6 results (0.008 seconds)

CVSS: 9.3EPSS: 1%CPEs: 295EXPL: 0

Buffer overflow in Hitachi Cosminexus V4 through V8, Processing Kit for XML, and Developer's Kit for Java, as used in products such as uCosminexus, Electronic Form Workflow, Groupmax, and IBM XL C/C++ Enterprise Edition 7 and 8, allows remote attackers to have an unknown impact via vectors related to the use of GIF image processing APIs by a Java application, and a different issue from CVE-2007-3794. Desbordamiento de búfer en Hitachi Cosminexus V4 a la V8, Processing Kit para XML, y Developer's Kit para Java, usado en productos como uCosminexus, Electronic Form Workflow, Groupmax, e IBM XL C/C++ Enterprise Edition 7 y 8, permite a atacantes remotos tener un impacto desconocido a través de vectores relacionados con el uso del procesamiento de imágenes GIF mediante APIs para aplicaciones Java. Cuestión distinta del CVE-2007-3794. • http://osvdb.org/57834 http://secunia.com/advisories/36622 http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-014/index.html http://www.securityfocus.com/bid/36309 http://www.vupen.com/english/advisories/2009/2574 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 0

Unspecified vulnerability in the Groupmax Collaboration - Schedule component in Hitachi Groupmax Collaboration Portal 07-30 through 07-30-/F and 07-32 through 07-32-/C, uCosminexus Collaboration Portal 06-30 through 06-30-/F and 06-32 through 06-32-/C, and Groupmax Collaboration Web Client - Mail/Schedule 07-30 through 07-30-/F and 07-32 through 07-32-/B might allow remote attackers to obtain sensitive information via unspecified vectors related to schedule portlets. Vulnerabilidad no especificada en el componente Groupmax Collaboration - Schedule de Hitachi Groupmax Collaboration Portal 07-30 hasta 07-30-/F y 07-32 hasta 07-32-/C, uCosminexus Collaboration Portal 06-30 hasta 06-30-/F y 06-32 hasta 06-32-/C, y Groupmax Collaboration Web Client - Mail/Schedule 07-30 hasta 07-30-/F y d 07-32 hasta 07-32-/B podría permitir a atacantes remotos obtener información confidencial mediante vectores no especificados relativos a portlets de agenda. • http://osvdb.org/42025 http://secunia.com/advisories/27451 http://www.hitachi-support.com/security_e/vuls_e/HS07-036_e/index-e.html http://www.securityfocus.com/bid/26272 http://www.vupen.com/english/advisories/2007/3667 https://exchange.xforce.ibmcloud.com/vulnerabilities/38188 •

CVSS: 3.5EPSS: 0%CPEs: 6EXPL: 0

Hitachi Groupmax Collaboration - Schedule, as used in Groupmax Collaboration Portal 07-32 through 07-32-/B, uCosminexus Collaboration Portal 06-32 through 06-32-/B, and Groupmax Collaboration Web Client - Mail/Schedule 07-32 through 07-32-/A, can assign schedule data to the wrong user under unspecified conditions, which might allow remote authenticated users to obtain sensitive information. Hitachi Groupmax Collaboration - Schedule, usado en Groupmax Collaboration Portal 07-32 hasta 07-32-/B, uCosminexus Collaboration Portal 06-32 hasta 06-32-/B, y Groupmax Collaboration Web Client - Mail/Schedule 07-32 hasta 07-32-/A, puede asignar datos de programación (schedule) al usuario incorrecto bajo condiciones no especificadas, lo cual podría permitir a usuarios autenticados remotamente obtener información sensible. • http://osvdb.org/46987 http://www.hitachi-support.com/security_e/vuls_e/HS07-022_e/index-e.html http://www.vupen.com/english/advisories/2007/2723 https://exchange.xforce.ibmcloud.com/vulnerabilities/35704 •

CVSS: 4.9EPSS: 0%CPEs: 22EXPL: 0

The session failover function in Cosminexus Component Container in Cosminexus 6, 6.7, and 7 before 20070731, as used in multiple Hitachi products, can use session data for the wrong user under unspecified conditions, which might allow remote authenticated users to obtain sensitive information, corrupt another user's session data, and possibly gain privileges. La función de recuperación de sesión ante fallos en Cosminexus Component Container de Cosminexus 6, 6.7, y 7 anterior al 31/07/2007, como el usado en múltiples productos de Hitachi, puede utilizar información de la sesión para el usuario equivocado bajo ciertas condiciones no especificadas, lo cual podría permitir a usuarios autenticados remotos obtener información sensible, corromper la información de sesión de otros usuarios, y posiblemente obtener privilegios. • http://osvdb.org/37852 http://secunia.com/advisories/26250 http://www.hitachi-support.com/security_e/vuls_e/HS07-024_e/index-e.html http://www.securityfocus.com/bid/25145 http://www.vupen.com/english/advisories/2007/2725 https://exchange.xforce.ibmcloud.com/vulnerabilities/35706 •

CVSS: 4.3EPSS: 0%CPEs: 8EXPL: 0

Cross-site scripting (XSS) vulnerability in Collaboration - File Sharing 01-20 up to 01-20-/B and 01-30 up to 01-30-/B in Hitachi Groupmax Collaboration Portal up to 07-30-/D, Groupmax Collaboration Web Client - Forum/File Sharing up to 07-30-/C, uCosminexus Collaboration Portal up to 06-30-/D, and uCosminexus Collaboration Portal - Forum/File Sharing up to 06-30-/C on Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Collaboration - File Sharing 01-20 hasta 01-20-/B y 01-30 hasta 01-30-/B en Hitechi Groupmax Collaboration Portal hasta 07-30-/D, Groupmax Collaboration Web Client - Forum/File Sharing hasta 07-30-/C, uCosminexus Collaboration Portal hasta 06-30-/D, y uCosminexus Collaboration Portal - Forum/File Sharing hasta 06-30-/C en Windows permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través de vectores no especificados. • http://osvdb.org/36828 http://secunia.com/advisories/25507 http://www.hitachi-support.com/security_e/vuls_e/HS07-011_e/index-e.html http://www.securityfocus.com/bid/24263 http://www.vupen.com/english/advisories/2007/2020 https://exchange.xforce.ibmcloud.com/vulnerabilities/34659 •