var-200711-0033
Vulnerability from variot
Unspecified vulnerability in the Groupmax Collaboration - Schedule component in Hitachi Groupmax Collaboration Portal 07-30 through 07-30-/F and 07-32 through 07-32-/C, uCosminexus Collaboration Portal 06-30 through 06-30-/F and 06-32 through 06-32-/C, and Groupmax Collaboration Web Client - Mail/Schedule 07-30 through 07-30-/F and 07-32 through 07-32-/B might allow remote attackers to obtain sensitive information via unspecified vectors related to schedule portlets. The Schedule component in Groupmax Collaboration contains an information disclosure vulnerability where non-disclosable information can be displayed on a schedule portlet.Unintended information diasclosure could occur, which an attacker could exploit for further attack. Attackers can exploit this issue to access potentially sensitive information that could aid in further attacks.
2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively.
Please see vendor advisory for affected products and versions.
SOLUTION: Update to the latest versions (please see vendor advisory for details).
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: http://www.hitachi-support.com/security_e/vuls_e/HS07-036_e/index-e.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200711-0033", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "groupmax collaboration portal", "scope": "eq", "trust": 1.6, "vendor": "hitachi", "version": "07_32_b" }, { "model": "groupmax collaboration portal", "scope": "eq", "trust": 1.6, "vendor": "hitachi", "version": "07_30_f" }, { "model": "groupmax collaboration portal", "scope": "eq", "trust": 1.6, "vendor": "hitachi", "version": "07_30" }, { "model": "ucosminexus collaboration portal", "scope": "eq", "trust": 1.6, "vendor": "hitachi", "version": "06_30_c" }, { "model": "groupmax collaboration portal", "scope": "eq", "trust": 1.6, "vendor": "hitachi", "version": "07_30_d" }, { "model": "groupmax collaboration portal", "scope": "eq", "trust": 1.6, "vendor": "hitachi", "version": "07_30_c" }, { "model": "groupmax collaboration portal", "scope": "eq", "trust": 1.6, "vendor": "hitachi", "version": "07_30_e" }, { "model": "ucosminexus collaboration portal", "scope": "eq", "trust": 1.6, "vendor": "hitachi", "version": "06_30" }, { "model": "ucosminexus collaboration portal", "scope": "eq", "trust": 1.6, "vendor": "hitachi", "version": "06_30_b" }, { "model": "groupmax collaboration portal", "scope": "eq", "trust": 1.6, "vendor": "hitachi", "version": "07_32" }, { "model": "groupmax collaboration web client", "scope": "eq", "trust": 1.0, "vendor": "hitachi", "version": "07_30_d" }, { "model": "ucosminexus collaboration portal", "scope": "eq", "trust": 1.0, "vendor": "hitachi", "version": "06_30_d" }, { "model": "groupmax collaboration web client", "scope": "eq", "trust": 1.0, "vendor": "hitachi", "version": "07_30_f" }, { "model": "groupmax collaboration web client", "scope": "eq", "trust": 1.0, "vendor": "hitachi", "version": "07_32_b" }, { "model": "ucosminexus collaboration portal", "scope": "eq", "trust": 1.0, "vendor": "hitachi", "version": "06_30_e" }, { "model": "groupmax collaboration web client", "scope": "eq", "trust": 1.0, "vendor": "hitachi", "version": "07_30_b" }, { "model": "groupmax collaboration portal", "scope": "eq", "trust": 1.0, "vendor": "hitachi", "version": "07_30_b" }, { "model": "ucosminexus collaboration portal", "scope": "eq", "trust": 1.0, "vendor": "hitachi", "version": "06_32" }, { "model": "ucosminexus collaboration portal", "scope": "eq", "trust": 1.0, "vendor": "hitachi", "version": "06_32_b" }, { "model": "groupmax collaboration web client", "scope": "eq", "trust": 1.0, "vendor": "hitachi", "version": "07_30" }, { "model": "ucosminexus collaboration portal", "scope": "eq", "trust": 1.0, "vendor": "hitachi", "version": "06_32_c" }, { "model": "groupmax collaboration portal", "scope": "eq", "trust": 1.0, "vendor": "hitachi", "version": "07_32_c" }, { "model": "groupmax collaboration web client", "scope": "eq", "trust": 1.0, "vendor": "hitachi", "version": "07_30_e" }, { "model": "groupmax collaboration web client", "scope": "eq", "trust": 1.0, "vendor": "hitachi", "version": "07_30_c" }, { "model": "ucosminexus collaboration portal", "scope": "eq", "trust": 1.0, "vendor": "hitachi", "version": "06_30_f" }, { "model": "groupmax collaboration web client", "scope": "eq", "trust": 1.0, "vendor": "hitachi", "version": "07_32" }, { "model": "groupmax collaboration portal", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration web client - mail/schedule", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus collaboration portal", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus collaboration portal 6-32-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus collaboration portal 6-32-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus collaboration portal 6-32-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus collaboration portal", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6-32" }, { "model": "ucosminexus collaboration portal 6-30-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus collaboration portal 6-30-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus collaboration portal 6-30-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus collaboration portal 6-30-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus collaboration portal 6-30-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus collaboration portal 6-30-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus collaboration portal", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6-30" }, { "model": "groupmax collaboration web client mail/schedule 7-32-/c", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration web client mail/schedule 7-32-/b", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration web client mail/schedule 7-32-/a", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration web client mail/schedule", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-7-32" }, { "model": "groupmax collaboration web client mail/schedule 7-30-/f", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration web client mail/schedule 7-30-/e", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration web client mail/schedule 7-30-/c", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration web client mail/schedule 7-30-/b", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration web client mail/schedule 7-30-/a", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration web client mail/schedule", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-7-30" }, { "model": "groupmax collaboration portal 7-32-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration portal 7-32-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration portal 7-32-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration portal", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7-32" }, { "model": "groupmax collaboration portal 7-30-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration portal 7-30-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration portal 7-30-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration portal 7-30-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration portal 7-30-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration portal 7-30-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration portal", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7-30" }, { "model": "ucosminexus collaboration portal 6-32-/d", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus collaboration portal 6-30-/g", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration web client mail/schedule 7-32-/d", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration web client mail/schedule 7-30-/g", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration portal 7-32-/d", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "groupmax collaboration portal 7-30-/g", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": null } ], "sources": [ { "db": "BID", "id": "26272" }, { "db": "JVNDB", "id": "JVNDB-2007-000921" }, { "db": "NVD", "id": "CVE-2007-5808" }, { "db": "CNNVD", "id": "CNNVD-200711-036" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_30_e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_30_f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_30_d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_30_e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_30_d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_30_e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_30_b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_32_c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_32_b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_32_c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_32_b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_30_f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_30_f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_32_b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_30_c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_30_d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_30_b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_30_c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_30_b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_30_c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2007-5808" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor disclosed this issue.", "sources": [ { "db": "BID", "id": "26272" }, { "db": "CNNVD", "id": "CNNVD-200711-036" } ], "trust": 0.9 }, "cve": "CVE-2007-5808", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "IPA", "availabilityImpact": "None", "baseScore": 4.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2007-000921", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2007-5808", "trust": 1.0, "value": "MEDIUM" }, { "author": "IPA", "id": "JVNDB-2007-000921", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200711-036", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000921" }, { "db": "NVD", "id": "CVE-2007-5808" }, { "db": "CNNVD", "id": "CNNVD-200711-036" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in the Groupmax Collaboration - Schedule component in Hitachi Groupmax Collaboration Portal 07-30 through 07-30-/F and 07-32 through 07-32-/C, uCosminexus Collaboration Portal 06-30 through 06-30-/F and 06-32 through 06-32-/C, and Groupmax Collaboration Web Client - Mail/Schedule 07-30 through 07-30-/F and 07-32 through 07-32-/B might allow remote attackers to obtain sensitive information via unspecified vectors related to schedule portlets. The Schedule component in Groupmax Collaboration contains an information disclosure vulnerability where non-disclosable information can be displayed on a schedule portlet.Unintended information diasclosure could occur, which an attacker could exploit for further attack. \nAttackers can exploit this issue to access potentially sensitive information that could aid in further attacks. \n\n----------------------------------------------------------------------\n\n2003: 2,700 advisories published\n2004: 3,100 advisories published\n2005: 4,600 advisories published\n2006: 5,300 advisories published\n\nHow do you know which Secunia advisories are important to you?\n\nThe Secunia Vulnerability Intelligence Solutions allows you to filter\nand structure all the information you need, so you can address issues\neffectively. \n\nPlease see vendor advisory for affected products and versions. \n\nSOLUTION:\nUpdate to the latest versions (please see vendor advisory for\ndetails). \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.hitachi-support.com/security_e/vuls_e/HS07-036_e/index-e.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-5808" }, { "db": "JVNDB", "id": "JVNDB-2007-000921" }, { "db": "BID", "id": "26272" }, { "db": "PACKETSTORM", "id": "60575" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-5808", "trust": 2.7 }, { "db": "SECUNIA", "id": "27451", "trust": 2.6 }, { "db": "HITACHI", "id": "HS07-036", "trust": 2.0 }, { "db": "BID", "id": "26272", "trust": 1.9 }, { "db": "VUPEN", "id": "ADV-2007-3667", "trust": 1.6 }, { "db": "OSVDB", "id": "42025", "trust": 1.6 }, { "db": "XF", "id": "38188", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2007-000921", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200711-036", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "60575", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "26272" }, { "db": "JVNDB", "id": "JVNDB-2007-000921" }, { "db": "PACKETSTORM", "id": "60575" }, { "db": "NVD", "id": "CVE-2007-5808" }, { "db": "CNNVD", "id": "CNNVD-200711-036" } ] }, "id": "VAR-200711-0033", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.17738096 }, "last_update_date": "2023-12-18T12:39:43.341000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HS07-036", "trust": 0.8, "url": "http://www.hitachi-support.com/security_e/vuls_e/hs07-036_e/index-e.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000921" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2007-5808" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://secunia.com/advisories/27451" }, { "trust": 2.0, "url": "http://www.hitachi-support.com/security_e/vuls_e/hs07-036_e/index-e.html" }, { "trust": 1.6, "url": "http://osvdb.org/42025" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/26272" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2007/3667" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/38188" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/3667" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38188" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5808" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5808" }, { "trust": 0.3, "url": "http://www.hds.com/products/storage-software/hitachi-device-manager.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/27451/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv" }, { "trust": 0.1, "url": "http://secunia.com/product/10834/" }, { "trust": 0.1, "url": "http://secunia.com/product/6162/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/6161/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/10833/" } ], "sources": [ { "db": "BID", "id": "26272" }, { "db": "JVNDB", "id": "JVNDB-2007-000921" }, { "db": "PACKETSTORM", "id": "60575" }, { "db": "NVD", "id": "CVE-2007-5808" }, { "db": "CNNVD", "id": "CNNVD-200711-036" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "26272" }, { "db": "JVNDB", "id": "JVNDB-2007-000921" }, { "db": "PACKETSTORM", "id": "60575" }, { "db": "NVD", "id": "CVE-2007-5808" }, { "db": "CNNVD", "id": "CNNVD-200711-036" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-10-31T00:00:00", "db": "BID", "id": "26272" }, { "date": "2008-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000921" }, { "date": "2007-11-01T00:05:32", "db": "PACKETSTORM", "id": "60575" }, { "date": "2007-11-05T17:46:00", "db": "NVD", "id": "CVE-2007-5808" }, { "date": "2007-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200711-036" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-11-15T00:38:00", "db": "BID", "id": "26272" }, { "date": "2008-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000921" }, { "date": "2017-07-29T01:33:53.100000", "db": "NVD", "id": "CVE-2007-5808" }, { "date": "2007-11-06T00:00:00", "db": "CNNVD", "id": "CNNVD-200711-036" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200711-036" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Hitachi Collaboration Portal Schedule Component Information Disclosure Vulnerability", "sources": [ { "db": "BID", "id": "26272" }, { "db": "CNNVD", "id": "CNNVD-200711-036" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-200711-036" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.