Search criteria
39 vulnerabilities found for ucosminexus_service_platform by hitachi
FKIE_CVE-2009-4776
Vulnerability from fkie_nvd - Published: 2010-04-21 14:30 - Updated: 2025-04-11 00:51
Severity ?
Summary
Buffer overflow in Hitachi Cosminexus V4 through V8, Processing Kit for XML, and Developer's Kit for Java, as used in products such as uCosminexus, Electronic Form Workflow, Groupmax, and IBM XL C/C++ Enterprise Edition 7 and 8, allows remote attackers to have an unknown impact via vectors related to the use of GIF image processing APIs by a Java application, and a different issue from CVE-2007-3794.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus\\/opentp1_web_web_front-endset:02-70:*:*:*:*:*:*:*",
"matchCriteriaId": "5D30EBF7-14BC-459C-92FA-190C6175FE1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus\\/opentp1_web_web_front-endset:02-70-\\/a:*:*:*:*:*:*:*",
"matchCriteriaId": "3A745542-F2A2-41D7-ADAA-4131F3827714",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-70:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "2CB68D89-278F-487B-8AB2-579159EB3E78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-70:-:standard:*:*:*:*:*",
"matchCriteriaId": "6E9D5C04-BEF5-4025-81BA-64AFAFDC6355",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-70-\\/a:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "686AC2A6-AF78-413F-9479-DBCB26BF9E20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-70-\\/a:-:standard:*:*:*:*:*",
"matchCriteriaId": "3E6E239F-9470-4BA7-A44F-5D01BC22EDF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-70-\\/e:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "EDAE5CB8-45FC-4F71-A0D6-2E8785DB87DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-70-\\/e:-:standard:*:*:*:*:*",
"matchCriteriaId": "D7EF08BC-FF97-4C9D-BB32-6EC76F5BED25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-70-\\/f:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "CBD5D60B-9DC1-4954-9234-E1CF7A25D821",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-70-\\/f:-:standard:*:*:*:*:*",
"matchCriteriaId": "0086C77F-4CCF-48D7-93D7-C0254DE74F79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-70-\\/g:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "E9B561DC-889D-4E41-8FDB-CE1F14A3D7B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-70-\\/g:-:standard:*:*:*:*:*",
"matchCriteriaId": "FB2DFA0C-3754-4E49-9E48-3B229EDB2819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-70-\\/l:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "8B4930B4-27A5-4F1C-BEDF-1A95D12F2AC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-70-\\/l:-:standard:*:*:*:*:*",
"matchCriteriaId": "8F8E7454-4A42-4988-9F8F-254ED2CAC08B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-70-\\/n:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "14404C77-A024-4C2E-B0EB-72A6F6627DF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-70-\\/n:-:standard:*:*:*:*:*",
"matchCriteriaId": "2ED28A92-8D31-4CCE-ADDD-A5F1B632EB14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-70f:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "0AE1CF72-6E2F-40DF-B316-2B6BD30A1B2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-70f:-:standard:*:*:*:*:*",
"matchCriteriaId": "48350BE4-FA86-4772-B99C-35CA4575C774",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-71:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "AC534B14-B492-469E-8E1F-D7BC4CE3A796",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-71:-:standard:*:*:*:*:*",
"matchCriteriaId": "45A36E6B-331F-4462-B85A-27F77F8076A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-71-\\/f:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "44946927-4A22-4A4E-9130-9E382C55FA50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-71-\\/f:-:standard:*:*:*:*:*",
"matchCriteriaId": "CEDC4189-4763-48AB-B377-7CE7A4C8718E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-71-\\/g:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "513AE6DF-33F6-4485-A3D7-12A3B6121226",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-71-\\/g:-:standard:*:*:*:*:*",
"matchCriteriaId": "44716AEA-064A-4F24-A4B1-15523E0A27DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-72:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "AE180EF6-9848-4D38-8D0B-9AAB18F4B4D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-72:-:standard:*:*:*:*:*",
"matchCriteriaId": "8B500964-003E-4493-8902-5E90C89440DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-72-\\/d:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "29DA485B-FE11-4E77-8042-8554EF0B97B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:06-72-\\/d:-:standard:*:*:*:*:*",
"matchCriteriaId": "E8643104-886B-4E90-A1CB-0DA7AB799ADE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:6.7:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "C7DF3E6F-A096-46BE-9D26-0278D50E6550",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:6.7:-:standard:*:*:*:*:*",
"matchCriteriaId": "9CF7583C-1A12-4B07-9EF7-2B4A1B0BDFAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:7:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "7227EEAD-72ED-42EA-A6F8-506BAB303C93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:7:-:standard:*:*:*:*:*",
"matchCriteriaId": "D24F7D41-86E4-4DF8-B525-56ECF1D35721",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:07-00:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "66A30941-E1FE-46D3-993A-76FB8A39D502",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:07-00:-:standard:*:*:*:*:*",
"matchCriteriaId": "D993B210-1E35-48A4-B0DF-8F3443803ACF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:07-10:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "5F03A5B9-8D94-4437-933E-1BA02CD04040",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:07-10:-:standard:*:*:*:*:*",
"matchCriteriaId": "023093FD-4275-41C8-ABF4-D2F0606E90FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:07-60:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "3EE4CE0D-2DC7-4529-9523-BFD24DF3BE05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:07-60:-:standard:*:*:*:*:*",
"matchCriteriaId": "DE8C23CB-F5A3-4AF0-A433-5A331424F7B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:8:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "0C3D3425-B2A7-4764-B0AC-354632950B68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:8:-:standard:*:*:*:*:*",
"matchCriteriaId": "D0E28514-5D2E-4FC4-8C65-2AC39B4227ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:08-00:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "E92F3386-33FA-4CD9-B2BC-1F03E940027C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:08-00:-:standard:*:*:*:*:*",
"matchCriteriaId": "C62EF21A-5094-40A6-A96B-67D2082831DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_client:06-70:*:*:*:*:*:*:*",
"matchCriteriaId": "B023A2D4-49E4-47A7-8B83-716BCD93995F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_client:06-70-\\/f:*:*:*:*:*:*:*",
"matchCriteriaId": "5DC6EDF8-6221-421C-9C07-52024EB5E0C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_client:06-71:*:*:*:*:*:*:*",
"matchCriteriaId": "403FD1B5-5D87-4B9B-A258-1EE5A7FE2E29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_client:06-71-\\/f:*:*:*:*:*:*:*",
"matchCriteriaId": "2C43BE1B-A4F9-4F82-814E-CFE09735C5B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_client:07-00:*:*:*:*:*:*:*",
"matchCriteriaId": "3F7CD480-B966-4934-94E3-EBB2CCE03B94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_client:07-60:*:*:*:*:*:*:*",
"matchCriteriaId": "602F9DF8-230D-4B2D-88AF-530DD6D438E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_client:8:*:*:*:*:*:*:*",
"matchCriteriaId": "602B446D-2081-4360-B729-341167C46CB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_client:08-00:*:*:*:*:*:*:*",
"matchCriteriaId": "4368D006-970B-44A0-920C-B2E7C6B13868",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_collaboration:06-20:-:server:*:*:*:*:*",
"matchCriteriaId": "7B4070B7-020C-4B43-B342-87423F5DF9BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_collaboration:06-20-\\/d:-:server:*:*:*:*:*",
"matchCriteriaId": "EFEA87BE-9F4B-4F6C-AF12-D1F829A8E7F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_collaboration:06-30:-:server:*:*:*:*:*",
"matchCriteriaId": "92F3066F-B335-49B8-BD21-B6AC274FEF89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_collaboration:06-30-\\/f:-:server:*:*:*:*:*",
"matchCriteriaId": "F2043CED-54A5-45EB-980C-E871C1D7A343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_collaboration:06-35:-:server:*:*:*:*:*",
"matchCriteriaId": "B3A5C9F4-733F-462E-871B-BAB6D7C67A01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_collaboration:06-35-\\/f:-:server:*:*:*:*:*",
"matchCriteriaId": "78A54AF2-FBB8-4544-AB97-CCD2C5A6A9B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:6:-:pro:*:*:*:*:*",
"matchCriteriaId": "F77351A8-2D61-4DCA-9BA8-CD3553D6210F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:6:-:standard:*:*:*:*:*",
"matchCriteriaId": "3AFFE093-8268-4AF0-A463-35075091E87B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:06-70:-:light:*:*:*:*:*",
"matchCriteriaId": "9D224487-C16E-43C0-AA14-107C45A0429F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:06-70:-:pro:*:*:*:*:*",
"matchCriteriaId": "137CAEFA-E1A8-4B7C-87BE-6ECDA81DC4AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:06-70:-:standard:*:*:*:*:*",
"matchCriteriaId": "BC371E79-795D-43CA-BEBE-968FF04247C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:06-70-\\/f:-:light:*:*:*:*:*",
"matchCriteriaId": "A11A2989-44C6-4E63-B133-B712222D91FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:06-70-\\/f:-:pro:*:*:*:*:*",
"matchCriteriaId": "88ABDF38-5088-41B4-8C51-689411981BB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:06-70-\\/f:-:standard:*:*:*:*:*",
"matchCriteriaId": "9BE956FA-7582-49D9-B7BB-A390FC3736A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:06-71:-:light:*:*:*:*:*",
"matchCriteriaId": "DF233734-189E-49EF-89A5-EE9C89785E72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:06-71:-:pro:*:*:*:*:*",
"matchCriteriaId": "D17A2FDF-43F7-4274-AFEF-FA020D2E98D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:06-71:-:standard:*:*:*:*:*",
"matchCriteriaId": "91C4431A-C72E-4FBF-A62A-5D5A6C491B66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:06-71-\\/f:-:light:*:*:*:*:*",
"matchCriteriaId": "BCB97638-3901-477C-AF09-51EE0F6E4400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:06-71-\\/f:-:pro:*:*:*:*:*",
"matchCriteriaId": "2CE561A2-079A-4D70-99DF-1E9AC27B06FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:06-71-\\/f:-:standard:*:*:*:*:*",
"matchCriteriaId": "50DA343D-4678-44BF-81F9-235241802A2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:6.7:-:light:*:*:*:*:*",
"matchCriteriaId": "E5E8AEED-53F4-4E10-AFA6-137C6F0E6546",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:6.7:-:pro:*:*:*:*:*",
"matchCriteriaId": "600ED495-ECCA-493F-9FCB-3323313B4C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:6.7:-:standard:*:*:*:*:*",
"matchCriteriaId": "669A25E0-BBC4-40F0-B233-5A205B77A0AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:7:-:light:*:*:*:*:*",
"matchCriteriaId": "6A849A4A-8DBC-48EF-93E7-FC1A749BFAFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:7:-:pro:*:*:*:*:*",
"matchCriteriaId": "52F83F41-6566-4A16-BF3B-44ADF26B2F04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:7:-:standard:*:*:*:*:*",
"matchCriteriaId": "63CF5BCE-93C3-40D3-B930-02898F68C8BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:07-00:-:pro:*:*:*:*:*",
"matchCriteriaId": "D118B608-BEE9-43FE-87E9-5A1C4168843B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:07-00:-:standard:*:*:*:*:*",
"matchCriteriaId": "D608AD0B-2CC2-4FB8-99EB-8DA43C1B6FBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:07-60:-:pro:*:*:*:*:*",
"matchCriteriaId": "C4D2DAB4-1C16-4473-8F6F-8FD85E81C11A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:07-60:-:standard:*:*:*:*:*",
"matchCriteriaId": "C64DA319-4086-407B-B289-1865910DFE95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:8:-:light:*:*:*:*:*",
"matchCriteriaId": "B1C6FCBF-7ED6-4C8F-84A7-10FB18932238",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:8:-:pro:*:*:*:*:*",
"matchCriteriaId": "1C943C83-B05A-4373-BF0D-969D1353035A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:8:-:standard:*:*:*:*:*",
"matchCriteriaId": "3C05AA3F-6F6D-46E3-A49A-371DD406A64D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:08-00:-:pro:*:*:*:*:*",
"matchCriteriaId": "20F18411-774B-4F5E-A39B-B7C9D7D9AECB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:08-00:-:standard:*:*:*:*:*",
"matchCriteriaId": "C8429E4B-A47A-4651-A2AA-C9A78AF78AC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_operator:6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "637F87F0-AFD1-4042-8E9A-3A8E94FF34FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_operator:7:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD47BD9-0E9D-4C80-AAE5-CD93CDB38B57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_operator:07-00:*:*:*:*:*:*:*",
"matchCriteriaId": "7D1FA2C7-5341-446D-AEBE-64AEBB0DABCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_operator:07-60:*:*:*:*:*:*:*",
"matchCriteriaId": "6159C8FD-F2A6-4212-850D-8C2F1C8BBD72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_operator:8:*:*:*:*:*:*:*",
"matchCriteriaId": "DA84041F-3066-4BEF-AE80-5836051CA7B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_architect:6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DC344B37-D163-4D89-AC63-A082C2505279",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_architect:7:*:*:*:*:*:*:*",
"matchCriteriaId": "88C9E58D-37F5-4E8A-8715-3CF1A599FDF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_architect:07-00:*:*:*:*:*:*:*",
"matchCriteriaId": "D05BEA3F-C8FB-4628-9C43-FF0A36BF129C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_architect:07-60:*:*:*:*:*:*:*",
"matchCriteriaId": "D362185A-DB98-45B1-902E-345322F8A0DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_architect:8:*:*:*:*:*:*:*",
"matchCriteriaId": "A221D5E9-F4B0-4D01-84DF-1C87446F1ADF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_architect:08-00:*:*:*:*:*:*:*",
"matchCriteriaId": "63BE9CAA-2974-4D98-B2D4-BFEB50F05450",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "F468861C-CBCA-4B55-B852-4E615381A158",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:7:*:*:*:*:*:*:*",
"matchCriteriaId": "22E4038F-A9A3-4165-B81E-615BC832C916",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07-00:*:*:*:*:*:*:*",
"matchCriteriaId": "535EB81E-FDE3-4333-A1D8-B13852BA9F84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07-10:*:*:*:*:*:*:*",
"matchCriteriaId": "71869635-D253-417D-A13C-A2F6DA87858E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07-60:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFCCFAC-A7FA-4926-A5A8-B1649771C2FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:8:*:*:*:*:*:*:*",
"matchCriteriaId": "F18CD959-D5CD-47B7-9C35-437853DBBFA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:08-00:*:*:*:*:*:*:*",
"matchCriteriaId": "2660CD8B-B3F7-4209-AD10-D94A7B9F58E4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:processing_kit_for_xml:01-00:*:*:*:*:*:*:*",
"matchCriteriaId": "F1CD4F13-CBB2-4F29-AEE9-FA48CB86C909",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:processing_kit_for_xml:01-05:*:*:*:*:*:*:*",
"matchCriteriaId": "7F2E274F-DC9C-48F6-9599-988BF14ADABD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:processing_kit_for_xml:01-05-\\/a:*:*:*:*:*:*:*",
"matchCriteriaId": "D814D40C-2A3C-4006-886C-B1DC53902D24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:processing_kit_for_xml:01-05-\\/b:*:*:*:*:*:*:*",
"matchCriteriaId": "1205F185-E1C7-4F8E-91CB-98126D72DC13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:processing_kit_for_xml:01-05-\\/c:*:*:*:*:*:*:*",
"matchCriteriaId": "FACB8771-9AFC-4FE4-BB5A-07A23CF0BBB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:processing_kit_for_xml:01-05-\\/d:*:*:*:*:*:*:*",
"matchCriteriaId": "E53A647F-DEED-4FDA-A7EE-8F63EB78A876",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:processing_kit_for_xml:01-07:*:*:*:*:*:*:*",
"matchCriteriaId": "4839F650-9A07-4120-AB26-FB69CC17611D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:processing_kit_for_xml:01-07-\\/a:*:*:*:*:*:*:*",
"matchCriteriaId": "B024696B-A999-4F95-9A54-86345BA147C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:processing_kit_for_xml:02-00:*:*:*:*:*:*:*",
"matchCriteriaId": "12B409D6-B45D-46F2-A2C6-4345AF159948",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:processing_kit_for_xml:02-00-\\/b:*:*:*:*:*:*:*",
"matchCriteriaId": "A952331D-749E-4106-AC29-976EFDA0DF33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:processing_kit_for_xml:02-00-\\/c:*:*:*:*:*:*:*",
"matchCriteriaId": "A8877EF6-38F8-466C-A699-55DC577623B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:processing_kit_for_xml:02-00-\\/d:*:*:*:*:*:*:*",
"matchCriteriaId": "9548D481-961D-4093-B464-E3643B2D4A17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:processing_kit_for_xml:02-05:*:*:*:*:*:*:*",
"matchCriteriaId": "F69BFB31-114F-464E-A43B-0352777A1A38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:processing_kit_for_xml:02-05-\\/a:*:*:*:*:*:*:*",
"matchCriteriaId": "64880EFE-512F-4899-87C3-7033DCCE417D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:processing_kit_for_xml:02-05-\\/c:*:*:*:*:*:*:*",
"matchCriteriaId": "770C1017-2B8C-46A1-B62E-E32B8EBDBC55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:ibm_xl_c\\/c\\+\\+_v7_for_aix_\\\u0026_hitachi_developer\\\u0027s_kit_for_java:01-00:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "1320E465-81DD-4C48-B97D-C6C29CF1454A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ibm_xl_c\\/c\\+\\+_v8_for_aix_\\\u0026_hitachi_developer\\\u0027s_kit_for_java:01-00:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "017BFE19-D746-4832-A383-3E75DF6659AD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:groupmax_collaboration:07-20:-:server:*:*:*:*:*",
"matchCriteriaId": "8AEAA75E-5BB1-4060-B93A-8D486E43C22F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:groupmax_collaboration:07-20-\\/d:-:server:*:*:*:*:*",
"matchCriteriaId": "058C0CDA-AB38-4802-A391-34AC550D744E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:groupmax_collaboration:07-30:-:server:*:*:*:*:*",
"matchCriteriaId": "2E0DC509-A04D-4009-BE94-AD71ABA7E540",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:groupmax_collaboration:07-30-\\/f:-:server:*:*:*:*:*",
"matchCriteriaId": "8B4E1DCC-0360-4DD6-8BB8-F843A935F572",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:groupmax_collaboration:07-35:-:server:*:*:*:*:*",
"matchCriteriaId": "212F5DAE-9C20-475A-84D1-35F386090A72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:groupmax_collaboration:07-35-\\/f:-:server:*:*:*:*:*",
"matchCriteriaId": "D714CDF5-FD62-43B5-A1B0-53ED8FDA6F60",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_set:07-50:*:*:*:*:*:*:*",
"matchCriteriaId": "F5DEC484-75F1-48B7-B59A-6FE208D1257B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_set:07-50-\\/d:*:*:*:*:*:*:*",
"matchCriteriaId": "DF469482-A1CC-496C-A74B-1F00D9619954",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_set:07-60:*:*:*:*:*:*:*",
"matchCriteriaId": "F1DCD78F-2BC0-44FA-BAA0-A519A7290F2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_set:07-60-\\/i:*:*:*:*:*:*:*",
"matchCriteriaId": "09B27467-07A9-45FE-8E32-54A838084D49",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-standard_set:06-70:*:*:*:*:*:*:*",
"matchCriteriaId": "043DC056-9D9A-4C70-9B19-C29C738A7735",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-standard_set:06-70-\\/c:*:*:*:*:*:*:*",
"matchCriteriaId": "37E85F04-0D8E-479E-9BAC-6FDEAE44D650",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-standard_set:06-70-\\/f:*:*:*:*:*:*:*",
"matchCriteriaId": "68C5E1F6-2A00-4AF0-A45C-3AF048CA4F22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-standard_set:07-00:*:*:*:*:*:*:*",
"matchCriteriaId": "789FE125-1BBE-4E6D-87B6-74942E7198B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-standard_set:07-00-\\/b:*:*:*:*:*:*:*",
"matchCriteriaId": "2E8B0E83-15EA-4573-A7F6-6F7D2DB653EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-standard_set:07-00-\\/c:*:*:*:*:*:*:*",
"matchCriteriaId": "B06969FB-28FA-470C-BD4A-1F4BC90760D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-standard_set:07-10:*:*:*:*:*:*:*",
"matchCriteriaId": "DD06676E-5664-422A-BCAE-7F3467E9CBA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-standard_set:07-10-\\/a:*:*:*:*:*:*:*",
"matchCriteriaId": "845D3A84-F6CD-45AA-B67C-5F48A2B73EC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-standard_set:07-11:*:*:*:*:*:*:*",
"matchCriteriaId": "9D8AC572-CC8D-45F7-83EA-6DAA8D7E1649",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-standard_set:07-11-\\/c:*:*:*:*:*:*:*",
"matchCriteriaId": "6250A039-0686-439E-BB95-AD5C424A9D88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-standard_set:07-20:*:*:*:*:*:*:*",
"matchCriteriaId": "D682CC77-F182-4989-B37F-44259AB5186D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-standard_set:07-20-\\/b:*:*:*:*:*:*:*",
"matchCriteriaId": "762C3E8E-EA7B-4EE3-AE3A-5CCD462009E1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-professional_set:07-50:*:*:*:*:*:*:*",
"matchCriteriaId": "81DD486C-1F08-4979-8367-28492AAFADA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-professional_set:07-50-\\/d:*:*:*:*:*:*:*",
"matchCriteriaId": "87BD7B88-BD12-43BC-95C3-8C96D0F26903",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-professional_library_set:06-70:*:*:*:*:*:*:*",
"matchCriteriaId": "96854991-0023-4563-A77E-920C4A8DD33E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-professional_library_set:06-70-\\/c:*:*:*:*:*:*:*",
"matchCriteriaId": "75A3AB2E-AFFB-4729-A96B-E91E7D21E9F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-professional_library_set:06-70-\\/f:*:*:*:*:*:*:*",
"matchCriteriaId": "669AF6A9-46FF-486D-95D4-37511BBF78A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-professional_library_set:07-00:*:*:*:*:*:*:*",
"matchCriteriaId": "B8A6D2BF-F113-4F18-91D6-F682F4031638",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-professional_library_set:07-00-\\/b:*:*:*:*:*:*:*",
"matchCriteriaId": "FCB7299E-4DC8-42F7-83BD-7B48F95D0C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-professional_library_set:07-00-\\/c:*:*:*:*:*:*:*",
"matchCriteriaId": "E87D7234-A9C2-4D00-8E18-59AA00A19B21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-professional_library_set:07-10:*:*:*:*:*:*:*",
"matchCriteriaId": "CEDCDB39-96A0-47C7-8147-72E7B4531174",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-professional_library_set:07-10-\\/a:*:*:*:*:*:*:*",
"matchCriteriaId": "C4922EBE-3BA0-4CB4-97DA-B43925D03CB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-professional_library_set:07-11:*:*:*:*:*:*:*",
"matchCriteriaId": "2535EFD7-DAC9-47EB-A07E-1CA144334C27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-professional_library_set:07-11-\\/c:*:*:*:*:*:*:*",
"matchCriteriaId": "A1EA141B-B540-474E-B45B-DC4D40CE4E9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-professional_library_set:07-20:*:*:*:*:*:*:*",
"matchCriteriaId": "132A469B-4419-4DBD-BE6B-F45274C468AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-professional_library_set:07-20-\\/b:*:*:*:*:*:*:*",
"matchCriteriaId": "696CB559-1003-43B0-B294-B5CFCA7949D6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-developer_set:07-50:*:*:*:*:*:*:*",
"matchCriteriaId": "6EAD4A8B-EFE5-4567-AE3A-F25BDFEEAA24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-developer_set:07-50-\\/d:*:*:*:*:*:*:*",
"matchCriteriaId": "22A05124-3B2B-4788-881D-9A08BC863FE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-developer_set:07-60:*:*:*:*:*:*:*",
"matchCriteriaId": "9DC63B97-7355-4262-A981-A49A11053528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-developer_set:07-60-\\/i:*:*:*:*:*:*:*",
"matchCriteriaId": "75D92591-2A3B-4023-AFDC-1E77D3933658",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-developer_client_set:06-70:*:*:*:*:*:*:*",
"matchCriteriaId": "075893D8-C7F4-4354-A313-2DE201F27C63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-developer_client_set:06-70-\\/f:*:*:*:*:*:*:*",
"matchCriteriaId": "69F1E95C-D573-4F6D-AEBF-4D2F5AAA3559",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-developer_client_set:07-00:*:*:*:*:*:*:*",
"matchCriteriaId": "37D472E5-9A3D-46FB-8436-B66AE1BBF5EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-developer_client_set:07-00-\\/c:*:*:*:*:*:*:*",
"matchCriteriaId": "B754CEF7-0B84-4020-81DE-D15072C0CD3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-developer_client_set:07-10:*:*:*:*:*:*:*",
"matchCriteriaId": "85A57118-1425-43FB-A673-DA0449D6032A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-developer_client_set:07-10-\\/a:*:*:*:*:*:*:*",
"matchCriteriaId": "C5027E0C-BF3B-4742-8D6F-9FB44930BDCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-developer_client_set:07-11:*:*:*:*:*:*:*",
"matchCriteriaId": "B52DCAD4-2068-439B-BF59-6E6561AC2990",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-developer_client_set:07-11-\\/c:*:*:*:*:*:*:*",
"matchCriteriaId": "817048FF-E15F-49F5-9154-4897264F58FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-developer_client_set:07-20:*:*:*:*:*:*:*",
"matchCriteriaId": "483D301C-2266-4868-AB16-7A0CF5FB0A7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow-developer_client_set:07-20-\\/b:*:*:*:*:*:*:*",
"matchCriteriaId": "E1E7A5EC-E7AC-421D-B881-B7C1BF5E6841",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:developer\\\u0027s_kit_for_java:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC3E7D53-639D-4428-A743-98AC5FDCE5B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:cosminexus\\/opentp1_web_web_front-endset:01-00:*:*:*:*:*:*:*",
"matchCriteriaId": "9435B205-C282-4152-8FEA-50B7E3D2DA38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus\\/opentp1_web_web_front-endset:01-00-\\/b:*:*:*:*:*:*:*",
"matchCriteriaId": "919EAA00-7043-41DB-B9F6-B4F77054D90E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus\\/opentp1_web_web_front-endset:01-01:*:*:*:*:*:*:*",
"matchCriteriaId": "8D94E2EB-EFA4-4BFF-B786-5BC5E1BE638B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus\\/opentp1_web_web_front-endset:01-01-\\/c:*:*:*:*:*:*:*",
"matchCriteriaId": "51A9283F-2412-45E9-867E-C32307D2ABAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus\\/opentp1_web_web_front-endset:02-00:*:*:*:*:*:*:*",
"matchCriteriaId": "F03CC2CE-0146-46FC-8A55-79393479113D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus\\/opentp1_web_web_front-endset:02-00-\\/a:*:*:*:*:*:*:*",
"matchCriteriaId": "B357F157-0211-40FE-9442-7E06117D443D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus\\/opentp1_web_web_front-endset:02-50:*:*:*:*:*:*:*",
"matchCriteriaId": "499A08A8-EBF2-4A76-9B8B-A07BF529D740",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus\\/opentp1_web_web_front-endset:02-50-\\/a:*:*:*:*:*:*:*",
"matchCriteriaId": "CA6CE164-2CE5-46A1-B32C-1C367569113C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:5:*:*:*:*:*:*:*",
"matchCriteriaId": "B4CC876E-1512-4C4C-9145-C79AED7B04F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:05-00:*:*:*:*:*:*:*",
"matchCriteriaId": "31AEDCFF-F7FD-4A13-AAC4-1BB2BFD1E833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:05-00-\\/i:*:*:*:*:*:*:*",
"matchCriteriaId": "7B0939D4-5A49-4A3E-9F7E-29E8692545A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:05-00-\\/s:*:*:*:*:*:*:*",
"matchCriteriaId": "9D0F8E53-BDB2-4F72-B90A-325A4F1D0394",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:05-01:*:*:*:*:*:*:*",
"matchCriteriaId": "0E8585FA-103E-4C42-B6E6-6EFEC533D4D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:05-01-\\/l:*:*:*:*:*:*:*",
"matchCriteriaId": "D037968B-5448-4538-87E0-FFA296C5CC18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:05-02:*:*:*:*:*:*:*",
"matchCriteriaId": "B56AE902-68EA-499C-869D-479A9228DC3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:05-02-\\/e:*:*:*:*:*:*:*",
"matchCriteriaId": "E5AFAA79-EB60-4089-B2D9-723EAD7D0A26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:05-05:*:*:*:*:*:*:*",
"matchCriteriaId": "1835F905-CD07-453F-A331-35E78097039D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:05-05-\\/i:*:*:*:*:*:*:*",
"matchCriteriaId": "BD9479D4-3B4D-447D-B9ED-A78A47A23C7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:05-05-\\/o:*:*:*:*:*:*:*",
"matchCriteriaId": "F047C97B-94F3-4FB5-B34C-76117BE10137",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:05-05-\\/p:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F0366B-9326-4175-9C31-7C990ABA335E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:6:*:*:*:*:*:*:*",
"matchCriteriaId": "B37A3EC0-5E2B-4D97-8294-8906A439AD4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:6:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "4B5B3C2C-E9A5-4633-88F1-6234F4EDB134",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-00:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "E3E98472-8F31-4C0E-92E3-5A2618F0AA5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-00:-:standard:*:*:*:*:*",
"matchCriteriaId": "4B9917F7-E1BF-47BB-8040-ECD8496AC2AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-00-\\/a:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "404011D3-EB03-48E8-A539-2229E11CEAFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-00-\\/a:-:standard:*:*:*:*:*",
"matchCriteriaId": "D3609484-1D36-4BA8-B0CF-2193A2606B63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-00-\\/b:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "F89BA7CF-6CE0-47EA-8ADE-77DF13F35000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-00-\\/b:-:standard:*:*:*:*:*",
"matchCriteriaId": "4EE3E2AD-A928-48F5-BA03-688AA6884F1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-00-\\/e:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "4C8CB4BA-F440-4CB3-A335-36735CF08C20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-00-\\/e:-:standard:*:*:*:*:*",
"matchCriteriaId": "7D72FAFB-2FDF-4761-AAD6-0BC3F294C7D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-00-\\/i:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "03D5D563-716D-4A3B-87BA-96DCC610BA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-00-\\/i:-:standard:*:*:*:*:*",
"matchCriteriaId": "CBE7CBFE-9713-44B6-816E-103230BD6187",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-02:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "7CBBAAB3-63A5-4D21-8928-B8808679F401",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-02:-:standard:*:*:*:*:*",
"matchCriteriaId": "BD09629E-4D06-4A55-972E-F2106C391275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-02-\\/d:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "1705CFC2-0266-4169-BC5B-130301643EAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-02-\\/d:-:standard:*:*:*:*:*",
"matchCriteriaId": "38FA4B4C-1A32-40EE-B9A0-C324835AB9C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-02-\\/f:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "8D67B57D-9974-4365-AAE8-F02226948695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-02-\\/f:-:standard:*:*:*:*:*",
"matchCriteriaId": "E04FF433-CF28-48AA-8A40-46F8DCA194A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-02-\\/g:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "D11525EF-32DF-448D-8183-5E0DD01E3DF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-02-\\/g:-:standard:*:*:*:*:*",
"matchCriteriaId": "FDD2C08A-D985-42C7-9DD1-6F7F3E639738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-50:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "03C3E4C4-0C3A-4A09-A2E5-C00E75EBBB66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-50:-:standard:*:*:*:*:*",
"matchCriteriaId": "8AEF3AC3-B3D7-4B2D-9441-B999F3CD6C9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-50-\\/b:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "7AE565DC-0C6E-4285-921C-ADB0C0F2D152",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-50-\\/b:-:standard:*:*:*:*:*",
"matchCriteriaId": "CAEC32C1-3762-45F8-9292-577D9F73C7F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-50-\\/c:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "52A7FEEB-5B65-40AA-A74E-F1A9AAE1CD38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-50-\\/c:-:standard:*:*:*:*:*",
"matchCriteriaId": "11FB6CEC-19C5-46F0-B6DC-4B1B1C0465B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-50-\\/e:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "1AADAEE7-0250-4562-89C2-02C23EDA68CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-50-\\/e:-:standard:*:*:*:*:*",
"matchCriteriaId": "0BBF19E2-E7E0-47BE-BF95-0A8357D7A92F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-50-\\/f:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "D58CB19F-405D-4D81-8A1A-A7551F925566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-50-\\/f:-:standard:*:*:*:*:*",
"matchCriteriaId": "04329721-C6ED-480B-8032-599C9279AAE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-50-\\/i:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "11865094-F19D-46B0-B229-AE465C90FFAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-50-\\/i:-:standard:*:*:*:*:*",
"matchCriteriaId": "A99B3783-5A10-4444-BDAB-6DC735F6D303",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-51:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "BE4C75B0-AB19-450C-8577-56BEDDDBAE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-51:-:standard:*:*:*:*:*",
"matchCriteriaId": "6AC2C22A-3293-4DAD-B7AB-65037DDA9AA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-51-\\/b:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "6ADFCC97-CFBD-4065-B3A9-0D4B4E030B91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-51-\\/b:-:standard:*:*:*:*:*",
"matchCriteriaId": "28386A4A-299B-4C4B-9A20-D7F817CB5113",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-51-\\/e:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "9953C5A8-D534-4EDC-ADAA-680C14F1ECE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-51-\\/e:-:standard:*:*:*:*:*",
"matchCriteriaId": "3788BD33-8280-4BD8-84D8-8EF11ED360CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-51-\\/k:-:enterprise:*:*:*:*:*",
"matchCriteriaId": "81B7ABEB-999A-440E-804F-6F62F78BD125",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:06-51-\\/k:-:standard:*:*:*:*:*",
"matchCriteriaId": "2986ED7E-1137-4EA2-A775-C13076A4ADA9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_client:06-00:*:*:*:*:*:*:*",
"matchCriteriaId": "005319D9-5009-4D96-B1A9-E7E69EA65288",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_client:06-00-\\/i:*:*:*:*:*:*:*",
"matchCriteriaId": "999B7A35-D6F8-435B-A921-C94E6C67386F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_client:06-02:*:*:*:*:*:*:*",
"matchCriteriaId": "4873A93E-EB03-4C07-9392-1DB1646C808C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_client:06-02-\\/g:*:*:*:*:*:*:*",
"matchCriteriaId": "71D9C44F-D486-48F6-9736-D7E724EAB050",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_client:06-50:*:*:*:*:*:*:*",
"matchCriteriaId": "510C0364-48BE-4323-8718-003C1035469A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_client:06-50-\\/f:*:*:*:*:*:*:*",
"matchCriteriaId": "19BD796F-9F2E-4D94-B1CE-071F9AA42833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_client:06-51:*:*:*:*:*:*:*",
"matchCriteriaId": "323DA13B-68B2-4A30-86B0-C7004727066B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_client:06-51-\\/k:*:*:*:*:*:*:*",
"matchCriteriaId": "37FEA1D8-55FA-4310-924C-D55F86D3A212",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_studio:04-00:-:standard:*:*:*:*:*",
"matchCriteriaId": "301A7AAC-87FA-47D8-BC6C-3BA5BE6074EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_studio:04-00:-:web:*:*:*:*:*",
"matchCriteriaId": "443F7724-C698-49C0-9155-90E33498ABDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_studio:04-00-\\/a:-:standard:*:*:*:*:*",
"matchCriteriaId": "F5FD09BB-65C0-450F-8ED4-EC190BC394AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_studio:04-00-\\/a:-:web:*:*:*:*:*",
"matchCriteriaId": "7EA69680-A83C-4F74-9FE7-38540E33DE50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_studio:04-01:-:standard:*:*:*:*:*",
"matchCriteriaId": "F7595F7A-E98D-4A43-956B-E74FBE411DA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_studio:04-01:-:web:*:*:*:*:*",
"matchCriteriaId": "112A53D9-3AA9-40C9-8CAE-2DD06780049F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_studio:04-01-\\/a:-:standard:*:*:*:*:*",
"matchCriteriaId": "BDA23B41-71A9-4D74-9FAC-DEF0970A7363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_studio:04-01-\\/a:-:web:*:*:*:*:*",
"matchCriteriaId": "3C4FA663-6B02-4783-B9AD-84BD6AE77E64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_studio:05-00:*:*:*:*:*:*:*",
"matchCriteriaId": "8F5E6285-F6D4-404F-A40B-CFE7ACAF1ACD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_studio:05-00-\\/i:*:*:*:*:*:*:*",
"matchCriteriaId": "59AAEE4D-44AF-4DDE-BEF1-D47E601C9CAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_studio:05-01:*:*:*:*:*:*:*",
"matchCriteriaId": "C7F1C9A8-365F-4C1C-89D0-FC8AB8E7D04C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_studio:05-01-\\/l:*:*:*:*:*:*:*",
"matchCriteriaId": "76DEB598-C597-40D4-968C-1C3CAC4C6033",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_studio:05-05:*:*:*:*:*:*:*",
"matchCriteriaId": "D57F896D-ED64-4016-B8A3-7510D4E3C8DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_studio:05-05-\\/p:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D8D3EC-C36E-48EC-AD10-35ADEA2C6724",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_server:04-00:-:standard:*:*:*:*:*",
"matchCriteriaId": "E53F3C94-4F4A-40AB-8243-DF04F21E3472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_server:04-00:-:web:*:*:*:*:*",
"matchCriteriaId": "666053A9-93E5-4B82-8A83-617A681EBADB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_server:04-00-\\/a:-:standard:*:*:*:*:*",
"matchCriteriaId": "1F8F8F9B-B070-42E7-BED3-BEF0E336E1AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_server:04-00-\\/a:-:web:*:*:*:*:*",
"matchCriteriaId": "BC409477-AAAB-4C37-940C-E85FAC985DB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_server:04-01:-:standard:*:*:*:*:*",
"matchCriteriaId": "B581C6E0-BCAE-4C78-B606-B3EB2849F340",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_server:04-01:-:web:*:*:*:*:*",
"matchCriteriaId": "5BE09230-D671-4458-BF03-49BF6C39F894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_server:04-01-\\/a:-:standard:*:*:*:*:*",
"matchCriteriaId": "CA94F3ED-4865-43B2-AFF8-EA5840144134",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_server:04-01-\\/a:-:web:*:*:*:*:*",
"matchCriteriaId": "C156780D-5366-46B1-A612-A2876B44ABFD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:5:*:*:*:*:*:*:*",
"matchCriteriaId": "8DCC416B-382F-4684-B110-57CACA78E1E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:05-00:*:*:*:*:*:*:*",
"matchCriteriaId": "F594C217-1841-4C23-90E5-672BA60CA09A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:05-00-\\/i:*:*:*:*:*:*:*",
"matchCriteriaId": "4E409CB8-078E-40E0-B24C-5E2B772AAAC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:05-01:*:*:*:*:*:*:*",
"matchCriteriaId": "C2D8206F-2160-442B-8C1B-9FDE7D0C874F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:05-01-\\/l:*:*:*:*:*:*:*",
"matchCriteriaId": "7FBCF653-FDD0-42F9-A80F-B11B9B22D6B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:05-05:*:*:*:*:*:*:*",
"matchCriteriaId": "18F7B28C-FEAE-49D1-9F7B-B6E7AF0D9B46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:05-05-\\/p:*:*:*:*:*:*:*",
"matchCriteriaId": "13C98A6D-061C-4C86-A84C-6D25290DF848",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:6:-:light:*:*:*:*:*",
"matchCriteriaId": "E87739C1-97A3-437C-A4EA-09C7283C48A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:6:-:pro:*:*:*:*:*",
"matchCriteriaId": "AA88C349-5414-4929-B4E9-7D873551DB71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:6:-:standard:*:*:*:*:*",
"matchCriteriaId": "3D78324A-27A8-429D-98C8-4D0076AE7CA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-00:-:light:*:*:*:*:*",
"matchCriteriaId": "F96B4184-A86E-424B-BA45-53DE568FDC53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-00:-:pro:*:*:*:*:*",
"matchCriteriaId": "A9CAC58E-3CDA-4125-84AD-E92B476BEC52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-00:-:standard:*:*:*:*:*",
"matchCriteriaId": "5ED2FACB-ED6E-4B33-A390-773496EE24F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-00-\\/i:-:light:*:*:*:*:*",
"matchCriteriaId": "8FBE2B05-AC7A-45BA-A630-5BE5DE106544",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-00-\\/i:-:pro:*:*:*:*:*",
"matchCriteriaId": "2F23BA73-4ADB-4206-B608-104544789F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-00-\\/i:-:standard:*:*:*:*:*",
"matchCriteriaId": "5B09BFDF-3A07-450F-9FAE-A00BEF8FE8DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-02:-:light:*:*:*:*:*",
"matchCriteriaId": "7E991733-1255-408E-9D23-51C7425059A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-02:-:pro:*:*:*:*:*",
"matchCriteriaId": "6350A4C8-E0D8-4C09-A1E7-9AC7C173CD1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-02:-:standard:*:*:*:*:*",
"matchCriteriaId": "A580A86B-FCF4-419C-AB6E-1D4BF7054EB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-02-\\/g:-:light:*:*:*:*:*",
"matchCriteriaId": "0426907D-9D19-4B5C-B1DC-9F6D5C5621B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-02-\\/g:-:pro:*:*:*:*:*",
"matchCriteriaId": "4E9DE74C-00A3-4EA9-B2CE-1C3380FA339A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-02-\\/g:-:standard:*:*:*:*:*",
"matchCriteriaId": "39CF866E-6A3E-48F0-84C0-17FB84BA4DBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-50:-:light:*:*:*:*:*",
"matchCriteriaId": "3AFC3EC6-942E-4ADD-821E-7E1B1BFFC6FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-50:-:pro:*:*:*:*:*",
"matchCriteriaId": "D1A02186-3B99-4C82-9B56-2E089CBB3438",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-50:-:standard:*:*:*:*:*",
"matchCriteriaId": "340FAAE7-3764-4CE9-BE0E-A45B9BBD512E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-50-\\/f:-:light:*:*:*:*:*",
"matchCriteriaId": "306A7D9F-201F-4A5C-98D8-95B540F1F254",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-50-\\/f:-:pro:*:*:*:*:*",
"matchCriteriaId": "15E1773D-BE81-4D79-9738-1636EF28AA7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-50-\\/f:-:standard:*:*:*:*:*",
"matchCriteriaId": "B433BA98-6CBA-4086-96BF-B94E97508613",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-51:-:light:*:*:*:*:*",
"matchCriteriaId": "6749D1BA-3675-4AD3-B939-4571BA53502D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-51:-:pro:*:*:*:*:*",
"matchCriteriaId": "E8932483-A765-401B-8D8A-17A2E32ADC6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-51:-:standard:*:*:*:*:*",
"matchCriteriaId": "630EEB83-5816-49E6-B75D-9CB6B7B5C00F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-51-\\/k:-:light:*:*:*:*:*",
"matchCriteriaId": "FE5D27FC-2847-4F82-9899-E0AEE8085734",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-51-\\/k:-:pro:*:*:*:*:*",
"matchCriteriaId": "FD77FE62-6689-49A0-AE2D-7456ED95A971",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:06-51-\\/k:-:standard:*:*:*:*:*",
"matchCriteriaId": "C8E6F824-7A39-49D0-B6E3-3C141AA9E287",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Hitachi Cosminexus V4 through V8, Processing Kit for XML, and Developer\u0027s Kit for Java, as used in products such as uCosminexus, Electronic Form Workflow, Groupmax, and IBM XL C/C++ Enterprise Edition 7 and 8, allows remote attackers to have an unknown impact via vectors related to the use of GIF image processing APIs by a Java application, and a different issue from CVE-2007-3794."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en Hitachi Cosminexus V4 a la V8, Processing Kit para XML, y Developer\u0027s Kit para Java, usado en productos como uCosminexus, Electronic Form Workflow, Groupmax, e IBM XL C/C++ Enterprise Edition 7 y 8, permite a atacantes remotos tener un impacto desconocido a trav\u00e9s de vectores relacionados con el uso del procesamiento de im\u00e1genes GIF mediante APIs para aplicaciones Java. Cuesti\u00f3n distinta del CVE-2007-3794."
}
],
"id": "CVE-2009-4776",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-04-21T14:30:00.553",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/57834"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36622"
},
{
"source": "cve@mitre.org",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-014/index.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/36309"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/2574"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/57834"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36622"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-014/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/36309"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/2574"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-5809
Vulnerability from fkie_nvd - Published: 2007-11-05 17:46 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Hitachi Web Server 01-00 through 03-10, as used by certain Cosminexus products, allows remote attackers to inject arbitrary web script or HTML via unspecified HTTP requests that trigger creation of a server-status page.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4FD8C880-F11E-44A9-85F3-F0977D61C44D",
"versionEndIncluding": "06_51_j",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "649ED27D-43A3-45B6-B33E-3052C927ADA7",
"versionEndIncluding": "06_51_j",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer_light_version_6:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7773DA4-2ED1-46AA-95A2-422DC978838F",
"versionEndIncluding": "06_51_j",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer_professional_version_6:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F74FD551-8D2D-4D3D-B1D5-4B0EF5640F6D",
"versionEndIncluding": "06_51_j",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer_standard_version_6:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A47159F-991A-447B-A5E1-C4ED4E52ADBC",
"versionEndIncluding": "06_51_j",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22962B86-F12E-4290-B748-9FF12DE4A572",
"versionEndIncluding": "04_01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4F061CA-E6D6-4E0C-9AA0-3FE18A499D95",
"versionEndIncluding": "07_50_01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF9B6262-4F8B-45DA-A153-E54423CD8B16",
"versionEndIncluding": "07_50_01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_light:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99EDC467-EAE5-4BD6-BAB7-944DF890A685",
"versionEndIncluding": "06_71_d",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_professional:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C9FE1C85-1D57-4ED3-94FA-BCBAF9A2BD53",
"versionEndIncluding": "07_50_01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_standard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D5FC2D16-9EBB-4D18-AA2A-6C8D1788D60F",
"versionEndIncluding": "07_50_01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_architect:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52475B65-FCC2-418D-9842-BD6197367F5B",
"versionEndIncluding": "07_50_01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67D3AEC5-63FA-4457-9EE4-CE5A2B55B687",
"versionEndIncluding": "07_50_01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_00:*:hpux:*:*:*:*:*",
"matchCriteriaId": "1A0EB6CA-C6BF-4316-9C87-DC6177C54112",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_00:*:solaris:*:*:*:*:*",
"matchCriteriaId": "7839481D-92D1-4252-916B-D5BF0C817B1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_01:*:aix:*:*:*:*:*",
"matchCriteriaId": "DCBE68C6-A9FF-4783-A554-0F2E79B77D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_01:*:linux:*:*:*:*:*",
"matchCriteriaId": "BA1B4996-9789-4E7B-B89C-30719D4CEF0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_01:*:turbolinux:*:*:*:*:*",
"matchCriteriaId": "ACDA910D-7CA8-4B21-9992-C766277598FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_01_d:*:linux:*:*:*:*:*",
"matchCriteriaId": "916B1226-DB50-4C23-BFFE-B61983B20A1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_02_d:*:hpux:*:*:*:*:*",
"matchCriteriaId": "F6BC26AD-3B1F-449A-81C6-8C363620033E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_02_d:*:solaris:*:*:*:*:*",
"matchCriteriaId": "768DC203-A5EE-471F-8290-74877E0F2EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_02_e:*:aix:*:*:*:*:*",
"matchCriteriaId": "2A316667-A7C3-48FD-8DDD-3A1B79D5695F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_00:*:aix:*:*:*:*:*",
"matchCriteriaId": "F0EB32A1-4032-4ECA-A02B-B2BC2A03E93C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_00:*:hpux:*:*:*:*:*",
"matchCriteriaId": "24BFFB81-904A-4C48-9015-2DCF9F7F4CAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "200A370A-FBCE-412C-B01A-5E79DE317134",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_00:*:solaris:*:*:*:*:*",
"matchCriteriaId": "EEDEA46C-003C-4A71-8BBC-4214B5D7C84C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_00:*:turbolinux:*:*:*:*:*",
"matchCriteriaId": "CA4D9A0F-21D2-45E8-BC90-BFABDCC1119C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_00:*:windows:*:*:*:*:*",
"matchCriteriaId": "62E9F68B-6A10-430F-BB15-DE9F354053BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_00_a:*:linux:*:*:*:*:*",
"matchCriteriaId": "A2306B1F-810D-4188-BEE3-F49925B5BA8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_02:*:hpux:*:*:*:*:*",
"matchCriteriaId": "D2AA434B-FCDE-4143-A4CA-85DC65F1351B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_02:*:hpux\\(ipf\\):*:*:*:*:*",
"matchCriteriaId": "498D35C5-D720-4540-87C1-6B5A89C9007F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_02:*:linux:*:*:*:*:*",
"matchCriteriaId": "5B8B0A25-B6D1-4CDF-A797-359C94DC8BC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_04_b:*:aix:*:*:*:*:*",
"matchCriteriaId": "4FBD5964-A65F-468E-98AF-6CBBF0EA6926",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_04_b:*:hpux:*:*:*:*:*",
"matchCriteriaId": "F8C06DC9-FE19-4BEA-9FB8-F892C0668087",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_04_b:*:hpux\\(ipf\\):*:*:*:*:*",
"matchCriteriaId": "1E64D786-872A-4FB8-ABE8-B6B0EA4AF34D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_04_b:*:solaris:*:*:*:*:*",
"matchCriteriaId": "4DAB1871-2653-4F96-A65F-F0FD7719BC8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_04_b:*:windows:*:*:*:*:*",
"matchCriteriaId": "86C196C5-C8EC-4037-A440-36DAF363DD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_06_a:*:linux:*:*:*:*:*",
"matchCriteriaId": "EBCA3085-482D-4F5A-8E27-FC68CCEF6617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:03_00:*:aix:*:*:*:*:*",
"matchCriteriaId": "3F398CED-1BA2-475A-94A3-8E4E6C2C585C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:03_00:*:hpux\\(ipf\\):*:*:*:*:*",
"matchCriteriaId": "1B69F829-530D-4E51-98F0-CC3DD1109801",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:03_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "BE03563A-F44C-4618-B9C7-0367213A966D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:03_00:*:windows:*:*:*:*:*",
"matchCriteriaId": "57D1E42B-8544-4F05-97E9-43F980F0F3BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:03_00_01:*:solaris:*:*:*:*:*",
"matchCriteriaId": "F9466DD3-C33E-4C36-B527-2D709629BFBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:03_00_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "FC35FB0E-0355-4F64-934B-CA2ECB0084B1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Hitachi Web Server 01-00 through 03-10, as used by certain Cosminexus products, allows remote attackers to inject arbitrary web script or HTML via unspecified HTTP requests that trigger creation of a server-status page."
},
{
"lang": "es",
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Hitachi Web Server 01-00 hasta 03-10, tal y como se usa en determinados productos Cosminexus, permite a atacantes remotos inyectar scripts web o HTML de su elecci\u00f3n mediante peticiones HTTP no especificadas que disparan la creaci\u00f3n de una p\u00e1gina estado-de-servidor."
}
],
"id": "CVE-2007-5809",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2007-11-05T17:46:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/42027"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27421"
},
{
"source": "cve@mitre.org",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-035_e/index-e.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/26271"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/3666"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/42027"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27421"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-035_e/index-e.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/26271"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/3666"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-5810
Vulnerability from fkie_nvd - Published: 2007-11-05 17:46 - Updated: 2025-04-09 00:30
Severity ?
Summary
Hitachi Web Server 01-00 through 03-00-01, as used by certain Cosminexus products, does not properly validate SSL client certificates, which might allow remote attackers to spoof authentication via a client certificate with a forged signature.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4FD8C880-F11E-44A9-85F3-F0977D61C44D",
"versionEndIncluding": "06_51_j",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "649ED27D-43A3-45B6-B33E-3052C927ADA7",
"versionEndIncluding": "06_51_j",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer_light_version_6:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7773DA4-2ED1-46AA-95A2-422DC978838F",
"versionEndIncluding": "06_51_j",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer_professional_version_6:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F74FD551-8D2D-4D3D-B1D5-4B0EF5640F6D",
"versionEndIncluding": "06_51_j",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer_standard_version_6:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A47159F-991A-447B-A5E1-C4ED4E52ADBC",
"versionEndIncluding": "06_51_j",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22962B86-F12E-4290-B748-9FF12DE4A572",
"versionEndIncluding": "04_01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4F061CA-E6D6-4E0C-9AA0-3FE18A499D95",
"versionEndIncluding": "07_50_01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF9B6262-4F8B-45DA-A153-E54423CD8B16",
"versionEndIncluding": "07_50_01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_light:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99EDC467-EAE5-4BD6-BAB7-944DF890A685",
"versionEndIncluding": "06_71_d",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_professional:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C9FE1C85-1D57-4ED3-94FA-BCBAF9A2BD53",
"versionEndIncluding": "07_50_01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_standard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D5FC2D16-9EBB-4D18-AA2A-6C8D1788D60F",
"versionEndIncluding": "07_50_01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_architect:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52475B65-FCC2-418D-9842-BD6197367F5B",
"versionEndIncluding": "07_50_01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67D3AEC5-63FA-4457-9EE4-CE5A2B55B687",
"versionEndIncluding": "07_50_01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_00:*:hpux:*:*:*:*:*",
"matchCriteriaId": "1A0EB6CA-C6BF-4316-9C87-DC6177C54112",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_00:*:solaris:*:*:*:*:*",
"matchCriteriaId": "7839481D-92D1-4252-916B-D5BF0C817B1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_01:*:aix:*:*:*:*:*",
"matchCriteriaId": "DCBE68C6-A9FF-4783-A554-0F2E79B77D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_01:*:linux:*:*:*:*:*",
"matchCriteriaId": "BA1B4996-9789-4E7B-B89C-30719D4CEF0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_01:*:turbolinux:*:*:*:*:*",
"matchCriteriaId": "ACDA910D-7CA8-4B21-9992-C766277598FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_01_d:*:linux:*:*:*:*:*",
"matchCriteriaId": "916B1226-DB50-4C23-BFFE-B61983B20A1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_02_d:*:hpux:*:*:*:*:*",
"matchCriteriaId": "F6BC26AD-3B1F-449A-81C6-8C363620033E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_02_d:*:solaris:*:*:*:*:*",
"matchCriteriaId": "768DC203-A5EE-471F-8290-74877E0F2EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:01_02_e:*:aix:*:*:*:*:*",
"matchCriteriaId": "2A316667-A7C3-48FD-8DDD-3A1B79D5695F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_00:*:aix:*:*:*:*:*",
"matchCriteriaId": "F0EB32A1-4032-4ECA-A02B-B2BC2A03E93C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_00:*:hpux:*:*:*:*:*",
"matchCriteriaId": "24BFFB81-904A-4C48-9015-2DCF9F7F4CAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "200A370A-FBCE-412C-B01A-5E79DE317134",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_00:*:solaris:*:*:*:*:*",
"matchCriteriaId": "EEDEA46C-003C-4A71-8BBC-4214B5D7C84C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_00:*:turbolinux:*:*:*:*:*",
"matchCriteriaId": "CA4D9A0F-21D2-45E8-BC90-BFABDCC1119C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_00:*:windows:*:*:*:*:*",
"matchCriteriaId": "62E9F68B-6A10-430F-BB15-DE9F354053BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_00_a:*:linux:*:*:*:*:*",
"matchCriteriaId": "A2306B1F-810D-4188-BEE3-F49925B5BA8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_02:*:hpux:*:*:*:*:*",
"matchCriteriaId": "D2AA434B-FCDE-4143-A4CA-85DC65F1351B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_02:*:hpux\\(ipf\\):*:*:*:*:*",
"matchCriteriaId": "498D35C5-D720-4540-87C1-6B5A89C9007F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_02:*:linux:*:*:*:*:*",
"matchCriteriaId": "5B8B0A25-B6D1-4CDF-A797-359C94DC8BC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_04_b:*:aix:*:*:*:*:*",
"matchCriteriaId": "4FBD5964-A65F-468E-98AF-6CBBF0EA6926",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_04_b:*:hpux:*:*:*:*:*",
"matchCriteriaId": "F8C06DC9-FE19-4BEA-9FB8-F892C0668087",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_04_b:*:hpux\\(ipf\\):*:*:*:*:*",
"matchCriteriaId": "1E64D786-872A-4FB8-ABE8-B6B0EA4AF34D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_04_b:*:solaris:*:*:*:*:*",
"matchCriteriaId": "4DAB1871-2653-4F96-A65F-F0FD7719BC8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_04_b:*:windows:*:*:*:*:*",
"matchCriteriaId": "86C196C5-C8EC-4037-A440-36DAF363DD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:02_06_a:*:linux:*:*:*:*:*",
"matchCriteriaId": "EBCA3085-482D-4F5A-8E27-FC68CCEF6617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:03_00:*:aix:*:*:*:*:*",
"matchCriteriaId": "3F398CED-1BA2-475A-94A3-8E4E6C2C585C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:03_00:*:hpux\\(ipf\\):*:*:*:*:*",
"matchCriteriaId": "1B69F829-530D-4E51-98F0-CC3DD1109801",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:03_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "BE03563A-F44C-4618-B9C7-0367213A966D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:03_00:*:windows:*:*:*:*:*",
"matchCriteriaId": "57D1E42B-8544-4F05-97E9-43F980F0F3BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:03_00_01:*:solaris:*:*:*:*:*",
"matchCriteriaId": "F9466DD3-C33E-4C36-B527-2D709629BFBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:web_server:03_00_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "FC35FB0E-0355-4F64-934B-CA2ECB0084B1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hitachi Web Server 01-00 through 03-00-01, as used by certain Cosminexus products, does not properly validate SSL client certificates, which might allow remote attackers to spoof authentication via a client certificate with a forged signature."
},
{
"lang": "es",
"value": "Hitachi Web Server 01-00 hasta 03-00-01, tal y como se usa en determinados productos Cosminexus, no valida apropiadamente certificados SSL cliente, lo cual podr\u00eda permitir a atacantes remotos suplantar autenticaci\u00f3n mediante un certificado cliente con una firma falsificada."
}
],
"id": "CVE-2007-5810",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-11-05T17:46:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/42026"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27421"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-034_e/index-e.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/26271"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/3666"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/42026"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27421"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-034_e/index-e.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/26271"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/3666"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-5281
Vulnerability from fkie_nvd - Published: 2007-10-09 00:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
The Java Secure Socket Extension (JSSE) in the Hitachi Cosminexus Developer's Kit for Java in various Hitachi Cosminexus 7.5 products before 07-50-01, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service via certain SSL/TLS handshake requests. NOTE: this may be the same as CVE-2007-3698.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| hitachi | ucosminexus_application_server_enterprise | 07_50 | |
| hitachi | ucosminexus_application_server_standard | 7_50 | |
| hitachi | ucosminexus_client | 07_50 | |
| hitachi | ucosminexus_developer_professional | 07_50 | |
| hitachi | ucosminexus_developer_standard | 07_50 | |
| hitachi | ucosminexus_operator | 07_50 | |
| hitachi | ucosminexus_service_architect | 7_50 | |
| hitachi | ucosminexus_service_platform | 7_50 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_50:*:*:*:*:*:*:*",
"matchCriteriaId": "C6E11EDF-8238-4AEB-A058-CED760CE9214",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_50:*:*:*:*:*:*:*",
"matchCriteriaId": "1470F180-D3C4-406B-9CFA-924E7A5983E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_client:07_50:*:*:*:*:*:*:*",
"matchCriteriaId": "38B912C7-BD9D-49E5-8A01-62261CD59C34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_professional:07_50:*:*:*:*:*:*:*",
"matchCriteriaId": "E183498D-EB6B-4E73-AEC5-189AE2E467E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_standard:07_50:*:*:*:*:*:*:*",
"matchCriteriaId": "8E9DC904-9301-425C-B119-30DB6BD7F103",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_operator:07_50:*:*:*:*:*:*:*",
"matchCriteriaId": "0BA3A273-658B-4BB9-B09D-D3A78ED4C17D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_architect:7_50:*:*:*:*:*:*:*",
"matchCriteriaId": "02231524-3774-4438-986A-BB588AF87DF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:7_50:*:*:*:*:*:*:*",
"matchCriteriaId": "20CBF96F-121C-4B44-9F15-DF8F49D1AC91",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Java Secure Socket Extension (JSSE) in the Hitachi Cosminexus Developer\u0027s Kit for Java in various Hitachi Cosminexus 7.5 products before 07-50-01, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service via certain SSL/TLS handshake requests. NOTE: this may be the same as CVE-2007-3698."
},
{
"lang": "es",
"value": "La extensi\u00f3n Java Secure Socket Extension (JSSE) en el Hitachi Cosminexus Developer\u0027s Kit para Java de varios productos Hitachi Cosminexus 7.5 anteriores a 07-50-01, cuando usan JSSE para el soporte SSL/TLS, permite a atacantes remotos provocar una denegaci\u00f3n de servicio mediante determinadas peticiones de negociaci\u00f3n SSL/TLS. NOTA: podr\u00eda ser la misma que CVE-2007-3698."
}
],
"id": "CVE-2007-5281",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-10-09T00:17:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27075"
},
{
"source": "cve@mitre.org",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-031_e/index-e.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/25935"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/3375"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36965"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27075"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-031_e/index-e.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/25935"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/3375"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36965"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-4759
Vulnerability from fkie_nvd - Published: 2007-09-08 10:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in the image-processing APIs in Cosminexus Developer's Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service via unspecified vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:aix:*:*:*:*:*",
"matchCriteriaId": "F6FE70C8-749C-40A0-B087-14FDB6097CD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "2FE5D346-61E9-489B-9529-AA559E111DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "E0E60F8E-0116-4215-8E52-1A663ECB834B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:solaris:*:*:*:*:*",
"matchCriteriaId": "4FAC97A3-04E7-425C-AD8F-B75838E975FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:windows:*:*:*:*:*",
"matchCriteriaId": "5A9DA03E-0164-465C-A819-E3AA7A0ECD89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_01:*:linux:*:*:*:*:*",
"matchCriteriaId": "F2FB1026-648E-4FF0-AE95-F5D3115CA67F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_01:*:solaris:*:*:*:*:*",
"matchCriteriaId": "3B1FFC3F-0948-446F-8539-D6362377DBFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "2921E3C5-EF08-4612-B72E-7DABC0A8142E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_02:*:windows:*:*:*:*:*",
"matchCriteriaId": "BD3A10B2-C904-45FD-9DAE-30DC00FA7326",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_03:*:windows:*:*:*:*:*",
"matchCriteriaId": "F6D8E1AA-B2CA-4029-8F25-35EEB0F15891",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:aix:*:*:*:*:*",
"matchCriteriaId": "48E93BDB-BB6D-4D1C-B3DD-3518E045F753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux:*:*:*:*:*",
"matchCriteriaId": "82648C13-1D91-4C4C-A17B-64BCC5A24147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "12382EE9-4D34-4724-9023-5F6C48944F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux:*:*:*:*:*",
"matchCriteriaId": "8453ECF8-9419-4AD3-9541-B362FA58E4E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "B0316DD8-E2EB-4953-96BC-894B87D6C815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:windows:*:*:*:*:*",
"matchCriteriaId": "CD5BC0AF-7872-4FC3-91CE-78EB0AF481F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_01:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "4103CEB4-1EAD-4359-A519-A90DC885ABDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_01:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "803D406B-49B9-45C5-AA8E-86ACD1A7D5D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "0F715E02-BCFE-46E9-B3EC-53A3B9207426",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:7_20:*:windows:*:*:*:*:*",
"matchCriteriaId": "B64A3CE1-C2DC-470C-BDFB-2242C3A5614D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:7_20_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "DFB8F345-6CA2-45FF-B583-BABB75A7947D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:aix:*:*:*:*:*",
"matchCriteriaId": "1F7055A9-7A8A-4EB0-B202-220825B3FBEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "4919D1DA-37C9-4C18-8F5B-C0BC6F6915D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "20ED59C6-CD06-4FE1-A484-A7E642F33AFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:solaris:*:*:*:*:*",
"matchCriteriaId": "58266C54-32FE-4E5D-94A8-4291A87208EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:windows:*:*:*:*:*",
"matchCriteriaId": "F7043AE7-5CB7-4A64-B4FA-DE4A9C393146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "5320D21A-C58E-47ED-8F7D-563F5A8E97CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:liniux:*:*:*:*:*",
"matchCriteriaId": "253875EB-69D3-4D64-926A-71108AAF347F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:solaris:*:*:*:*:*",
"matchCriteriaId": "9535228E-72D4-4779-9A31-6F82D2B84B01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "5FBAAC3A-A4BD-4C12-85E4-D1535E7702BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_02:*:windows:*:*:*:*:*",
"matchCriteriaId": "03E3C4E7-975C-4377-B2A7-EB5EB19F3C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_03:*:windows:*:*:*:*:*",
"matchCriteriaId": "A8A86ABB-0383-4C45-9E97-BB4DCC5CCE66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:aix:*:*:*:*:*",
"matchCriteriaId": "E24A1554-C2AB-4931-8D27-9225EFE7B6C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux:*:*:*:*:*",
"matchCriteriaId": "930CA326-7B3E-4C46-8DD1-CB17CD0CC5FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "6511A0F9-6B01-49E1-8693-B6EC044DDB3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux:*:*:*:*:*",
"matchCriteriaId": "0E5A504F-C4B1-44EC-A7AC-8690CF925B0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "84BE463B-0A3E-477C-B912-966625887D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:windows:*:*:*:*:*",
"matchCriteriaId": "C4A7C88F-8B18-4D58-AC37-90E2AE658AEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_10_01:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "317A5BF8-0663-4D1A-8172-B90B962E0466",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_10_01:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "C5DF4BB1-43AE-4743-9F06-43B643D33EEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_10_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "42A988DB-2BA0-45B2-872C-D2A29CEA9FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_20:*:windows:*:*:*:*:*",
"matchCriteriaId": "6C6D711C-6F5F-436E-BF01-E26864A5E887",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_20_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "50F294FD-E70E-481A-809C-650320FEB9FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "0CADDEE7-D529-4644-9A5F-6235AD072CCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00:*:windows:*:*:*:*:*",
"matchCriteriaId": "665CBCC5-7598-47C1-97F7-8FDF1A67E98F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_01:*:linux:*:*:*:*:*",
"matchCriteriaId": "A823185B-DB4D-4076-9B41-5C0736C39EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "7EF49ED1-F86B-4F29-AC16-BDA1AEDD6FA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_02:*:windows:*:*:*:*:*",
"matchCriteriaId": "C0B5CCBA-6DAE-4F4A-8113-536D2DD1A2D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_03:*:windows:*:*:*:*:*",
"matchCriteriaId": "6F95EE9A-7567-45D4-8730-EC4F6D8FA540",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:linux:*:*:*:*:*",
"matchCriteriaId": "CED6A3B7-F58D-47BE-81DB-59AC0DFC7F41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "5B35D672-2560-4783-A74E-9FBDE3059A47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:windows:*:*:*:*:*",
"matchCriteriaId": "E56AD9B5-404C-4B36-B625-15A69336B697",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10_01:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "4027CD44-E1E5-4CA3-AC5F-41A4B21B74AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "FC4633F6-5779-4196-B8AF-C3DD4089D43B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_20:*:windows:*:*:*:*:*",
"matchCriteriaId": "C7FB7277-F1D3-4492-9CB2-95E0E8D3FACF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:7_20_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "B5B8AA9F-4D66-4A33-AF2C-95AAAEE2E917",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the image-processing APIs in Cosminexus Developer\u0027s Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service via unspecified vectors."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades no especificadas en las APIs image-processing del Kit para Java: Cosminexus Developer\u0027s de Cosminexus 4 hasta 7 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio mediante vectores no especificados.\r\n"
}
],
"id": "CVE-2007-4759",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-09-08T10:17:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/37858"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26538"
},
{
"source": "cve@mitre.org",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/3034"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/37858"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26538"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/3034"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-4760
Vulnerability from fkie_nvd - Published: 2007-09-08 10:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
The javadoc tool in Cosminexus Developer's Kit for Java in Cosminexus 7 and 7.5 can generate HTML documents that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this is probably the same issue as CVE-2007-3503.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:aix:*:*:*:*:*",
"matchCriteriaId": "F6FE70C8-749C-40A0-B087-14FDB6097CD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "2FE5D346-61E9-489B-9529-AA559E111DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "E0E60F8E-0116-4215-8E52-1A663ECB834B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:solaris:*:*:*:*:*",
"matchCriteriaId": "4FAC97A3-04E7-425C-AD8F-B75838E975FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:windows:*:*:*:*:*",
"matchCriteriaId": "5A9DA03E-0164-465C-A819-E3AA7A0ECD89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_01:*:linux:*:*:*:*:*",
"matchCriteriaId": "F2FB1026-648E-4FF0-AE95-F5D3115CA67F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_01:*:solaris:*:*:*:*:*",
"matchCriteriaId": "3B1FFC3F-0948-446F-8539-D6362377DBFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "2921E3C5-EF08-4612-B72E-7DABC0A8142E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_02:*:windows:*:*:*:*:*",
"matchCriteriaId": "BD3A10B2-C904-45FD-9DAE-30DC00FA7326",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_03:*:windows:*:*:*:*:*",
"matchCriteriaId": "F6D8E1AA-B2CA-4029-8F25-35EEB0F15891",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:aix:*:*:*:*:*",
"matchCriteriaId": "48E93BDB-BB6D-4D1C-B3DD-3518E045F753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux:*:*:*:*:*",
"matchCriteriaId": "82648C13-1D91-4C4C-A17B-64BCC5A24147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "12382EE9-4D34-4724-9023-5F6C48944F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux:*:*:*:*:*",
"matchCriteriaId": "8453ECF8-9419-4AD3-9541-B362FA58E4E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "B0316DD8-E2EB-4953-96BC-894B87D6C815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:windows:*:*:*:*:*",
"matchCriteriaId": "CD5BC0AF-7872-4FC3-91CE-78EB0AF481F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_01:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "4103CEB4-1EAD-4359-A519-A90DC885ABDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_01:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "803D406B-49B9-45C5-AA8E-86ACD1A7D5D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "0F715E02-BCFE-46E9-B3EC-53A3B9207426",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:7_20:*:windows:*:*:*:*:*",
"matchCriteriaId": "B64A3CE1-C2DC-470C-BDFB-2242C3A5614D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:7_20_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "DFB8F345-6CA2-45FF-B583-BABB75A7947D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:aix:*:*:*:*:*",
"matchCriteriaId": "1F7055A9-7A8A-4EB0-B202-220825B3FBEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "4919D1DA-37C9-4C18-8F5B-C0BC6F6915D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "20ED59C6-CD06-4FE1-A484-A7E642F33AFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:solaris:*:*:*:*:*",
"matchCriteriaId": "58266C54-32FE-4E5D-94A8-4291A87208EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:windows:*:*:*:*:*",
"matchCriteriaId": "F7043AE7-5CB7-4A64-B4FA-DE4A9C393146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "5320D21A-C58E-47ED-8F7D-563F5A8E97CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:liniux:*:*:*:*:*",
"matchCriteriaId": "253875EB-69D3-4D64-926A-71108AAF347F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:solaris:*:*:*:*:*",
"matchCriteriaId": "9535228E-72D4-4779-9A31-6F82D2B84B01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "5FBAAC3A-A4BD-4C12-85E4-D1535E7702BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_02:*:windows:*:*:*:*:*",
"matchCriteriaId": "03E3C4E7-975C-4377-B2A7-EB5EB19F3C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_03:*:windows:*:*:*:*:*",
"matchCriteriaId": "A8A86ABB-0383-4C45-9E97-BB4DCC5CCE66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:aix:*:*:*:*:*",
"matchCriteriaId": "E24A1554-C2AB-4931-8D27-9225EFE7B6C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux:*:*:*:*:*",
"matchCriteriaId": "930CA326-7B3E-4C46-8DD1-CB17CD0CC5FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "6511A0F9-6B01-49E1-8693-B6EC044DDB3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux:*:*:*:*:*",
"matchCriteriaId": "0E5A504F-C4B1-44EC-A7AC-8690CF925B0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "84BE463B-0A3E-477C-B912-966625887D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:windows:*:*:*:*:*",
"matchCriteriaId": "C4A7C88F-8B18-4D58-AC37-90E2AE658AEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_10_01:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "317A5BF8-0663-4D1A-8172-B90B962E0466",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_10_01:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "C5DF4BB1-43AE-4743-9F06-43B643D33EEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_10_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "42A988DB-2BA0-45B2-872C-D2A29CEA9FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_20:*:windows:*:*:*:*:*",
"matchCriteriaId": "6C6D711C-6F5F-436E-BF01-E26864A5E887",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_20_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "50F294FD-E70E-481A-809C-650320FEB9FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_standard:07_00:*:windows:*:*:*:*:*",
"matchCriteriaId": "BCF9F6C9-B3C5-4295-B354-270F291B621B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_standard:07_00_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "903ACB08-1A37-4096-95B5-7939D5F207F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_standard:07_00_02:*:windows:*:*:*:*:*",
"matchCriteriaId": "80F447C5-3540-4D0C-8C16-B59CB705306C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_standard:07_00_03:*:windows:*:*:*:*:*",
"matchCriteriaId": "2701E4A8-A967-49F3-A1C5-3A104DFDEA8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_standard:07_10:*:windows:*:*:*:*:*",
"matchCriteriaId": "7405A067-D7EC-42EF-967B-5A383B995A59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_standard:07_10_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "8ACA481B-77D3-4A72-874A-379FC705F440",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_standard:07_20:*:windows:*:*:*:*:*",
"matchCriteriaId": "B26B96FC-F166-40B1-83E4-6B468DAADB43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_standard:07_20_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "05A10AC6-7F74-4755-9E41-36F41B49D6D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer_standard:07_50:*:windows:*:*:*:*:*",
"matchCriteriaId": "1DD1DAF5-B116-4F0D-A6FA-8400E40C4004",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "0CADDEE7-D529-4644-9A5F-6235AD072CCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00:*:windows:*:*:*:*:*",
"matchCriteriaId": "665CBCC5-7598-47C1-97F7-8FDF1A67E98F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_01:*:linux:*:*:*:*:*",
"matchCriteriaId": "A823185B-DB4D-4076-9B41-5C0736C39EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "7EF49ED1-F86B-4F29-AC16-BDA1AEDD6FA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_02:*:windows:*:*:*:*:*",
"matchCriteriaId": "C0B5CCBA-6DAE-4F4A-8113-536D2DD1A2D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_03:*:windows:*:*:*:*:*",
"matchCriteriaId": "6F95EE9A-7567-45D4-8730-EC4F6D8FA540",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:linux:*:*:*:*:*",
"matchCriteriaId": "CED6A3B7-F58D-47BE-81DB-59AC0DFC7F41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "5B35D672-2560-4783-A74E-9FBDE3059A47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:windows:*:*:*:*:*",
"matchCriteriaId": "E56AD9B5-404C-4B36-B625-15A69336B697",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10_01:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "4027CD44-E1E5-4CA3-AC5F-41A4B21B74AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "FC4633F6-5779-4196-B8AF-C3DD4089D43B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_20:*:windows:*:*:*:*:*",
"matchCriteriaId": "C7FB7277-F1D3-4492-9CB2-95E0E8D3FACF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:7_20_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "B5B8AA9F-4D66-4A33-AF2C-95AAAEE2E917",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The javadoc tool in Cosminexus Developer\u0027s Kit for Java in Cosminexus 7 and 7.5 can generate HTML documents that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this is probably the same issue as CVE-2007-3503."
},
{
"lang": "es",
"value": "La herramienta javadoc del Kit para Java: Cosminexus Developer\u0027s de Cosminexus 7 y 7.5 puede generar documentos HTML que contienen vulnerabilidades de secuencias de comandos en sitios cruzados (XSS), lo cual permite a atacantes remotos inyectar scripts web o HTML de su elecci\u00f3n mediante vectores no especificados.\r\nNOTA: esto es probablemente id\u00e9ntico a CVE-2007-3503."
}
],
"id": "CVE-2007-4760",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2007-09-08T10:17:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26671"
},
{
"source": "cve@mitre.org",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-027_e/index-e.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/25518"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/3033"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36393"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26671"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-027_e/index-e.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/25518"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/3033"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36393"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-4758
Vulnerability from fkie_nvd - Published: 2007-09-08 10:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple buffer overflows in the image-processing APIs in Cosminexus Developer's Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:aix:*:*:*:*:*",
"matchCriteriaId": "F6FE70C8-749C-40A0-B087-14FDB6097CD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "2FE5D346-61E9-489B-9529-AA559E111DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "E0E60F8E-0116-4215-8E52-1A663ECB834B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:solaris:*:*:*:*:*",
"matchCriteriaId": "4FAC97A3-04E7-425C-AD8F-B75838E975FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:windows:*:*:*:*:*",
"matchCriteriaId": "5A9DA03E-0164-465C-A819-E3AA7A0ECD89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_01:*:linux:*:*:*:*:*",
"matchCriteriaId": "F2FB1026-648E-4FF0-AE95-F5D3115CA67F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_01:*:solaris:*:*:*:*:*",
"matchCriteriaId": "3B1FFC3F-0948-446F-8539-D6362377DBFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "2921E3C5-EF08-4612-B72E-7DABC0A8142E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_02:*:windows:*:*:*:*:*",
"matchCriteriaId": "BD3A10B2-C904-45FD-9DAE-30DC00FA7326",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_03:*:windows:*:*:*:*:*",
"matchCriteriaId": "F6D8E1AA-B2CA-4029-8F25-35EEB0F15891",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:aix:*:*:*:*:*",
"matchCriteriaId": "48E93BDB-BB6D-4D1C-B3DD-3518E045F753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux:*:*:*:*:*",
"matchCriteriaId": "82648C13-1D91-4C4C-A17B-64BCC5A24147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "12382EE9-4D34-4724-9023-5F6C48944F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux:*:*:*:*:*",
"matchCriteriaId": "8453ECF8-9419-4AD3-9541-B362FA58E4E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "B0316DD8-E2EB-4953-96BC-894B87D6C815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:windows:*:*:*:*:*",
"matchCriteriaId": "CD5BC0AF-7872-4FC3-91CE-78EB0AF481F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_01:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "4103CEB4-1EAD-4359-A519-A90DC885ABDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_01:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "803D406B-49B9-45C5-AA8E-86ACD1A7D5D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "0F715E02-BCFE-46E9-B3EC-53A3B9207426",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:7_20:*:windows:*:*:*:*:*",
"matchCriteriaId": "B64A3CE1-C2DC-470C-BDFB-2242C3A5614D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:7_20_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "DFB8F345-6CA2-45FF-B583-BABB75A7947D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:aix:*:*:*:*:*",
"matchCriteriaId": "1F7055A9-7A8A-4EB0-B202-220825B3FBEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "4919D1DA-37C9-4C18-8F5B-C0BC6F6915D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "20ED59C6-CD06-4FE1-A484-A7E642F33AFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:solaris:*:*:*:*:*",
"matchCriteriaId": "58266C54-32FE-4E5D-94A8-4291A87208EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:windows:*:*:*:*:*",
"matchCriteriaId": "F7043AE7-5CB7-4A64-B4FA-DE4A9C393146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "5320D21A-C58E-47ED-8F7D-563F5A8E97CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:liniux:*:*:*:*:*",
"matchCriteriaId": "253875EB-69D3-4D64-926A-71108AAF347F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:solaris:*:*:*:*:*",
"matchCriteriaId": "9535228E-72D4-4779-9A31-6F82D2B84B01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "5FBAAC3A-A4BD-4C12-85E4-D1535E7702BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_02:*:windows:*:*:*:*:*",
"matchCriteriaId": "03E3C4E7-975C-4377-B2A7-EB5EB19F3C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_03:*:windows:*:*:*:*:*",
"matchCriteriaId": "A8A86ABB-0383-4C45-9E97-BB4DCC5CCE66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:aix:*:*:*:*:*",
"matchCriteriaId": "E24A1554-C2AB-4931-8D27-9225EFE7B6C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux:*:*:*:*:*",
"matchCriteriaId": "930CA326-7B3E-4C46-8DD1-CB17CD0CC5FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "6511A0F9-6B01-49E1-8693-B6EC044DDB3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux:*:*:*:*:*",
"matchCriteriaId": "0E5A504F-C4B1-44EC-A7AC-8690CF925B0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "84BE463B-0A3E-477C-B912-966625887D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:windows:*:*:*:*:*",
"matchCriteriaId": "C4A7C88F-8B18-4D58-AC37-90E2AE658AEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_10_01:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "317A5BF8-0663-4D1A-8172-B90B962E0466",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_10_01:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "C5DF4BB1-43AE-4743-9F06-43B643D33EEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_10_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "42A988DB-2BA0-45B2-872C-D2A29CEA9FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_20:*:windows:*:*:*:*:*",
"matchCriteriaId": "6C6D711C-6F5F-436E-BF01-E26864A5E887",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:7_20_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "50F294FD-E70E-481A-809C-650320FEB9FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "0CADDEE7-D529-4644-9A5F-6235AD072CCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00:*:windows:*:*:*:*:*",
"matchCriteriaId": "665CBCC5-7598-47C1-97F7-8FDF1A67E98F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_01:*:linux:*:*:*:*:*",
"matchCriteriaId": "A823185B-DB4D-4076-9B41-5C0736C39EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "7EF49ED1-F86B-4F29-AC16-BDA1AEDD6FA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_02:*:windows:*:*:*:*:*",
"matchCriteriaId": "C0B5CCBA-6DAE-4F4A-8113-536D2DD1A2D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00_03:*:windows:*:*:*:*:*",
"matchCriteriaId": "6F95EE9A-7567-45D4-8730-EC4F6D8FA540",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:linux:*:*:*:*:*",
"matchCriteriaId": "CED6A3B7-F58D-47BE-81DB-59AC0DFC7F41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "5B35D672-2560-4783-A74E-9FBDE3059A47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:windows:*:*:*:*:*",
"matchCriteriaId": "E56AD9B5-404C-4B36-B625-15A69336B697",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10_01:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "4027CD44-E1E5-4CA3-AC5F-41A4B21B74AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "FC4633F6-5779-4196-B8AF-C3DD4089D43B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_20:*:windows:*:*:*:*:*",
"matchCriteriaId": "C7FB7277-F1D3-4492-9CB2-95E0E8D3FACF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:7_20_01:*:windows:*:*:*:*:*",
"matchCriteriaId": "B5B8AA9F-4D66-4A33-AF2C-95AAAEE2E917",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in the image-processing APIs in Cosminexus Developer\u0027s Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer en las APIs image-processing del Kit para Java: Cosminexus Developer\u0027s de Cosminexus 4 hasta 7 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio \u00f3 ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados."
}
],
"id": "CVE-2007-4758",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-09-08T10:17:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/37857"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26538"
},
{
"source": "cve@mitre.org",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/3034"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/37857"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26538"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/3034"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-4564
Vulnerability from fkie_nvd - Published: 2007-08-28 01:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cosminexus Manager in Cosminexus Application Server 07-00 and later might assign the wrong user's group permissions to logical user server processes, which allows local users to gain privileges.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:aix:*:*:*:*:*",
"matchCriteriaId": "F7AA2F96-CF8B-47ED-87EA-75DF8D90E3AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:hpux:*:*:*:*:*",
"matchCriteriaId": "236D9E91-37DE-4D43-90A4-765800D76DBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:linux:*:*:*:*:*",
"matchCriteriaId": "49F54B21-D9CF-41B7-88F9-C70261925B09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "5D1C24CE-3B20-44B5-BE21-2FAD1CCC9EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:solaris:*:*:*:*:*",
"matchCriteriaId": "C9A0DB59-010E-4945-A6B1-694269838299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_b:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "90219723-B2D7-4E35-94E0-B12FF452AA99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_c:*:linux:*:*:*:*:*",
"matchCriteriaId": "BE770156-FDF2-4818-A7F8-9062D7132CBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_c_1:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "74E73757-B69E-461D-B0BC-06FA6D321E5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_c_1:*:solaris:*:*:*:*:*",
"matchCriteriaId": "13E1CC0C-4322-4F78-B24D-638AF7D7CD70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_e_1:*:hpux:*:*:*:*:*",
"matchCriteriaId": "662B20FF-8BB3-431E-A1DD-251A587B399E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_f:*:aix:*:*:*:*:*",
"matchCriteriaId": "995EA2B9-DC6E-4393-BAFC-9A5550DE653A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_51:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "8C494CF0-A0AF-4435-B273-0A0754985640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_51_b_1:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "2B4131DA-3B12-459E-AE98-978FB496270C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_51_c:*:linux:*:*:*:*:*",
"matchCriteriaId": "1A137E25-6B8A-4861-8DEA-F19DCBDFD955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:aix:*:*:*:*:*",
"matchCriteriaId": "6F823A2E-4D86-4C9B-ABDA-252B72FA0113",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:hpux:*:*:*:*:*",
"matchCriteriaId": "F4511C24-ADD2-4DB6-A21C-25AEE1BCD9E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "FA466BD3-AD09-44FB-99AE-4D5F883C32F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:linux:*:*:*:*:*",
"matchCriteriaId": "D4BEEF1B-27CE-476C-BDF7-1922D94D8BF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "AE9F2873-D1B8-40C5-BBE7-85D8875FAABD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_b:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "79422655-ECE2-41DD-8319-747B0DDF22CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_c:*:linux:*:*:*:*:*",
"matchCriteriaId": "E5D936F5-A4BA-4303-8185-0E3B9DD21E98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_c_1:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "8D272DC2-7A28-478D-B6F2-B0A6825A4E37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_c_1:*:solaris:*:*:*:*:*",
"matchCriteriaId": "1AE1BC52-7D66-4156-A965-3392D0F25F97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_e_1:*:hpux:*:*:*:*:*",
"matchCriteriaId": "58D341DC-1558-42AD-A328-6ABE3DD4142E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_f:*:aix:*:*:*:*:*",
"matchCriteriaId": "3BAB8404-E909-4DDD-9D1E-145FCDAB9C3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_51:*:linux:*:*:*:*:*",
"matchCriteriaId": "456D38AB-D5B4-47C4-AA93-B82CD97CEBAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_51:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "A5A2201A-F2EF-4324-9D48-D11908E12261",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_51_b_1:*:linux:*:*:*:*:*",
"matchCriteriaId": "310697C7-2238-492A-BAD5-D9F7C3A568F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_51_c:*:linux:*:*:*:*:*",
"matchCriteriaId": "A5B8211D-EA3C-49BA-A37B-A6BFBBA00F8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_-_standard_set:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "7E107823-9EF7-4716-9C75-1BB0E3432CA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_-_standard_set:07_00_b:*:linux:*:*:*:*:*",
"matchCriteriaId": "226CB6F1-1E01-40E5-97D9-5FD93EF74B94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_-professional_library_set:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "1D153999-0B49-4C8F-B949-3FDBCD67906C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_-professional_library_set:07_00_b:*:linux:*:*:*:*:*",
"matchCriteriaId": "455233D1-131E-4384-857C-8165974DCA48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70:*:aix:*:*:*:*:*",
"matchCriteriaId": "18967E4A-3D79-49AD-97B1-EB4328949729",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70:*:solaris:*:*:*:*:*",
"matchCriteriaId": "7E7A6668-41D5-4AF3-9A20-EEC00781F68C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_a:*:aix:*:*:*:*:*",
"matchCriteriaId": "D9DFC8FF-7618-42A6-A8DB-4D7A75DE5C3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_a:*:solaris:*:*:*:*:*",
"matchCriteriaId": "6E676236-8986-45F8-B720-84A5156B6DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b:*:aix:*:*:*:*:*",
"matchCriteriaId": "43BA2D74-289E-4201-8F4B-78E8E64CA358",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "51A48F4D-6E53-4CD0-BEBA-8882393A7A73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "B55FE085-3CCD-4DF9-A2BD-F22FC4EF940A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b:*:solaris:*:*:*:*:*",
"matchCriteriaId": "2D3E1E8D-D75F-49AB-B086-58EF334A084F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b_1:*:linux:*:*:*:*:*",
"matchCriteriaId": "982584F4-A3EA-4B71-B084-8A80927092CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_d:*:aix:*:*:*:*:*",
"matchCriteriaId": "F60ED027-FD72-47F8-9230-DAEF1B218B1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_g:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "6B7B56A8-E705-4B9D-8763-EF281F875802",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_71:*:linux:*:*:*:*:*",
"matchCriteriaId": "D4B082D2-0E8C-4442-9E92-7867C0D3F1CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_71_b:*:hpux:*:*:*:*:*",
"matchCriteriaId": "7B06B22B-5DE0-4AD3-9056-80FE5D02EC13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_71_b:*:linux:*:*:*:*:*",
"matchCriteriaId": "19B0E862-F36A-4419-B8AC-BB3B0B28A3BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_71_c:*:solaris:*:*:*:*:*",
"matchCriteriaId": "B7E09F38-1B66-404B-9E22-A1B2D1464AE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_72_1:*:hpux:*:*:*:*:*",
"matchCriteriaId": "26D40FE4-7956-4D87-9DA2-99E6F62B6525",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_72_b:*:linux:*:*:*:*:*",
"matchCriteriaId": "F16F6336-42F5-4941-B700-73DAEDE83E7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_72_b:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "191D1364-D6F1-4778-B765-7AF0D18439BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_72_g:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "D363EB0D-F881-45ED-A3E0-1148BC648889",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07-00-01:*:linux:*:*:*:*:*",
"matchCriteriaId": "45A8B520-1678-47D2-8D1B-AB6BA818DBE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:aix:*:*:*:*:*",
"matchCriteriaId": "F6FE70C8-749C-40A0-B087-14FDB6097CD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "2FE5D346-61E9-489B-9529-AA559E111DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "E0E60F8E-0116-4215-8E52-1A663ECB834B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:solaris:*:*:*:*:*",
"matchCriteriaId": "4FAC97A3-04E7-425C-AD8F-B75838E975FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_12:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "A5934C16-A21C-4275-89CA-B1287F8BAFE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:aix:*:*:*:*:*",
"matchCriteriaId": "48E93BDB-BB6D-4D1C-B3DD-3518E045F753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux:*:*:*:*:*",
"matchCriteriaId": "82648C13-1D91-4C4C-A17B-64BCC5A24147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "12382EE9-4D34-4724-9023-5F6C48944F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux:*:*:*:*:*",
"matchCriteriaId": "8453ECF8-9419-4AD3-9541-B362FA58E4E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "B0316DD8-E2EB-4953-96BC-894B87D6C815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_1:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "01D417A7-FB2E-4813-AEF3-9F136AB8106B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_06:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "ED59C48E-BA08-4E29-BB01-9F22CC20D7C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_08:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "FE697045-8D42-43E0-8C98-7961E21E2B32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70:*:solaris:*:*:*:*:*",
"matchCriteriaId": "673C833D-A7F8-4941-B7F9-AC17E67FB717",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_a:*:aix:*:*:*:*:*",
"matchCriteriaId": "E9E62188-DCA4-4749-A451-9A12E9F53B5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_a:*:solaris:*:*:*:*:*",
"matchCriteriaId": "569AC136-11EE-47A6-8150-F983768AE58B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b:*:aix:*:*:*:*:*",
"matchCriteriaId": "65CA666D-E597-45C2-9DBF-DD728B5480AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b:*:hpux:*:*:*:*:*",
"matchCriteriaId": "5DEB6A9B-A029-4F70-95E7-16DD33D736E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "5F8C5DC3-CF27-4AED-B97B-03DFCD743746",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b:*:solaris:*:*:*:*:*",
"matchCriteriaId": "39E1498C-6267-4266-B7E6-A1E70CF25A03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b_1:*:linux:*:*:*:*:*",
"matchCriteriaId": "CAA364D2-B6AB-4BEE-BBC6-D9C9BED57CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_c:*:solaris:*:*:*:*:*",
"matchCriteriaId": "A68736B4-66E3-45E4-9B3A-222E0F4463BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_d:*:aix:*:*:*:*:*",
"matchCriteriaId": "A62CCAA4-8156-4E05-8A96-81558F478C59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_71:*:linux:*:*:*:*:*",
"matchCriteriaId": "45D28BE6-DA8F-433B-84FA-35965A7C02A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_71_b:*:linux:*:*:*:*:*",
"matchCriteriaId": "D0DF3D57-8E23-4293-883A-BDF555CA7048",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_1:*:hpux:*:*:*:*:*",
"matchCriteriaId": "8C8743DB-CCA4-4519-847E-7FDA353026F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_b_1:*:linux:*:*:*:*:*",
"matchCriteriaId": "9BBE9283-5E06-4F2E-AA14-4B536C20AC61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_c:*:solaris:*:*:*:*:*",
"matchCriteriaId": "386B6C72-C5EF-47A0-B6F5-E0B50C042FEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_d:*:aix:*:*:*:*:*",
"matchCriteriaId": "13509F94-3953-4E87-BBB5-02FA5EACC024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_g:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "B4B51A86-7C91-454D-8A71-6E652ACE948C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:aix:*:*:*:*:*",
"matchCriteriaId": "1F7055A9-7A8A-4EB0-B202-220825B3FBEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "4919D1DA-37C9-4C18-8F5B-C0BC6F6915D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "20ED59C6-CD06-4FE1-A484-A7E642F33AFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:solaris:*:*:*:*:*",
"matchCriteriaId": "58266C54-32FE-4E5D-94A8-4291A87208EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_1:*:linux:*:*:*:*:*",
"matchCriteriaId": "725FA408-39B0-4A14-946C-6BDAB6E0FE4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux:*:*:*:*:*",
"matchCriteriaId": "930CA326-7B3E-4C46-8DD1-CB17CD0CC5FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "6511A0F9-6B01-49E1-8693-B6EC044DDB3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux:*:*:*:*:*",
"matchCriteriaId": "0E5A504F-C4B1-44EC-A7AC-8690CF925B0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "84BE463B-0A3E-477C-B912-966625887D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "0CADDEE7-D529-4644-9A5F-6235AD072CCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:aix:*:*:*:*:*",
"matchCriteriaId": "1D1DAE56-DEA3-45C3-AFD7-1C40F6C62CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:linux:*:*:*:*:*",
"matchCriteriaId": "CED6A3B7-F58D-47BE-81DB-59AC0DFC7F41",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cosminexus Manager in Cosminexus Application Server 07-00 and later might assign the wrong user\u0027s group permissions to logical user server processes, which allows local users to gain privileges."
},
{
"lang": "es",
"value": "Cosminexus Manager en Cosminexus Application Server 07-00 y posteriores podr\u00edan asignar permisos de grupos de usuarios de forma incorrecta a procesos del servidor de l\u00f3gica de usuario, el cual permite a usuarios locales ganar privilegios."
}
],
"id": "CVE-2007-4564",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-08-28T01:17:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/37855"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26589"
},
{
"source": "cve@mitre.org",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/25434"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/37855"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26589"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/25434"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-4563
Vulnerability from fkie_nvd - Published: 2007-08-28 01:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cosminexus Manager in Cosminexus Application Server 06-50 and later might assign the wrong user's group permissions to logical J2EE server processes, which allows local users to gain privileges.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:aix:*:*:*:*:*",
"matchCriteriaId": "F7AA2F96-CF8B-47ED-87EA-75DF8D90E3AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:hpux:*:*:*:*:*",
"matchCriteriaId": "236D9E91-37DE-4D43-90A4-765800D76DBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:linux:*:*:*:*:*",
"matchCriteriaId": "49F54B21-D9CF-41B7-88F9-C70261925B09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "5D1C24CE-3B20-44B5-BE21-2FAD1CCC9EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50:*:solaris:*:*:*:*:*",
"matchCriteriaId": "C9A0DB59-010E-4945-A6B1-694269838299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_b:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "90219723-B2D7-4E35-94E0-B12FF452AA99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_c:*:linux:*:*:*:*:*",
"matchCriteriaId": "BE770156-FDF2-4818-A7F8-9062D7132CBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_c_1:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "74E73757-B69E-461D-B0BC-06FA6D321E5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_c_1:*:solaris:*:*:*:*:*",
"matchCriteriaId": "13E1CC0C-4322-4F78-B24D-638AF7D7CD70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_e_1:*:hpux:*:*:*:*:*",
"matchCriteriaId": "662B20FF-8BB3-431E-A1DD-251A587B399E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_50_f:*:aix:*:*:*:*:*",
"matchCriteriaId": "995EA2B9-DC6E-4393-BAFC-9A5550DE653A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_51:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "8C494CF0-A0AF-4435-B273-0A0754985640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_51_b_1:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "2B4131DA-3B12-459E-AE98-978FB496270C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:06_51_c:*:linux:*:*:*:*:*",
"matchCriteriaId": "1A137E25-6B8A-4861-8DEA-F19DCBDFD955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:aix:*:*:*:*:*",
"matchCriteriaId": "6F823A2E-4D86-4C9B-ABDA-252B72FA0113",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:hpux:*:*:*:*:*",
"matchCriteriaId": "F4511C24-ADD2-4DB6-A21C-25AEE1BCD9E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "FA466BD3-AD09-44FB-99AE-4D5F883C32F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:linux:*:*:*:*:*",
"matchCriteriaId": "D4BEEF1B-27CE-476C-BDF7-1922D94D8BF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "AE9F2873-D1B8-40C5-BBE7-85D8875FAABD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_b:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "79422655-ECE2-41DD-8319-747B0DDF22CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_c:*:linux:*:*:*:*:*",
"matchCriteriaId": "E5D936F5-A4BA-4303-8185-0E3B9DD21E98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_c_1:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "8D272DC2-7A28-478D-B6F2-B0A6825A4E37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_c_1:*:solaris:*:*:*:*:*",
"matchCriteriaId": "1AE1BC52-7D66-4156-A965-3392D0F25F97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_e_1:*:hpux:*:*:*:*:*",
"matchCriteriaId": "58D341DC-1558-42AD-A328-6ABE3DD4142E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_50_f:*:aix:*:*:*:*:*",
"matchCriteriaId": "3BAB8404-E909-4DDD-9D1E-145FCDAB9C3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_51:*:linux:*:*:*:*:*",
"matchCriteriaId": "456D38AB-D5B4-47C4-AA93-B82CD97CEBAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_51:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "A5A2201A-F2EF-4324-9D48-D11908E12261",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_51_b_1:*:linux:*:*:*:*:*",
"matchCriteriaId": "310697C7-2238-492A-BAD5-D9F7C3A568F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server_standard:06_51_c:*:linux:*:*:*:*:*",
"matchCriteriaId": "A5B8211D-EA3C-49BA-A37B-A6BFBBA00F8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_-_standard_set:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "7E107823-9EF7-4716-9C75-1BB0E3432CA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_-_standard_set:07_00_b:*:linux:*:*:*:*:*",
"matchCriteriaId": "226CB6F1-1E01-40E5-97D9-5FD93EF74B94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_-professional_library_set:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "1D153999-0B49-4C8F-B949-3FDBCD67906C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow_-professional_library_set:07_00_b:*:linux:*:*:*:*:*",
"matchCriteriaId": "455233D1-131E-4384-857C-8165974DCA48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70:*:aix:*:*:*:*:*",
"matchCriteriaId": "18967E4A-3D79-49AD-97B1-EB4328949729",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70:*:solaris:*:*:*:*:*",
"matchCriteriaId": "7E7A6668-41D5-4AF3-9A20-EEC00781F68C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_a:*:aix:*:*:*:*:*",
"matchCriteriaId": "D9DFC8FF-7618-42A6-A8DB-4D7A75DE5C3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_a:*:solaris:*:*:*:*:*",
"matchCriteriaId": "6E676236-8986-45F8-B720-84A5156B6DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b:*:aix:*:*:*:*:*",
"matchCriteriaId": "43BA2D74-289E-4201-8F4B-78E8E64CA358",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "51A48F4D-6E53-4CD0-BEBA-8882393A7A73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "B55FE085-3CCD-4DF9-A2BD-F22FC4EF940A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b:*:solaris:*:*:*:*:*",
"matchCriteriaId": "2D3E1E8D-D75F-49AB-B086-58EF334A084F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_b_1:*:linux:*:*:*:*:*",
"matchCriteriaId": "982584F4-A3EA-4B71-B084-8A80927092CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_d:*:aix:*:*:*:*:*",
"matchCriteriaId": "F60ED027-FD72-47F8-9230-DAEF1B218B1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_70_g:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "6B7B56A8-E705-4B9D-8763-EF281F875802",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_71:*:linux:*:*:*:*:*",
"matchCriteriaId": "D4B082D2-0E8C-4442-9E92-7867C0D3F1CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_71_b:*:hpux:*:*:*:*:*",
"matchCriteriaId": "7B06B22B-5DE0-4AD3-9056-80FE5D02EC13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_71_b:*:linux:*:*:*:*:*",
"matchCriteriaId": "19B0E862-F36A-4419-B8AC-BB3B0B28A3BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_71_c:*:solaris:*:*:*:*:*",
"matchCriteriaId": "B7E09F38-1B66-404B-9E22-A1B2D1464AE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_72_1:*:hpux:*:*:*:*:*",
"matchCriteriaId": "26D40FE4-7956-4D87-9DA2-99E6F62B6525",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_72_b:*:linux:*:*:*:*:*",
"matchCriteriaId": "F16F6336-42F5-4941-B700-73DAEDE83E7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_72_b:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "191D1364-D6F1-4778-B765-7AF0D18439BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:06_72_g:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "D363EB0D-F881-45ED-A3E0-1148BC648889",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07-00-01:*:linux:*:*:*:*:*",
"matchCriteriaId": "45A8B520-1678-47D2-8D1B-AB6BA818DBE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:aix:*:*:*:*:*",
"matchCriteriaId": "F6FE70C8-749C-40A0-B087-14FDB6097CD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "2FE5D346-61E9-489B-9529-AA559E111DCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "E0E60F8E-0116-4215-8E52-1A663ECB834B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00:*:solaris:*:*:*:*:*",
"matchCriteriaId": "4FAC97A3-04E7-425C-AD8F-B75838E975FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_00_12:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "A5934C16-A21C-4275-89CA-B1287F8BAFE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:aix:*:*:*:*:*",
"matchCriteriaId": "48E93BDB-BB6D-4D1C-B3DD-3518E045F753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux:*:*:*:*:*",
"matchCriteriaId": "82648C13-1D91-4C4C-A17B-64BCC5A24147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "12382EE9-4D34-4724-9023-5F6C48944F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux:*:*:*:*:*",
"matchCriteriaId": "8453ECF8-9419-4AD3-9541-B362FA58E4E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "B0316DD8-E2EB-4953-96BC-894B87D6C815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_1:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "01D417A7-FB2E-4813-AEF3-9F136AB8106B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_06:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "ED59C48E-BA08-4E29-BB01-9F22CC20D7C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:07_10_08:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "FE697045-8D42-43E0-8C98-7961E21E2B32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70:*:solaris:*:*:*:*:*",
"matchCriteriaId": "673C833D-A7F8-4941-B7F9-AC17E67FB717",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_a:*:aix:*:*:*:*:*",
"matchCriteriaId": "E9E62188-DCA4-4749-A451-9A12E9F53B5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_a:*:solaris:*:*:*:*:*",
"matchCriteriaId": "569AC136-11EE-47A6-8150-F983768AE58B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b:*:aix:*:*:*:*:*",
"matchCriteriaId": "65CA666D-E597-45C2-9DBF-DD728B5480AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b:*:hpux:*:*:*:*:*",
"matchCriteriaId": "5DEB6A9B-A029-4F70-95E7-16DD33D736E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "5F8C5DC3-CF27-4AED-B97B-03DFCD743746",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b:*:solaris:*:*:*:*:*",
"matchCriteriaId": "39E1498C-6267-4266-B7E6-A1E70CF25A03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_b_1:*:linux:*:*:*:*:*",
"matchCriteriaId": "CAA364D2-B6AB-4BEE-BBC6-D9C9BED57CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_c:*:solaris:*:*:*:*:*",
"matchCriteriaId": "A68736B4-66E3-45E4-9B3A-222E0F4463BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_70_d:*:aix:*:*:*:*:*",
"matchCriteriaId": "A62CCAA4-8156-4E05-8A96-81558F478C59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_71:*:linux:*:*:*:*:*",
"matchCriteriaId": "45D28BE6-DA8F-433B-84FA-35965A7C02A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_71_b:*:linux:*:*:*:*:*",
"matchCriteriaId": "D0DF3D57-8E23-4293-883A-BDF555CA7048",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_1:*:hpux:*:*:*:*:*",
"matchCriteriaId": "8C8743DB-CCA4-4519-847E-7FDA353026F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_b_1:*:linux:*:*:*:*:*",
"matchCriteriaId": "9BBE9283-5E06-4F2E-AA14-4B536C20AC61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_c:*:solaris:*:*:*:*:*",
"matchCriteriaId": "386B6C72-C5EF-47A0-B6F5-E0B50C042FEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_d:*:aix:*:*:*:*:*",
"matchCriteriaId": "13509F94-3953-4E87-BBB5-02FA5EACC024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:06_72_g:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "B4B51A86-7C91-454D-8A71-6E652ACE948C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:aix:*:*:*:*:*",
"matchCriteriaId": "1F7055A9-7A8A-4EB0-B202-220825B3FBEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "4919D1DA-37C9-4C18-8F5B-C0BC6F6915D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "20ED59C6-CD06-4FE1-A484-A7E642F33AFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00:*:solaris:*:*:*:*:*",
"matchCriteriaId": "58266C54-32FE-4E5D-94A8-4291A87208EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_00_1:*:linux:*:*:*:*:*",
"matchCriteriaId": "725FA408-39B0-4A14-946C-6BDAB6E0FE4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux:*:*:*:*:*",
"matchCriteriaId": "930CA326-7B3E-4C46-8DD1-CB17CD0CC5FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:hpux_ipf:*:*:*:*:*",
"matchCriteriaId": "6511A0F9-6B01-49E1-8693-B6EC044DDB3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux:*:*:*:*:*",
"matchCriteriaId": "0E5A504F-C4B1-44EC-A7AC-8690CF925B0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server_standard:07_10:*:linux_ipf:*:*:*:*:*",
"matchCriteriaId": "84BE463B-0A3E-477C-B912-966625887D65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_00:*:linux:*:*:*:*:*",
"matchCriteriaId": "0CADDEE7-D529-4644-9A5F-6235AD072CCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:aix:*:*:*:*:*",
"matchCriteriaId": "1D1DAE56-DEA3-45C3-AFD7-1C40F6C62CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:07_10:*:linux:*:*:*:*:*",
"matchCriteriaId": "CED6A3B7-F58D-47BE-81DB-59AC0DFC7F41",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cosminexus Manager in Cosminexus Application Server 06-50 and later might assign the wrong user\u0027s group permissions to logical J2EE server processes, which allows local users to gain privileges."
},
{
"lang": "es",
"value": "Cosminexus Manager en Cosminexus Application Server 06-50 y posteriores podr\u00edan asignar los permisos de grupos de usuario erroneamente a los procesos del servidor l\u00f3gico J2EE, el cual permite a usuarios locales ganar privilegios."
}
],
"id": "CVE-2007-4563",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-08-28T01:17:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/37854"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26589"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/25434"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/37854"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26589"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/25434"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-4124
Vulnerability from fkie_nvd - Published: 2007-08-01 16:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
The session failover function in Cosminexus Component Container in Cosminexus 6, 6.7, and 7 before 20070731, as used in multiple Hitachi products, can use session data for the wrong user under unspecified conditions, which might allow remote authenticated users to obtain sensitive information, corrupt another user's session data, and possibly gain privileges.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:6:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "336AC0E8-01DB-4D75-8F9F-E1673BE7883A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_application_server:6:*:standard:*:*:*:*:*",
"matchCriteriaId": "B2306ACE-7FC7-4B52-AAE8-436A606C5041",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_collaboration_portal:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA4E08A2-D531-4DE2-B449-48B8AA11F365",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:6:*:light:*:*:*:*:*",
"matchCriteriaId": "44328F8D-C3B7-45CD-B01D-69328275C5A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:6:*:professional:*:*:*:*:*",
"matchCriteriaId": "43EFBD4E-DC14-4142-8128-B4261431E8FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_developer:6:*:standard:*:*:*:*:*",
"matchCriteriaId": "7A7BE1FF-7B19-4F3F-B02D-2AA27B38F088",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_erp_integrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84DD23A3-EC26-4805-BCCC-9F6B1EED60D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:cosminexus_opentp1_web_front-end_set:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CACCCE63-723C-449B-9661-FCE9FA94DD65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow:*:*:developer_client_set:*:*:*:*:*",
"matchCriteriaId": "945C66CA-31DB-408D-BD4B-D023381F5DF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow:*:*:professional_library_set:*:*:*:*:*",
"matchCriteriaId": "424670C5-82C6-44E0-A3C0-4391F254E6BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow:*:*:standard_set:*:*:*:*:*",
"matchCriteriaId": "182C9BBE-DA39-412C-868A-CCDE7E4399CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:*:*:server:*:*:*:*:*",
"matchCriteriaId": "3A8F4CE3-0710-4F68-B8C3-31B5F4E13BA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:*:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "F374179A-7C0D-48B2-B0FF-39F5D4A7E37B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:*:*:standard:*:*:*:*:*",
"matchCriteriaId": "272AD10C-E135-4EEE-8F48-E28CF5F7B3D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:*:*:server:*:*:*:*:*",
"matchCriteriaId": "271FC231-03E1-4C99-B9F3-A8536503B71B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:*:*:light:*:*:*:*:*",
"matchCriteriaId": "8E2D80C1-773F-4C43-B990-2575782E619C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:*:*:professional:*:*:*:*:*",
"matchCriteriaId": "03011EFF-6C5F-40F2-BF6D-FE4DE0E6F552",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:*:*:standard:*:*:*:*:*",
"matchCriteriaId": "415BE30B-0222-4C2F-9791-273469DB5BED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_erp_integrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C963599-5B39-40A0-A834-E738164B3531",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_opentp1_web_front-end_set:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C564AA10-5286-4986-A580-61EC7A746352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_architect:*:*:*:*:*:*:*:*",
"matchCriteriaId": "354BD4CE-7B1A-4442-9F87-08CD70D9499E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "72E63548-3AB3-4B78-AA2D-5B2AC7E06DD7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The session failover function in Cosminexus Component Container in Cosminexus 6, 6.7, and 7 before 20070731, as used in multiple Hitachi products, can use session data for the wrong user under unspecified conditions, which might allow remote authenticated users to obtain sensitive information, corrupt another user\u0027s session data, and possibly gain privileges."
},
{
"lang": "es",
"value": "La funci\u00f3n de recuperaci\u00f3n de sesi\u00f3n ante fallos en Cosminexus Component Container de Cosminexus 6, 6.7, y 7 anterior al 31/07/2007, como el usado en m\u00faltiples productos de Hitachi, puede utilizar informaci\u00f3n de la sesi\u00f3n para el usuario equivocado bajo ciertas condiciones no especificadas, lo cual podr\u00eda permitir a usuarios autenticados remotos obtener informaci\u00f3n sensible, corromper la informaci\u00f3n de sesi\u00f3n de otros usuarios, y posiblemente obtener privilegios."
}
],
"id": "CVE-2007-4124",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2007-08-01T16:17:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/37852"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26250"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-024_e/index-e.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/25145"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/2725"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35706"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/37852"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26250"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-024_e/index-e.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/25145"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/2725"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35706"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2009-4776 (GCVE-0-2009-4776)
Vulnerability from cvelistv5 – Published: 2010-04-21 14:00 – Updated: 2024-09-16 17:58
VLAI?
Summary
Buffer overflow in Hitachi Cosminexus V4 through V8, Processing Kit for XML, and Developer's Kit for Java, as used in products such as uCosminexus, Electronic Form Workflow, Groupmax, and IBM XL C/C++ Enterprise Edition 7 and 8, allows remote attackers to have an unknown impact via vectors related to the use of GIF image processing APIs by a Java application, and a different issue from CVE-2007-3794.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:17:25.617Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-014/index.html"
},
{
"name": "57834",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/57834"
},
{
"name": "36309",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/36309"
},
{
"name": "36622",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36622"
},
{
"name": "ADV-2009-2574",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/2574"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Hitachi Cosminexus V4 through V8, Processing Kit for XML, and Developer\u0027s Kit for Java, as used in products such as uCosminexus, Electronic Form Workflow, Groupmax, and IBM XL C/C++ Enterprise Edition 7 and 8, allows remote attackers to have an unknown impact via vectors related to the use of GIF image processing APIs by a Java application, and a different issue from CVE-2007-3794."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-04-21T14:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-014/index.html"
},
{
"name": "57834",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/57834"
},
{
"name": "36309",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/36309"
},
{
"name": "36622",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36622"
},
{
"name": "ADV-2009-2574",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/2574"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4776",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in Hitachi Cosminexus V4 through V8, Processing Kit for XML, and Developer\u0027s Kit for Java, as used in products such as uCosminexus, Electronic Form Workflow, Groupmax, and IBM XL C/C++ Enterprise Edition 7 and 8, allows remote attackers to have an unknown impact via vectors related to the use of GIF image processing APIs by a Java application, and a different issue from CVE-2007-3794."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-014/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-014/index.html"
},
{
"name": "57834",
"refsource": "OSVDB",
"url": "http://osvdb.org/57834"
},
{
"name": "36309",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36309"
},
{
"name": "36622",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36622"
},
{
"name": "ADV-2009-2574",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2574"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-4776",
"datePublished": "2010-04-21T14:00:00Z",
"dateReserved": "2010-04-21T00:00:00Z",
"dateUpdated": "2024-09-16T17:58:12.265Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-5809 (GCVE-0-2007-5809)
Vulnerability from cvelistv5 – Published: 2007-11-05 17:00 – Updated: 2024-08-07 15:47
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Hitachi Web Server 01-00 through 03-10, as used by certain Cosminexus products, allows remote attackers to inject arbitrary web script or HTML via unspecified HTTP requests that trigger creation of a server-status page.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:47:00.451Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "27421",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27421"
},
{
"name": "ADV-2007-3666",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3666"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-035_e/index-e.html"
},
{
"name": "26271",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/26271"
},
{
"name": "42027",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/42027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-10-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Hitachi Web Server 01-00 through 03-10, as used by certain Cosminexus products, allows remote attackers to inject arbitrary web script or HTML via unspecified HTTP requests that trigger creation of a server-status page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2007-11-17T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "27421",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27421"
},
{
"name": "ADV-2007-3666",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3666"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-035_e/index-e.html"
},
{
"name": "26271",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/26271"
},
{
"name": "42027",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/42027"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-5809",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Hitachi Web Server 01-00 through 03-10, as used by certain Cosminexus products, allows remote attackers to inject arbitrary web script or HTML via unspecified HTTP requests that trigger creation of a server-status page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "27421",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27421"
},
{
"name": "ADV-2007-3666",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3666"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-035_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-035_e/index-e.html"
},
{
"name": "26271",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26271"
},
{
"name": "42027",
"refsource": "OSVDB",
"url": "http://osvdb.org/42027"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-5809",
"datePublished": "2007-11-05T17:00:00",
"dateReserved": "2007-11-05T00:00:00",
"dateUpdated": "2024-08-07T15:47:00.451Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-5810 (GCVE-0-2007-5810)
Vulnerability from cvelistv5 – Published: 2007-11-05 17:00 – Updated: 2024-08-07 15:47
VLAI?
Summary
Hitachi Web Server 01-00 through 03-00-01, as used by certain Cosminexus products, does not properly validate SSL client certificates, which might allow remote attackers to spoof authentication via a client certificate with a forged signature.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:47:00.407Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "42026",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/42026"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-034_e/index-e.html"
},
{
"name": "27421",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27421"
},
{
"name": "ADV-2007-3666",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3666"
},
{
"name": "26271",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/26271"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-10-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Hitachi Web Server 01-00 through 03-00-01, as used by certain Cosminexus products, does not properly validate SSL client certificates, which might allow remote attackers to spoof authentication via a client certificate with a forged signature."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2007-11-17T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "42026",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/42026"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-034_e/index-e.html"
},
{
"name": "27421",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27421"
},
{
"name": "ADV-2007-3666",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3666"
},
{
"name": "26271",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/26271"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-5810",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Hitachi Web Server 01-00 through 03-00-01, as used by certain Cosminexus products, does not properly validate SSL client certificates, which might allow remote attackers to spoof authentication via a client certificate with a forged signature."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "42026",
"refsource": "OSVDB",
"url": "http://osvdb.org/42026"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-034_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-034_e/index-e.html"
},
{
"name": "27421",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27421"
},
{
"name": "ADV-2007-3666",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3666"
},
{
"name": "26271",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26271"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-5810",
"datePublished": "2007-11-05T17:00:00",
"dateReserved": "2007-11-05T00:00:00",
"dateUpdated": "2024-08-07T15:47:00.407Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-5281 (GCVE-0-2007-5281)
Vulnerability from cvelistv5 – Published: 2007-10-09 00:00 – Updated: 2024-08-07 15:24
VLAI?
Summary
The Java Secure Socket Extension (JSSE) in the Hitachi Cosminexus Developer's Kit for Java in various Hitachi Cosminexus 7.5 products before 07-50-01, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service via certain SSL/TLS handshake requests. NOTE: this may be the same as CVE-2007-3698.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:24:42.492Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "25935",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25935"
},
{
"name": "ADV-2007-3375",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3375"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-031_e/index-e.html"
},
{
"name": "hitachi-cosminexus-jsse-dos(36965)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36965"
},
{
"name": "27075",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27075"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Java Secure Socket Extension (JSSE) in the Hitachi Cosminexus Developer\u0027s Kit for Java in various Hitachi Cosminexus 7.5 products before 07-50-01, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service via certain SSL/TLS handshake requests. NOTE: this may be the same as CVE-2007-3698."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "25935",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25935"
},
{
"name": "ADV-2007-3375",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3375"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-031_e/index-e.html"
},
{
"name": "hitachi-cosminexus-jsse-dos(36965)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36965"
},
{
"name": "27075",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27075"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-5281",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Java Secure Socket Extension (JSSE) in the Hitachi Cosminexus Developer\u0027s Kit for Java in various Hitachi Cosminexus 7.5 products before 07-50-01, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service via certain SSL/TLS handshake requests. NOTE: this may be the same as CVE-2007-3698."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "25935",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25935"
},
{
"name": "ADV-2007-3375",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3375"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-031_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-031_e/index-e.html"
},
{
"name": "hitachi-cosminexus-jsse-dos(36965)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36965"
},
{
"name": "27075",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27075"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-5281",
"datePublished": "2007-10-09T00:00:00",
"dateReserved": "2007-10-08T00:00:00",
"dateUpdated": "2024-08-07T15:24:42.492Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4759 (GCVE-0-2007-4759)
Vulnerability from cvelistv5 – Published: 2007-09-08 10:00 – Updated: 2024-08-07 15:08
VLAI?
Summary
Multiple unspecified vulnerabilities in the image-processing APIs in Cosminexus Developer's Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:08:33.733Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "37858",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37858"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
},
{
"name": "26538",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26538"
},
{
"name": "ADV-2007-3034",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3034"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the image-processing APIs in Cosminexus Developer\u0027s Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2008-11-15T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "37858",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37858"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
},
{
"name": "26538",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26538"
},
{
"name": "ADV-2007-3034",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3034"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4759",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in the image-processing APIs in Cosminexus Developer\u0027s Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "37858",
"refsource": "OSVDB",
"url": "http://osvdb.org/37858"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
},
{
"name": "26538",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26538"
},
{
"name": "ADV-2007-3034",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3034"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4759",
"datePublished": "2007-09-08T10:00:00",
"dateReserved": "2007-09-07T00:00:00",
"dateUpdated": "2024-08-07T15:08:33.733Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4760 (GCVE-0-2007-4760)
Vulnerability from cvelistv5 – Published: 2007-09-08 10:00 – Updated: 2024-08-07 15:08
VLAI?
Summary
The javadoc tool in Cosminexus Developer's Kit for Java in Cosminexus 7 and 7.5 can generate HTML documents that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this is probably the same issue as CVE-2007-3503.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:08:33.813Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-3033",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3033"
},
{
"name": "26671",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26671"
},
{
"name": "hitachi-javadoc-xss(36393)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36393"
},
{
"name": "25518",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25518"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-027_e/index-e.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The javadoc tool in Cosminexus Developer\u0027s Kit for Java in Cosminexus 7 and 7.5 can generate HTML documents that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this is probably the same issue as CVE-2007-3503."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-3033",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3033"
},
{
"name": "26671",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26671"
},
{
"name": "hitachi-javadoc-xss(36393)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36393"
},
{
"name": "25518",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25518"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-027_e/index-e.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4760",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The javadoc tool in Cosminexus Developer\u0027s Kit for Java in Cosminexus 7 and 7.5 can generate HTML documents that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this is probably the same issue as CVE-2007-3503."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-3033",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3033"
},
{
"name": "26671",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26671"
},
{
"name": "hitachi-javadoc-xss(36393)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36393"
},
{
"name": "25518",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25518"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-027_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-027_e/index-e.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4760",
"datePublished": "2007-09-08T10:00:00",
"dateReserved": "2007-09-07T00:00:00",
"dateUpdated": "2024-08-07T15:08:33.813Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4758 (GCVE-0-2007-4758)
Vulnerability from cvelistv5 – Published: 2007-09-08 10:00 – Updated: 2024-08-07 15:08
VLAI?
Summary
Multiple buffer overflows in the image-processing APIs in Cosminexus Developer's Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:08:33.769Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
},
{
"name": "26538",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26538"
},
{
"name": "ADV-2007-3034",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3034"
},
{
"name": "37857",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37857"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in the image-processing APIs in Cosminexus Developer\u0027s Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2008-11-15T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
},
{
"name": "26538",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26538"
},
{
"name": "ADV-2007-3034",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3034"
},
{
"name": "37857",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37857"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4758",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple buffer overflows in the image-processing APIs in Cosminexus Developer\u0027s Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
},
{
"name": "26538",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26538"
},
{
"name": "ADV-2007-3034",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3034"
},
{
"name": "37857",
"refsource": "OSVDB",
"url": "http://osvdb.org/37857"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4758",
"datePublished": "2007-09-08T10:00:00",
"dateReserved": "2007-09-07T00:00:00",
"dateUpdated": "2024-08-07T15:08:33.769Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4564 (GCVE-0-2007-4564)
Vulnerability from cvelistv5 – Published: 2007-08-28 01:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
Cosminexus Manager in Cosminexus Application Server 07-00 and later might assign the wrong user's group permissions to logical user server processes, which allows local users to gain privileges.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:01:09.517Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
},
{
"name": "25434",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25434"
},
{
"name": "37855",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37855"
},
{
"name": "26589",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26589"
},
{
"name": "cosminexus-group-security-bypass(36245)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cosminexus Manager in Cosminexus Application Server 07-00 and later might assign the wrong user\u0027s group permissions to logical user server processes, which allows local users to gain privileges."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
},
{
"name": "25434",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25434"
},
{
"name": "37855",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37855"
},
{
"name": "26589",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26589"
},
{
"name": "cosminexus-group-security-bypass(36245)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4564",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cosminexus Manager in Cosminexus Application Server 07-00 and later might assign the wrong user\u0027s group permissions to logical user server processes, which allows local users to gain privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
},
{
"name": "25434",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25434"
},
{
"name": "37855",
"refsource": "OSVDB",
"url": "http://osvdb.org/37855"
},
{
"name": "26589",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26589"
},
{
"name": "cosminexus-group-security-bypass(36245)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4564",
"datePublished": "2007-08-28T01:00:00",
"dateReserved": "2007-08-27T00:00:00",
"dateUpdated": "2024-08-07T15:01:09.517Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4563 (GCVE-0-2007-4563)
Vulnerability from cvelistv5 – Published: 2007-08-28 01:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
Cosminexus Manager in Cosminexus Application Server 06-50 and later might assign the wrong user's group permissions to logical J2EE server processes, which allows local users to gain privileges.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:01:09.889Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "37854",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37854"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
},
{
"name": "25434",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25434"
},
{
"name": "26589",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26589"
},
{
"name": "cosminexus-group-security-bypass(36245)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cosminexus Manager in Cosminexus Application Server 06-50 and later might assign the wrong user\u0027s group permissions to logical J2EE server processes, which allows local users to gain privileges."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "37854",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37854"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
},
{
"name": "25434",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25434"
},
{
"name": "26589",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26589"
},
{
"name": "cosminexus-group-security-bypass(36245)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4563",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cosminexus Manager in Cosminexus Application Server 06-50 and later might assign the wrong user\u0027s group permissions to logical J2EE server processes, which allows local users to gain privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "37854",
"refsource": "OSVDB",
"url": "http://osvdb.org/37854"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
},
{
"name": "25434",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25434"
},
{
"name": "26589",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26589"
},
{
"name": "cosminexus-group-security-bypass(36245)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4563",
"datePublished": "2007-08-28T01:00:00",
"dateReserved": "2007-08-27T00:00:00",
"dateUpdated": "2024-08-07T15:01:09.889Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4124 (GCVE-0-2007-4124)
Vulnerability from cvelistv5 – Published: 2007-08-01 16:00 – Updated: 2024-08-07 14:46
VLAI?
Summary
The session failover function in Cosminexus Component Container in Cosminexus 6, 6.7, and 7 before 20070731, as used in multiple Hitachi products, can use session data for the wrong user under unspecified conditions, which might allow remote authenticated users to obtain sensitive information, corrupt another user's session data, and possibly gain privileges.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T14:46:38.979Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "25145",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25145"
},
{
"name": "ADV-2007-2725",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2725"
},
{
"name": "hitachi-container-session-hijacking(35706)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35706"
},
{
"name": "37852",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37852"
},
{
"name": "26250",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26250"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-024_e/index-e.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-07-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The session failover function in Cosminexus Component Container in Cosminexus 6, 6.7, and 7 before 20070731, as used in multiple Hitachi products, can use session data for the wrong user under unspecified conditions, which might allow remote authenticated users to obtain sensitive information, corrupt another user\u0027s session data, and possibly gain privileges."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "25145",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25145"
},
{
"name": "ADV-2007-2725",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2725"
},
{
"name": "hitachi-container-session-hijacking(35706)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35706"
},
{
"name": "37852",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37852"
},
{
"name": "26250",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26250"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-024_e/index-e.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4124",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The session failover function in Cosminexus Component Container in Cosminexus 6, 6.7, and 7 before 20070731, as used in multiple Hitachi products, can use session data for the wrong user under unspecified conditions, which might allow remote authenticated users to obtain sensitive information, corrupt another user\u0027s session data, and possibly gain privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "25145",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25145"
},
{
"name": "ADV-2007-2725",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2725"
},
{
"name": "hitachi-container-session-hijacking(35706)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35706"
},
{
"name": "37852",
"refsource": "OSVDB",
"url": "http://osvdb.org/37852"
},
{
"name": "26250",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26250"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-024_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-024_e/index-e.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4124",
"datePublished": "2007-08-01T16:00:00",
"dateReserved": "2007-08-01T00:00:00",
"dateUpdated": "2024-08-07T14:46:38.979Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-4776 (GCVE-0-2009-4776)
Vulnerability from nvd – Published: 2010-04-21 14:00 – Updated: 2024-09-16 17:58
VLAI?
Summary
Buffer overflow in Hitachi Cosminexus V4 through V8, Processing Kit for XML, and Developer's Kit for Java, as used in products such as uCosminexus, Electronic Form Workflow, Groupmax, and IBM XL C/C++ Enterprise Edition 7 and 8, allows remote attackers to have an unknown impact via vectors related to the use of GIF image processing APIs by a Java application, and a different issue from CVE-2007-3794.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:17:25.617Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-014/index.html"
},
{
"name": "57834",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/57834"
},
{
"name": "36309",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/36309"
},
{
"name": "36622",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36622"
},
{
"name": "ADV-2009-2574",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/2574"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Hitachi Cosminexus V4 through V8, Processing Kit for XML, and Developer\u0027s Kit for Java, as used in products such as uCosminexus, Electronic Form Workflow, Groupmax, and IBM XL C/C++ Enterprise Edition 7 and 8, allows remote attackers to have an unknown impact via vectors related to the use of GIF image processing APIs by a Java application, and a different issue from CVE-2007-3794."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-04-21T14:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-014/index.html"
},
{
"name": "57834",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/57834"
},
{
"name": "36309",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/36309"
},
{
"name": "36622",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36622"
},
{
"name": "ADV-2009-2574",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/2574"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4776",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in Hitachi Cosminexus V4 through V8, Processing Kit for XML, and Developer\u0027s Kit for Java, as used in products such as uCosminexus, Electronic Form Workflow, Groupmax, and IBM XL C/C++ Enterprise Edition 7 and 8, allows remote attackers to have an unknown impact via vectors related to the use of GIF image processing APIs by a Java application, and a different issue from CVE-2007-3794."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-014/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-014/index.html"
},
{
"name": "57834",
"refsource": "OSVDB",
"url": "http://osvdb.org/57834"
},
{
"name": "36309",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36309"
},
{
"name": "36622",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36622"
},
{
"name": "ADV-2009-2574",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2574"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-4776",
"datePublished": "2010-04-21T14:00:00Z",
"dateReserved": "2010-04-21T00:00:00Z",
"dateUpdated": "2024-09-16T17:58:12.265Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-5809 (GCVE-0-2007-5809)
Vulnerability from nvd – Published: 2007-11-05 17:00 – Updated: 2024-08-07 15:47
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Hitachi Web Server 01-00 through 03-10, as used by certain Cosminexus products, allows remote attackers to inject arbitrary web script or HTML via unspecified HTTP requests that trigger creation of a server-status page.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:47:00.451Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "27421",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27421"
},
{
"name": "ADV-2007-3666",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3666"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-035_e/index-e.html"
},
{
"name": "26271",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/26271"
},
{
"name": "42027",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/42027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-10-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Hitachi Web Server 01-00 through 03-10, as used by certain Cosminexus products, allows remote attackers to inject arbitrary web script or HTML via unspecified HTTP requests that trigger creation of a server-status page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2007-11-17T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "27421",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27421"
},
{
"name": "ADV-2007-3666",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3666"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-035_e/index-e.html"
},
{
"name": "26271",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/26271"
},
{
"name": "42027",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/42027"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-5809",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Hitachi Web Server 01-00 through 03-10, as used by certain Cosminexus products, allows remote attackers to inject arbitrary web script or HTML via unspecified HTTP requests that trigger creation of a server-status page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "27421",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27421"
},
{
"name": "ADV-2007-3666",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3666"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-035_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-035_e/index-e.html"
},
{
"name": "26271",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26271"
},
{
"name": "42027",
"refsource": "OSVDB",
"url": "http://osvdb.org/42027"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-5809",
"datePublished": "2007-11-05T17:00:00",
"dateReserved": "2007-11-05T00:00:00",
"dateUpdated": "2024-08-07T15:47:00.451Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-5810 (GCVE-0-2007-5810)
Vulnerability from nvd – Published: 2007-11-05 17:00 – Updated: 2024-08-07 15:47
VLAI?
Summary
Hitachi Web Server 01-00 through 03-00-01, as used by certain Cosminexus products, does not properly validate SSL client certificates, which might allow remote attackers to spoof authentication via a client certificate with a forged signature.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:47:00.407Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "42026",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/42026"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-034_e/index-e.html"
},
{
"name": "27421",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27421"
},
{
"name": "ADV-2007-3666",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3666"
},
{
"name": "26271",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/26271"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-10-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Hitachi Web Server 01-00 through 03-00-01, as used by certain Cosminexus products, does not properly validate SSL client certificates, which might allow remote attackers to spoof authentication via a client certificate with a forged signature."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2007-11-17T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "42026",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/42026"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-034_e/index-e.html"
},
{
"name": "27421",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27421"
},
{
"name": "ADV-2007-3666",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3666"
},
{
"name": "26271",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/26271"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-5810",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Hitachi Web Server 01-00 through 03-00-01, as used by certain Cosminexus products, does not properly validate SSL client certificates, which might allow remote attackers to spoof authentication via a client certificate with a forged signature."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "42026",
"refsource": "OSVDB",
"url": "http://osvdb.org/42026"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-034_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-034_e/index-e.html"
},
{
"name": "27421",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27421"
},
{
"name": "ADV-2007-3666",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3666"
},
{
"name": "26271",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26271"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-5810",
"datePublished": "2007-11-05T17:00:00",
"dateReserved": "2007-11-05T00:00:00",
"dateUpdated": "2024-08-07T15:47:00.407Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-5281 (GCVE-0-2007-5281)
Vulnerability from nvd – Published: 2007-10-09 00:00 – Updated: 2024-08-07 15:24
VLAI?
Summary
The Java Secure Socket Extension (JSSE) in the Hitachi Cosminexus Developer's Kit for Java in various Hitachi Cosminexus 7.5 products before 07-50-01, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service via certain SSL/TLS handshake requests. NOTE: this may be the same as CVE-2007-3698.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:24:42.492Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "25935",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25935"
},
{
"name": "ADV-2007-3375",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3375"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-031_e/index-e.html"
},
{
"name": "hitachi-cosminexus-jsse-dos(36965)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36965"
},
{
"name": "27075",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27075"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Java Secure Socket Extension (JSSE) in the Hitachi Cosminexus Developer\u0027s Kit for Java in various Hitachi Cosminexus 7.5 products before 07-50-01, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service via certain SSL/TLS handshake requests. NOTE: this may be the same as CVE-2007-3698."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "25935",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25935"
},
{
"name": "ADV-2007-3375",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3375"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-031_e/index-e.html"
},
{
"name": "hitachi-cosminexus-jsse-dos(36965)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36965"
},
{
"name": "27075",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27075"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-5281",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Java Secure Socket Extension (JSSE) in the Hitachi Cosminexus Developer\u0027s Kit for Java in various Hitachi Cosminexus 7.5 products before 07-50-01, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service via certain SSL/TLS handshake requests. NOTE: this may be the same as CVE-2007-3698."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "25935",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25935"
},
{
"name": "ADV-2007-3375",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3375"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-031_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-031_e/index-e.html"
},
{
"name": "hitachi-cosminexus-jsse-dos(36965)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36965"
},
{
"name": "27075",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27075"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-5281",
"datePublished": "2007-10-09T00:00:00",
"dateReserved": "2007-10-08T00:00:00",
"dateUpdated": "2024-08-07T15:24:42.492Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4759 (GCVE-0-2007-4759)
Vulnerability from nvd – Published: 2007-09-08 10:00 – Updated: 2024-08-07 15:08
VLAI?
Summary
Multiple unspecified vulnerabilities in the image-processing APIs in Cosminexus Developer's Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:08:33.733Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "37858",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37858"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
},
{
"name": "26538",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26538"
},
{
"name": "ADV-2007-3034",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3034"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the image-processing APIs in Cosminexus Developer\u0027s Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2008-11-15T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "37858",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37858"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
},
{
"name": "26538",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26538"
},
{
"name": "ADV-2007-3034",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3034"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4759",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in the image-processing APIs in Cosminexus Developer\u0027s Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "37858",
"refsource": "OSVDB",
"url": "http://osvdb.org/37858"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
},
{
"name": "26538",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26538"
},
{
"name": "ADV-2007-3034",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3034"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4759",
"datePublished": "2007-09-08T10:00:00",
"dateReserved": "2007-09-07T00:00:00",
"dateUpdated": "2024-08-07T15:08:33.733Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4760 (GCVE-0-2007-4760)
Vulnerability from nvd – Published: 2007-09-08 10:00 – Updated: 2024-08-07 15:08
VLAI?
Summary
The javadoc tool in Cosminexus Developer's Kit for Java in Cosminexus 7 and 7.5 can generate HTML documents that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this is probably the same issue as CVE-2007-3503.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:08:33.813Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-3033",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3033"
},
{
"name": "26671",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26671"
},
{
"name": "hitachi-javadoc-xss(36393)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36393"
},
{
"name": "25518",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25518"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-027_e/index-e.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The javadoc tool in Cosminexus Developer\u0027s Kit for Java in Cosminexus 7 and 7.5 can generate HTML documents that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this is probably the same issue as CVE-2007-3503."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-3033",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3033"
},
{
"name": "26671",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26671"
},
{
"name": "hitachi-javadoc-xss(36393)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36393"
},
{
"name": "25518",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25518"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-027_e/index-e.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4760",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The javadoc tool in Cosminexus Developer\u0027s Kit for Java in Cosminexus 7 and 7.5 can generate HTML documents that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this is probably the same issue as CVE-2007-3503."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-3033",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3033"
},
{
"name": "26671",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26671"
},
{
"name": "hitachi-javadoc-xss(36393)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36393"
},
{
"name": "25518",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25518"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-027_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-027_e/index-e.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4760",
"datePublished": "2007-09-08T10:00:00",
"dateReserved": "2007-09-07T00:00:00",
"dateUpdated": "2024-08-07T15:08:33.813Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4758 (GCVE-0-2007-4758)
Vulnerability from nvd – Published: 2007-09-08 10:00 – Updated: 2024-08-07 15:08
VLAI?
Summary
Multiple buffer overflows in the image-processing APIs in Cosminexus Developer's Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:08:33.769Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
},
{
"name": "26538",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26538"
},
{
"name": "ADV-2007-3034",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3034"
},
{
"name": "37857",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37857"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in the image-processing APIs in Cosminexus Developer\u0027s Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2008-11-15T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
},
{
"name": "26538",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26538"
},
{
"name": "ADV-2007-3034",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3034"
},
{
"name": "37857",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37857"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4758",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple buffer overflows in the image-processing APIs in Cosminexus Developer\u0027s Kit for Java in Cosminexus 4 through 7 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-028_e/index-e.html"
},
{
"name": "26538",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26538"
},
{
"name": "ADV-2007-3034",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3034"
},
{
"name": "37857",
"refsource": "OSVDB",
"url": "http://osvdb.org/37857"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4758",
"datePublished": "2007-09-08T10:00:00",
"dateReserved": "2007-09-07T00:00:00",
"dateUpdated": "2024-08-07T15:08:33.769Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4564 (GCVE-0-2007-4564)
Vulnerability from nvd – Published: 2007-08-28 01:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
Cosminexus Manager in Cosminexus Application Server 07-00 and later might assign the wrong user's group permissions to logical user server processes, which allows local users to gain privileges.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:01:09.517Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
},
{
"name": "25434",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25434"
},
{
"name": "37855",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37855"
},
{
"name": "26589",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26589"
},
{
"name": "cosminexus-group-security-bypass(36245)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cosminexus Manager in Cosminexus Application Server 07-00 and later might assign the wrong user\u0027s group permissions to logical user server processes, which allows local users to gain privileges."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
},
{
"name": "25434",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25434"
},
{
"name": "37855",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37855"
},
{
"name": "26589",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26589"
},
{
"name": "cosminexus-group-security-bypass(36245)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4564",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cosminexus Manager in Cosminexus Application Server 07-00 and later might assign the wrong user\u0027s group permissions to logical user server processes, which allows local users to gain privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
},
{
"name": "25434",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25434"
},
{
"name": "37855",
"refsource": "OSVDB",
"url": "http://osvdb.org/37855"
},
{
"name": "26589",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26589"
},
{
"name": "cosminexus-group-security-bypass(36245)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4564",
"datePublished": "2007-08-28T01:00:00",
"dateReserved": "2007-08-27T00:00:00",
"dateUpdated": "2024-08-07T15:01:09.517Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4563 (GCVE-0-2007-4563)
Vulnerability from nvd – Published: 2007-08-28 01:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
Cosminexus Manager in Cosminexus Application Server 06-50 and later might assign the wrong user's group permissions to logical J2EE server processes, which allows local users to gain privileges.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:01:09.889Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "37854",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37854"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
},
{
"name": "25434",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25434"
},
{
"name": "26589",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26589"
},
{
"name": "cosminexus-group-security-bypass(36245)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cosminexus Manager in Cosminexus Application Server 06-50 and later might assign the wrong user\u0027s group permissions to logical J2EE server processes, which allows local users to gain privileges."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "37854",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37854"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
},
{
"name": "25434",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25434"
},
{
"name": "26589",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26589"
},
{
"name": "cosminexus-group-security-bypass(36245)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4563",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cosminexus Manager in Cosminexus Application Server 06-50 and later might assign the wrong user\u0027s group permissions to logical J2EE server processes, which allows local users to gain privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "37854",
"refsource": "OSVDB",
"url": "http://osvdb.org/37854"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html"
},
{
"name": "25434",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25434"
},
{
"name": "26589",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26589"
},
{
"name": "cosminexus-group-security-bypass(36245)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36245"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4563",
"datePublished": "2007-08-28T01:00:00",
"dateReserved": "2007-08-27T00:00:00",
"dateUpdated": "2024-08-07T15:01:09.889Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4124 (GCVE-0-2007-4124)
Vulnerability from nvd – Published: 2007-08-01 16:00 – Updated: 2024-08-07 14:46
VLAI?
Summary
The session failover function in Cosminexus Component Container in Cosminexus 6, 6.7, and 7 before 20070731, as used in multiple Hitachi products, can use session data for the wrong user under unspecified conditions, which might allow remote authenticated users to obtain sensitive information, corrupt another user's session data, and possibly gain privileges.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T14:46:38.979Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "25145",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25145"
},
{
"name": "ADV-2007-2725",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2725"
},
{
"name": "hitachi-container-session-hijacking(35706)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35706"
},
{
"name": "37852",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37852"
},
{
"name": "26250",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26250"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-024_e/index-e.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-07-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The session failover function in Cosminexus Component Container in Cosminexus 6, 6.7, and 7 before 20070731, as used in multiple Hitachi products, can use session data for the wrong user under unspecified conditions, which might allow remote authenticated users to obtain sensitive information, corrupt another user\u0027s session data, and possibly gain privileges."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "25145",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25145"
},
{
"name": "ADV-2007-2725",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2725"
},
{
"name": "hitachi-container-session-hijacking(35706)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35706"
},
{
"name": "37852",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37852"
},
{
"name": "26250",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26250"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-024_e/index-e.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4124",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The session failover function in Cosminexus Component Container in Cosminexus 6, 6.7, and 7 before 20070731, as used in multiple Hitachi products, can use session data for the wrong user under unspecified conditions, which might allow remote authenticated users to obtain sensitive information, corrupt another user\u0027s session data, and possibly gain privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "25145",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25145"
},
{
"name": "ADV-2007-2725",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2725"
},
{
"name": "hitachi-container-session-hijacking(35706)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35706"
},
{
"name": "37852",
"refsource": "OSVDB",
"url": "http://osvdb.org/37852"
},
{
"name": "26250",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26250"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-024_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-024_e/index-e.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4124",
"datePublished": "2007-08-01T16:00:00",
"dateReserved": "2007-08-01T00:00:00",
"dateUpdated": "2024-08-07T14:46:38.979Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}