mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
225 lines
8.7 KiB
JSON
225 lines
8.7 KiB
JSON
{
|
|
"id": "CVE-2007-1854",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-04-03T16:19:00.000",
|
|
"lastModified": "2024-11-21T00:29:18.987",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in Hitachi Cosminexus Component Container 07-00 through 07-00-10, and 07-10 through 07-10-03, as used in uCosminexus Application Server Enterprise and Standard; uCosminexus Service Platform; uCosminexus Developer Standard and Professional; uCosminexus Service Architect; Electronic Form Workflow Standard Set, Professional Library Set, and Developer Client Set; and uCosminexus ERP Integrator, does not properly manage session information, which has an unspecified impact related to \"unintended other requests.\""
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad sin especificar en el Hitachi Cosminexus Component Container 07-00 hasta la 07-00-10 y la 07-10 hasta la 07-10-03, como la utilizada en el uCosminexus Application Server Enterprise y Standard; uCosminexus Service Platform; uCosminexus Developer Standard y Professional; uCosminexus Service Architect; Electronic Form Workflow Standard Set, Professional Library Set y Developer Client Set y uCosminexus ERP Integrator, no maneja correctamente la informaci\u00f3n de la sesi\u00f3n lo que tiene un impacto sin especificar sobre \"otras peticiones no intencionadas\"."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"baseScore": 5.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:cosminexus_component_container:07_00_11:*:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "4EF7446C-6D20-4C78-88F0-C26EF18D29FC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:cosminexus_component_container:07_00_11:*:hp-ux_ipf:*:*:*:*:*",
|
|
"matchCriteriaId": "46A428F7-481F-4CC9-BC88-F9E252145FC4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:cosminexus_component_container:07_00_11:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "B8113865-9748-4303-9EA0-A9877352289A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:cosminexus_component_container:07_00_11:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "912A446F-14BA-4EBD-A602-CCEBFF61401A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:cosminexus_component_container:07_10_04:*:aix:*:*:*:*:*",
|
|
"matchCriteriaId": "CA22C63D-C179-424C-8D2F-61BB0EB7FED0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:cosminexus_component_container:07_10_04:*:hp-ux:*:*:*:*:*",
|
|
"matchCriteriaId": "2915E6E9-E1CB-4F41-93C8-64C2840A061E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:cosminexus_component_container:07_10_04:*:hp-ux_ipf:*:*:*:*:*",
|
|
"matchCriteriaId": "948B7479-CE14-48BC-992D-5D741A34250D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:cosminexus_component_container:07_10_04:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "CA2C63CC-4A44-42C9-86A5-2C9B54D0FA12"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:cosminexus_component_container:07_10_04:*:linux_ipf:*:*:*:*:*",
|
|
"matchCriteriaId": "1EBD3115-9F4E-4B33-9A40-E4BB43F6330A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:cosminexus_component_container:07_10_04:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "7303B1B0-E108-4065-8DF4-9EB810A47066"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow:*:*:developer_client_set:*:*:*:*:*",
|
|
"matchCriteriaId": "945C66CA-31DB-408D-BD4B-D023381F5DF0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow:*:*:professional_library_set:*:*:*:*:*",
|
|
"matchCriteriaId": "424670C5-82C6-44E0-A3C0-4391F254E6BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:electronic_form_workflow:*:*:standard_set:*:*:*:*:*",
|
|
"matchCriteriaId": "182C9BBE-DA39-412C-868A-CCDE7E4399CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:*:*:enterprise:*:*:*:*:*",
|
|
"matchCriteriaId": "F374179A-7C0D-48B2-B0FF-39F5D4A7E37B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:ucosminexus_application_server:*:*:standard:*:*:*:*:*",
|
|
"matchCriteriaId": "272AD10C-E135-4EEE-8F48-E28CF5F7B3D2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:*:*:professional:*:*:*:*:*",
|
|
"matchCriteriaId": "03011EFF-6C5F-40F2-BF6D-FE4DE0E6F552"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:ucosminexus_developer:*:*:standard:*:*:*:*:*",
|
|
"matchCriteriaId": "415BE30B-0222-4C2F-9791-273469DB5BED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:ucosminexus_erp_integrator:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6C963599-5B39-40A0-A834-E738164B3531"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_architect:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "354BD4CE-7B1A-4442-9F87-08CD70D9499E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hitachi:ucosminexus_service_platform:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "72E63548-3AB3-4B78-AA2D-5B2AC7E06DD7"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://osvdb.org/34768",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/24683",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-006_e/index-e.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/23213",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/1170",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33318",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/34768",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/24683",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-006_e/index-e.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/23213",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/1170",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33318",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |