriaId": "995EA2B9-DC6E-4393-BAFC-9A5550DE653A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_51:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "8C494CF0-A0AF-4435-B273-0A0754985640",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_51_b_1:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "2B4131DA-3B12-459E-AE98-978FB496270C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_51_c:*:linux:*:*:*:*:*",
              "matchCriteriaId": "1A137E25-6B8A-4861-8DEA-F19DCBDFD955",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:aix:*:*:*:*:*",
              "matchCriteriaId": "6F823A2E-4D86-4C9B-ABDA-252B72FA0113",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "F4511C24-ADD2-4DB6-A21C-25AEE1BCD9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "FA466BD3-AD09-44FB-99AE-4D5F883C32F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:linux:*:*:*:*:*",
              "matchCriteriaId": "D4BEEF1B-27CE-476C-BDF7-1922D94D8BF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "AE9F2873-D1B8-40C5-BBE7-85D8875FAABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_b:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "79422655-ECE2-41DD-8319-747B0DDF22CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_c:*:linux:*:*:*:*:*",
              "matchCriteriaId": "E5D936F5-A4BA-4303-8185-0E3B9DD21E98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_c_1:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "8D272DC2-7A28-478D-B6F2-B0A6825A4E37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_c_1:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "1AE1BC52-7D66-4156-A965-3392D0F25F97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_e_1:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "58D341DC-1558-42AD-A328-6ABE3DD4142E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_f:*:aix:*:*:*:*:*",
              "matchCriteriaId": "3BAB8404-E909-4DDD-9D1E-145FCDAB9C3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_51:*:linux:*:*:*:*:*",
              "matchCriteriaId": "456D38AB-D5B4-47C4-AA93-B82CD97CEBAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_51:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "A5A2201A-F2EF-4324-9D48-D11908E12261",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_51_b_1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "310697C7-2238-492A-BAD5-D9F7C3A568F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_51_c:*:linux:*:*:*:*:*",
              "matchCriteriaId": "A5B8211D-EA3C-49BA-A37B-A6BFBBA00F8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_-_standard_set:07_00:*:linux:*:*:*:*:*",
              "matchCriteriaId": "7E107823-9EF7-4716-9C75-1BB0E3432CA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_-_standard_set:07_00_b:*:linux:*:*:*:*:*",
              "matchCriteriaId": "226CB6F1-1E01-40E5-97D9-5FD93EF74B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_-professional_library_set:07_00:*:linux:*:*:*:*:*",
              "matchCriteriaId": "1D153999-0B49-4C8F-B949-3FDBCD67906C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_-professional_library_set:07_00_b:*:linux:*:*:*:*:*",
              "matchCriteriaId": "455233D1-131E-4384-857C-8165974DCA48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70:*:aix:*:*:*:*:*",
              "matchCriteriaId": "18967E4A-3D79-49AD-97B1-EB4328949729",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "7E7A6668-41D5-4AF3-9A20-EEC00781F68C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_a:*:aix:*:*:*:*:*",
              "matchCriteriaId": "D9DFC8FF-7618-42A6-A8DB-4D7A75DE5C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_a:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "6E676236-8986-45F8-B720-84A5156B6DDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b:*:aix:*:*:*:*:*",
              "matchCriteriaId": "43BA2D74-289E-4201-8F4B-78E8E64CA358",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "51A48F4D-6E53-4CD0-BEBA-8882393A7A73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "B55FE085-3CCD-4DF9-A2BD-F22FC4EF940A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "2D3E1E8D-D75F-49AB-B086-58EF334A084F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b_1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "982584F4-A3EA-4B71-B084-8A80927092CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_d:*:aix:*:*:*:*:*",
              "matchCriteriaId": "F60ED027-FD72-47F8-9230-DAEF1B218B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_g:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "6B7B56A8-E705-4B9D-8763-EF281F875802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_71:*:linux:*:*:*:*:*",
              "matchCriteriaId": "D4B082D2-0E8C-4442-9E92-7867C0D3F1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_71_b:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "7B06B22B-5DE0-4AD3-9056-80FE5D02EC13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_71_b:*:linux:*:*:*:*:*",
              "matchCriteriaId": "19B0E862-F36A-4419-B8AC-BB3B0B28A3BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_71_c:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "B7E09F38-1B66-404B-9E22-A1B2D1464AE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_72_1:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "26D40FE4-7956-4D87-9DA2-99E6F62B6525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_72_b:*:linux:*:*:*:*:*",
              "matchCriteriaId": "F16F6336-42F5-4941-B700-73DAEDE83E7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_72_b:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "191D1364-D6F1-4778-B765-7AF0D18439BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_72_g:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "D363EB0D-F881-45ED-A3E0-1148BC648889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07-00-01:*:linux:*:*:*:*:*",
              "matchCriteriaId": "45A8B520-1678-47D2-8D1B-AB6BA818DBE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:aix:*:*:*:*:*",
              "matchCriteriaId": "F6FE70C8-749C-40A0-B087-14FDB6097CD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "2FE5D346-61E9-489B-9529-AA559E111DCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:linux:*:*:*:*:*",
              "matchCriteriaId": "E0E60F8E-0116-4215-8E52-1A663ECB834B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "4FAC97A3-04E7-425C-AD8F-B75838E975FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_12:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "A5934C16-A21C-4275-89CA-B1287F8BAFE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:aix:*:*:*:*:*",
              "matchCriteriaId": "48E93BDB-BB6D-4D1C-B3DD-3518E045F753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "82648C13-1D91-4C4C-A17B-64BCC5A24147",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "12382EE9-4D34-4724-9023-5F6C48944F4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux:*:*:*:*:*",
              "matchCriteriaId": "8453ECF8-9419-4AD3-9541-B362FA58E4E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "B0316DD8-E2EB-4953-96BC-894B87D6C815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_1:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "01D417A7-FB2E-4813-AEF3-9F136AB8106B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_06:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "ED59C48E-BA08-4E29-BB01-9F22CC20D7C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_08:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "FE697045-8D42-43E0-8C98-7961E21E2B32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "673C833D-A7F8-4941-B7F9-AC17E67FB717",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_a:*:aix:*:*:*:*:*",
              "matchCriteriaId": "E9E62188-DCA4-4749-A451-9A12E9F53B5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_a:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "569AC136-11EE-47A6-8150-F983768AE58B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b:*:aix:*:*:*:*:*",
              "matchCriteriaId": "65CA666D-E597-45C2-9DBF-DD728B5480AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "5DEB6A9B-A029-4F70-95E7-16DD33D736E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "5F8C5DC3-CF27-4AED-B97B-03DFCD743746",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "39E1498C-6267-4266-B7E6-A1E70CF25A03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b_1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "CAA364D2-B6AB-4BEE-BBC6-D9C9BED57CC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_c:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "A68736B4-66E3-45E4-9B3A-222E0F4463BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_d:*:aix:*:*:*:*:*",
              "matchCriteriaId": "A62CCAA4-8156-4E05-8A96-81558F478C59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_71:*:linux:*:*:*:*:*",
              "matchCriteriaId": "45D28BE6-DA8F-433B-84FA-35965A7C02A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_71_b:*:linux:*:*:*:*:*",
              "matchCriteriaId": "D0DF3D57-8E23-4293-883A-BDF555CA7048",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_1:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "8C8743DB-CCA4-4519-847E-7FDA353026F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_b_1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "9BBE9283-5E06-4F2E-AA14-4B536C20AC61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_c:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "386B6C72-C5EF-47A0-B6F5-E0B50C042FEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_d:*:aix:*:*:*:*:*",
              "matchCriteriaId": "13509F94-3953-4E87-BBB5-02FA5EACC024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_g:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "B4B51A86-7C91-454D-8A71-6E652ACE948C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:aix:*:*:*:*:*",
              "matchCriteriaId": "1F7055A9-7A8A-4EB0-B202-220825B3FBEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "4919D1DA-37C9-4C18-8F5B-C0BC6F6915D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:linux:*:*:*:*:*",
              "matchCriteriaId": "20ED59C6-CD06-4FE1-A484-A7E642F33AFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "58266C54-32FE-4E5D-94A8-4291A87208EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "725FA408-39B0-4A14-946C-6BDAB6E0FE4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux:*:*:*:*:*",
              "matchCriteriaId": "930CA326-7B3E-4C46-8DD1-CB17CD0CC5FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux_ipf:*:*:*:*:*",
              "matchCriteriaId": "6511A0F9-6B01-49E1-8693-B6EC044DDB3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux:*:*:*:*:*",
              "matchCriteriaId": "0E5A504F-C4B1-44EC-A7AC-8690CF925B0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux_ipf:*:*:*:*:*",
              "matchCriteriaId": "84BE463B-0A3E-477C-B912-966625887D65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00:*:linux:*:*:*:*:*",
              "matchCriteriaId": "0CADDEE7-D529-4644-9A5F-6235AD072CCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:aix:*:*:*:*:*",
              "matchCriteriaId": "1D1DAE56-DEA3-45C3-AFD7-1C40F6C62CA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:linux:*:*:*:*:*",
              "matchCriteriaId": "CED6A3B7-F58D-47BE-81DB-59AC0DFC7F41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cosminexus Manager in Cosminexus Application Server 06-50 and later might assign the wrong user\u0027s group permissions to logical J2EE server processes, which allows local users to gain privileges."
    },
    {
      "lang": "es",
      "value": "Cosminexus Manager en Cosminexus Application Server 06-50 y posteriores podr\u00edan asignar los permisos de grupos de usuario erroneamente a los procesos del servidor l\u00f3gico J2EE, el cual permite a usuarios locales ganar privilegios."
    }
  ],
  "id": "CVE-2007-4563",
  "lastModified": "2024-11-21T00:35:54.013",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-08-28T01:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/37854"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26589"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/25434"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/37854"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26589"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/25434"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}