5 results (0.010 seconds)

CVSS: 9.3EPSS: 1%CPEs: 295EXPL: 0

Buffer overflow in Hitachi Cosminexus V4 through V8, Processing Kit for XML, and Developer's Kit for Java, as used in products such as uCosminexus, Electronic Form Workflow, Groupmax, and IBM XL C/C++ Enterprise Edition 7 and 8, allows remote attackers to have an unknown impact via vectors related to the use of GIF image processing APIs by a Java application, and a different issue from CVE-2007-3794. Desbordamiento de búfer en Hitachi Cosminexus V4 a la V8, Processing Kit para XML, y Developer's Kit para Java, usado en productos como uCosminexus, Electronic Form Workflow, Groupmax, e IBM XL C/C++ Enterprise Edition 7 y 8, permite a atacantes remotos tener un impacto desconocido a través de vectores relacionados con el uso del procesamiento de imágenes GIF mediante APIs para aplicaciones Java. Cuestión distinta del CVE-2007-3794. • http://osvdb.org/57834 http://secunia.com/advisories/36622 http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-014/index.html http://www.securityfocus.com/bid/36309 http://www.vupen.com/english/advisories/2009/2574 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.4EPSS: 0%CPEs: 95EXPL: 0

Cosminexus Manager in Cosminexus Application Server 06-50 and later might assign the wrong user's group permissions to logical J2EE server processes, which allows local users to gain privileges. Cosminexus Manager en Cosminexus Application Server 06-50 y posteriores podrían asignar los permisos de grupos de usuario erroneamente a los procesos del servidor lógico J2EE, el cual permite a usuarios locales ganar privilegios. • http://osvdb.org/37854 http://secunia.com/advisories/26589 http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html http://www.securityfocus.com/bid/25434 https://exchange.xforce.ibmcloud.com/vulnerabilities/36245 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.6EPSS: 0%CPEs: 95EXPL: 0

Cosminexus Manager in Cosminexus Application Server 07-00 and later might assign the wrong user's group permissions to logical user server processes, which allows local users to gain privileges. Cosminexus Manager en Cosminexus Application Server 07-00 y posteriores podrían asignar permisos de grupos de usuarios de forma incorrecta a procesos del servidor de lógica de usuario, el cual permite a usuarios locales ganar privilegios. • http://osvdb.org/37855 http://secunia.com/advisories/26589 http://www.hitachi-support.com/security_e/vuls_e/HS07-025_e/index-e.html http://www.securityfocus.com/bid/25434 https://exchange.xforce.ibmcloud.com/vulnerabilities/36245 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 0%CPEs: 125EXPL: 0

Buffer overflow in Hitachi Cosminexus V4 through V7, Processing Kit for XML before 20070511, Developer's Kit for Java before 20070312, and third-party products that use this software, allows attackers to have an unknown impact via certain GIF images, related to use of GIF image processing APIs by a Java application. Desbordamiento de búfer en Hitachi Cosminexus V4 hasta V7, Processing Kit para XML versiones anteriores a 20070511, Developer's Kit para Java versiones anteriores a 20070312, y productos de terceras partes que utilizan este software, permite a atacantes remotos tener un impacto desconocido mediante imágenes GIF determinadas, relativas al uso de de APIs de procesamiento de imágenes GIF por una aplicación JAVA. • http://osvdb.org/37851 http://secunia.com/advisories/26025 http://www.hitachi-support.com/security_e/vuls_e/HS07-018_e/index-e.html http://www.securityfocus.com/bid/24905 http://www.vupen.com/english/advisories/2007/2534 •

CVSS: 7.8EPSS: 2%CPEs: 29EXPL: 0

Unspecified vulnerability in the ADM daemon in Hitachi TPBroker before 20070706 allows remote attackers to cause a denial of service (daemon crash) via a certain request. Vulnerabilidad no especificada en el demonio ADM en Hitachi TPBroker anterior a 20070706 permite a atacantes remotos provocar denegación de servicio (caida de demonio) a través de ciertas respuestas. • http://osvdb.org/37847 http://secunia.com/advisories/25972 http://www.hitachi-support.com/security_e/vuls_e/HS07-015_e/index-e.html http://www.securityfocus.com/bid/24789 http://www.vupen.com/english/advisories/2007/2458 https://exchange.xforce.ibmcloud.com/vulnerabilities/35289 •