CVE-2009-4776
https://notcve.org/view.php?id=CVE-2009-4776
Buffer overflow in Hitachi Cosminexus V4 through V8, Processing Kit for XML, and Developer's Kit for Java, as used in products such as uCosminexus, Electronic Form Workflow, Groupmax, and IBM XL C/C++ Enterprise Edition 7 and 8, allows remote attackers to have an unknown impact via vectors related to the use of GIF image processing APIs by a Java application, and a different issue from CVE-2007-3794. Desbordamiento de búfer en Hitachi Cosminexus V4 a la V8, Processing Kit para XML, y Developer's Kit para Java, usado en productos como uCosminexus, Electronic Form Workflow, Groupmax, e IBM XL C/C++ Enterprise Edition 7 y 8, permite a atacantes remotos tener un impacto desconocido a través de vectores relacionados con el uso del procesamiento de imágenes GIF mediante APIs para aplicaciones Java. Cuestión distinta del CVE-2007-3794. • http://osvdb.org/57834 http://secunia.com/advisories/36622 http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-014/index.html http://www.securityfocus.com/bid/36309 http://www.vupen.com/english/advisories/2009/2574 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2009-3172
https://notcve.org/view.php?id=CVE-2009-3172
Unspecified vulnerability in Hitachi Groupmax Groupware Server 07-00 through 07-50-/A, Groupmax Server Set 03-00 through 06-52, Groupware Server Set 03-00 through 06-52, and Scheduler Server Set 03-00 through 06-52 has unknown impact and attack vectors related to invalid access rights. Vulnerabilidades no específicas en Hitachi Groupmax Groupware Server v07-00 hasta v07-50-/A, Groupmax Server Set v03-00 hasta v06-52, Groupware Server Set v03-00 hasta v06-52, y Scheduler Server Set v03-00 hasta 06-52 tiene un impacto y vectores de ataque desconocidos, relativo a derechos de acceso. • http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-001930.html http://secunia.com/advisories/36527 http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-012/index.html http://www.osvdb.org/57565 http://www.securityfocus.com/bid/36184 http://www.vupen.com/english/advisories/2009/2480 •
CVE-2008-5719
https://notcve.org/view.php?id=CVE-2008-5719
Cross-site scripting (XSS) vulnerability in Hitachi Groupmax Web Workflow SDK Set for Active Server Pages before 06-52-/C and Hitachi Groupmax Workflow - Development Kit for Active Server Pages before 06-52-/A allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Hitachi Groupmax Web Workflow SDK Set para Active Server Pages antes de v06-52-/C e Hitachi Groupmax Workflow - Development Kit para Active Server Pages antes de v06-52-/A permite a atacantes remotos inyectar secuencias de comandos web o HTML mediante vectores no especificados. • http://secunia.com/advisories/33281 http://securitytracker.com/alerts/2008/Dec/1021483.html http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS08-026/index.html http://www.securityfocus.com/bid/32833 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2007-4124
https://notcve.org/view.php?id=CVE-2007-4124
The session failover function in Cosminexus Component Container in Cosminexus 6, 6.7, and 7 before 20070731, as used in multiple Hitachi products, can use session data for the wrong user under unspecified conditions, which might allow remote authenticated users to obtain sensitive information, corrupt another user's session data, and possibly gain privileges. La función de recuperación de sesión ante fallos en Cosminexus Component Container de Cosminexus 6, 6.7, y 7 anterior al 31/07/2007, como el usado en múltiples productos de Hitachi, puede utilizar información de la sesión para el usuario equivocado bajo ciertas condiciones no especificadas, lo cual podría permitir a usuarios autenticados remotos obtener información sensible, corromper la información de sesión de otros usuarios, y posiblemente obtener privilegios. • http://osvdb.org/37852 http://secunia.com/advisories/26250 http://www.hitachi-support.com/security_e/vuls_e/HS07-024_e/index-e.html http://www.securityfocus.com/bid/25145 http://www.vupen.com/english/advisories/2007/2725 https://exchange.xforce.ibmcloud.com/vulnerabilities/35706 •