Search criteria

9 vulnerabilities found for access_analyzer_cgi by futomi

FKIE_CVE-2010-2366

Vulnerability from fkie_nvd - Published: 2010-09-13 21:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Impacted products
Vendor Product Version
futomi access_analyzer_cgi *
futomi access_analyzer_cgi *
futomi access_analyzer_cgi 1.0
futomi access_analyzer_cgi 1.0
futomi access_analyzer_cgi 1.1
futomi access_analyzer_cgi 1.1
futomi access_analyzer_cgi 1.2
futomi access_analyzer_cgi 1.2
futomi access_analyzer_cgi 1.3
futomi access_analyzer_cgi 1.3
futomi access_analyzer_cgi 1.4
futomi access_analyzer_cgi 1.4
futomi access_analyzer_cgi 1.5
futomi access_analyzer_cgi 1.5
futomi access_analyzer_cgi 1.6
futomi access_analyzer_cgi 1.6
futomi access_analyzer_cgi 1.7
futomi access_analyzer_cgi 1.7
futomi access_analyzer_cgi 2.0
futomi access_analyzer_cgi 2.0
futomi access_analyzer_cgi 2.1
futomi access_analyzer_cgi 2.1
futomi access_analyzer_cgi 2.2
futomi access_analyzer_cgi 2.2
futomi access_analyzer_cgi 2.3
futomi access_analyzer_cgi 2.3
futomi access_analyzer_cgi 2.4
futomi access_analyzer_cgi 2.4
futomi access_analyzer_cgi 3.0
futomi access_analyzer_cgi 3.0
futomi access_analyzer_cgi 3.1
futomi access_analyzer_cgi 3.1
futomi access_analyzer_cgi 3.2
futomi access_analyzer_cgi 3.2
futomi access_analyzer_cgi 3.3
futomi access_analyzer_cgi 3.3
futomi access_analyzer_cgi 3.4
futomi access_analyzer_cgi 3.4
futomi access_analyzer_cgi 3.5
futomi access_analyzer_cgi 3.5
futomi access_analyzer_cgi 3.6
futomi access_analyzer_cgi 3.6
futomi access_analyzer_cgi 3.7
futomi access_analyzer_cgi 3.7
futomi access_analyzer_cgi 3.8
futomi access_analyzer_cgi 3.8
futomi access_analyzer_cgi 3.8.1
futomi access_analyzer_cgi 3.8.1
futomi access_analyzer_cgi 4.0.0
futomi access_analyzer_cgi 4.0.0
futomi access_analyzer_cgi 4.0.1
futomi access_analyzer_cgi 4.0.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:*:*:pro:*:*:*:*:*",
              "matchCriteriaId": "AE498989-6141-42B7-B9CB-89BF150ADB49",
              "versionEndIncluding": "4.0.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:*:*:std:*:*:*:*:*",
              "matchCriteriaId": "6AE14AF3-0E9B-4B4F-B87E-E810732266C7",
              "versionEndIncluding": "4.0.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.0:*:pro:*:*:*:*:*",
              "matchCriteriaId": "4DACE21F-6BD1-4B6A-B981-962EDEF18960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.0:*:std:*:*:*:*:*",
              "matchCriteriaId": "77EC711D-E051-46BA-A4C6-867F1E54AF18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.1:*:pro:*:*:*:*:*",
              "matchCriteriaId": "BC69DFE1-8470-49F9-A9A2-5DAA078D6FBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.1:*:std:*:*:*:*:*",
              "matchCriteriaId": "20ABFF4F-26C3-461D-9F38-6B8DE57B2782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.2:*:pro:*:*:*:*:*",
              "matchCriteriaId": "00C4AF36-6CC0-4ED4-ADE2-DF512D08BF46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.2:*:std:*:*:*:*:*",
              "matchCriteriaId": "FA7F7688-CD90-46B7-9AB2-D52A57C5BA81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.3:*:pro:*:*:*:*:*",
              "matchCriteriaId": "B5327842-F28A-498B-BF64-79834317A10A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.3:*:std:*:*:*:*:*",
              "matchCriteriaId": "0490EFA6-AEAB-4F11-B679-B9DC1245EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.4:*:pro:*:*:*:*:*",
              "matchCriteriaId": "867F9024-F6CB-403D-85E4-6971E80BF39F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.4:*:std:*:*:*:*:*",
              "matchCriteriaId": "6974958E-E0C9-4AB5-AE67-B8A2483772A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.5:*:pro:*:*:*:*:*",
              "matchCriteriaId": "DC4D1007-5F20-4FA2-ACF1-CA042EAA2381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.5:*:std:*:*:*:*:*",
              "matchCriteriaId": "5A264EF6-755C-41F7-B935-E99CC96FF5F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.6:*:pro:*:*:*:*:*",
              "matchCriteriaId": "A476143A-F9D9-4859-84D2-09A55C8950F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.6:*:std:*:*:*:*:*",
              "matchCriteriaId": "99904C92-2329-491C-BA92-6BFDB8C9799D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.7:*:pro:*:*:*:*:*",
              "matchCriteriaId": "8F33DA4C-C29B-4754-9109-87EBF0385AF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.7:*:std:*:*:*:*:*",
              "matchCriteriaId": "E2594263-4BEC-488D-B116-15A4724AE007",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.0:*:pro:*:*:*:*:*",
              "matchCriteriaId": "A7118E38-478B-4372-B99C-54F970C01417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.0:*:std:*:*:*:*:*",
              "matchCriteriaId": "B2375FDF-B383-44BC-A2DF-F71416790EBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.1:*:pro:*:*:*:*:*",
              "matchCriteriaId": "A949929A-048A-43C2-9C97-F25DD8EEA20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.1:*:std:*:*:*:*:*",
              "matchCriteriaId": "629AAD4C-BB24-4F13-8EAD-6081964470F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.2:*:pro:*:*:*:*:*",
              "matchCriteriaId": "B3401E94-03C9-448D-8035-A23B7FFC2B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.2:*:std:*:*:*:*:*",
              "matchCriteriaId": "A70FB601-1673-447E-8FF0-4B6EAB44C602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.3:*:pro:*:*:*:*:*",
              "matchCriteriaId": "3B7662E9-9A3D-4665-A521-1840413626F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.3:*:std:*:*:*:*:*",
              "matchCriteriaId": "74956E00-B195-488B-8CDF-7497D238629A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.4:*:pro:*:*:*:*:*",
              "matchCriteriaId": "ECCED7DD-36CA-4E34-9A4C-52588BC1A159",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.4:*:std:*:*:*:*:*",
              "matchCriteriaId": "5DAB8541-7F13-4D7F-9313-B2242BA8EEF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.0:*:pro:*:*:*:*:*",
              "matchCriteriaId": "6AC99C14-1D90-454F-AC0E-4AED96655C10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.0:*:std:*:*:*:*:*",
              "matchCriteriaId": "9108EF94-DDBB-4F07-B83C-9CAFD7821BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.1:*:pro:*:*:*:*:*",
              "matchCriteriaId": "AFC88E31-EEC2-40A7-88CB-76E6F492A0D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.1:*:std:*:*:*:*:*",
              "matchCriteriaId": "F566B688-0734-4C28-9BF1-CAD72C910568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.2:*:pro:*:*:*:*:*",
              "matchCriteriaId": "AA918131-934C-4817-8287-EF81BECAF53B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.2:*:std:*:*:*:*:*",
              "matchCriteriaId": "8AD08FFB-D51A-4A93-A0FC-14F2F8AE80B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.3:*:pro:*:*:*:*:*",
              "matchCriteriaId": "FA031486-A7F2-4A3F-A798-E391C069AB02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.3:*:std:*:*:*:*:*",
              "matchCriteriaId": "D4BF8DD9-C511-46B2-AA71-83E0D214591C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.4:*:pro:*:*:*:*:*",
              "matchCriteriaId": "E85F427A-F93F-434F-A558-92081C074450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.4:*:std:*:*:*:*:*",
              "matchCriteriaId": "845055EE-C586-4238-A6D9-9A72F4F302B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.5:*:pro:*:*:*:*:*",
              "matchCriteriaId": "9193D6DC-58C2-4EE0-97D9-00C6313084A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.5:*:std:*:*:*:*:*",
              "matchCriteriaId": "E522C8B4-EF1C-44BF-B7F3-27E36AE975A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.6:*:pro:*:*:*:*:*",
              "matchCriteriaId": "F6359E78-DB9D-4C3D-92E4-B58BC64C16D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.6:*:std:*:*:*:*:*",
              "matchCriteriaId": "567641E9-8618-48B8-83CD-25AF4C7A27D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.7:*:pro:*:*:*:*:*",
              "matchCriteriaId": "91E96CE9-5CAA-45F0-A8E9-41AA29EBAA10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.7:*:std:*:*:*:*:*",
              "matchCriteriaId": "04260F18-1816-4347-83E0-6CE9C736841F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.8:*:pro:*:*:*:*:*",
              "matchCriteriaId": "D11D9AC4-D506-423F-9F3A-E6C8955A2A43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.8:*:std:*:*:*:*:*",
              "matchCriteriaId": "002162F2-C5AD-48AE-96D9-1A4D95E2F763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.8.1:*:pro:*:*:*:*:*",
              "matchCriteriaId": "3122DDE1-FA0A-438C-A504-1613AB53431A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.8.1:*:std:*:*:*:*:*",
              "matchCriteriaId": "56952B57-9376-4016-BC01-23DA0383172E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.0.0:*:pro:*:*:*:*:*",
              "matchCriteriaId": "D469C8D7-D454-4379-83FD-9E94443EEFA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.0.0:*:std:*:*:*:*:*",
              "matchCriteriaId": "F403BCDE-3C50-4871-BF0E-AD5F78531D47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.0.1:*:pro:*:*:*:*:*",
              "matchCriteriaId": "EC17D897-7035-45A1-A84D-D27F880720B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.0.1:*:std:*:*:*:*:*",
              "matchCriteriaId": "3FFE7790-6558-42C9-8966-BDF5D11C172D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados en futomi CGI Cafe Access Analyzer CGI en sus versiones Professional y  Standard v4.0.2, y versiones anteriores, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2010-2366",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-09-13T21:00:02.667",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://jvn.jp/en/jp/JVN35605523/index.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.futomi.com/library/info/2010/20100910.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/43142"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN35605523/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.futomi.com/library/info/2010/20100910.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/43142"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-0971

Vulnerability from fkie_nvd - Published: 2009-03-19 10:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in futomi's CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:*:*:std:*:*:*:*:*",
              "matchCriteriaId": "F6175713-CFAA-415D-87D8-F54EB2FC91AF",
              "versionEndIncluding": "3.8.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.1:*:std:*:*:*:*:*",
              "matchCriteriaId": "20ABFF4F-26C3-461D-9F38-6B8DE57B2782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.2:*:std:*:*:*:*:*",
              "matchCriteriaId": "FA7F7688-CD90-46B7-9AB2-D52A57C5BA81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.3:*:std:*:*:*:*:*",
              "matchCriteriaId": "0490EFA6-AEAB-4F11-B679-B9DC1245EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.4:*:std:*:*:*:*:*",
              "matchCriteriaId": "6974958E-E0C9-4AB5-AE67-B8A2483772A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.0:*:std:*:*:*:*:*",
              "matchCriteriaId": "B2375FDF-B383-44BC-A2DF-F71416790EBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.1:*:std:*:*:*:*:*",
              "matchCriteriaId": "629AAD4C-BB24-4F13-8EAD-6081964470F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.2:*:std:*:*:*:*:*",
              "matchCriteriaId": "A70FB601-1673-447E-8FF0-4B6EAB44C602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.3:*:std:*:*:*:*:*",
              "matchCriteriaId": "74956E00-B195-488B-8CDF-7497D238629A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.4:*:std:*:*:*:*:*",
              "matchCriteriaId": "5DAB8541-7F13-4D7F-9313-B2242BA8EEF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.0:*:std:*:*:*:*:*",
              "matchCriteriaId": "9108EF94-DDBB-4F07-B83C-9CAFD7821BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.1:*:std:*:*:*:*:*",
              "matchCriteriaId": "F566B688-0734-4C28-9BF1-CAD72C910568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.2:*:std:*:*:*:*:*",
              "matchCriteriaId": "8AD08FFB-D51A-4A93-A0FC-14F2F8AE80B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.3:*:std:*:*:*:*:*",
              "matchCriteriaId": "D4BF8DD9-C511-46B2-AA71-83E0D214591C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.4:*:std:*:*:*:*:*",
              "matchCriteriaId": "845055EE-C586-4238-A6D9-9A72F4F302B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.5:*:std:*:*:*:*:*",
              "matchCriteriaId": "E522C8B4-EF1C-44BF-B7F3-27E36AE975A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.6:*:std:*:*:*:*:*",
              "matchCriteriaId": "567641E9-8618-48B8-83CD-25AF4C7A27D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.7:*:std:*:*:*:*:*",
              "matchCriteriaId": "04260F18-1816-4347-83E0-6CE9C736841F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.8:*:std:*:*:*:*:*",
              "matchCriteriaId": "002162F2-C5AD-48AE-96D9-1A4D95E2F763",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in futomi\u0027s CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en futomi\u0027s CGI Cafe Access Analyzer CGI Standard Version v3.8.1, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2009-0971",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-03-19T10:30:00.610",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://jvn.jp/en/jp/JVN23558374/index.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000015.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/52802"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34271"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.futomi.com/library/info/2009/20090316.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34123"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0737"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49264"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN23558374/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/52802"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34271"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.futomi.com/library/info/2009/20090316.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34123"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0737"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49264"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-5809

Vulnerability from fkie_nvd - Published: 2009-01-02 18:11 - Updated: 2025-04-09 00:30
Severity ?
Summary
futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id.
Impacted products
Vendor Product Version
futomi access_analyzer_cgi *
futomi access_analyzer_cgi _nil_
futomi access_analyzer_cgi _nil_
futomi access_analyzer_cgi 1.0
futomi access_analyzer_cgi 1.1
futomi access_analyzer_cgi 1.1
futomi access_analyzer_cgi 1.2
futomi access_analyzer_cgi 1.2
futomi access_analyzer_cgi 1.3
futomi access_analyzer_cgi 1.3
futomi access_analyzer_cgi 1.4
futomi access_analyzer_cgi 1.4
futomi access_analyzer_cgi 1.5
futomi access_analyzer_cgi 1.6
futomi access_analyzer_cgi 1.7
futomi access_analyzer_cgi 2.0
futomi access_analyzer_cgi 2.0
futomi access_analyzer_cgi 2.1
futomi access_analyzer_cgi 2.1
futomi access_analyzer_cgi 2.2
futomi access_analyzer_cgi 2.2
futomi access_analyzer_cgi 2.3
futomi access_analyzer_cgi 2.3
futomi access_analyzer_cgi 2.4
futomi access_analyzer_cgi 2.4
futomi access_analyzer_cgi 3.0
futomi access_analyzer_cgi 3.0
futomi access_analyzer_cgi 3.1
futomi access_analyzer_cgi 3.1
futomi access_analyzer_cgi 3.2
futomi access_analyzer_cgi 3.2
futomi access_analyzer_cgi 3.3
futomi access_analyzer_cgi 3.3
futomi access_analyzer_cgi 3.4
futomi access_analyzer_cgi 3.4
futomi access_analyzer_cgi 3.5
futomi access_analyzer_cgi 3.5
futomi access_analyzer_cgi 3.6
futomi access_analyzer_cgi 3.7
futomi access_analyzer_cgi 3.8
futomi access_analyzer_cgi 3.8.1
futomi access_analyzer_cgi 4.0
futomi access_analyzer_cgi 4.0.0
futomi access_analyzer_cgi 4.1
futomi access_analyzer_cgi 4.2
futomi access_analyzer_cgi 4.3
futomi access_analyzer_cgi 4.4
futomi access_analyzer_cgi 4.5
futomi access_analyzer_cgi 4.6
futomi access_analyzer_cgi 4.7
futomi access_analyzer_cgi 4.8
futomi access_analyzer_cgi 4.9
futomi access_analyzer_cgi 4.10
futomi access_analyzer_cgi 4.10.1
futomi access_analyzer_cgi 4.10.2
futomi access_analyzer_cgi 4.10.3
futomi access_analyzer_cgi 4.10.4
futomi access_analyzer_cgi 4.10.5
futomi access_analyzer_cgi 4.11.0
futomi access_analyzer_cgi 4.11.1
futomi access_analyzer_cgi 4.11.2
futomi access_analyzer_cgi 4.11.3

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:*:*:std:*:*:*:*:*",
              "matchCriteriaId": "433A48C4-668C-4180-9F15-AF4EE2C177FD",
              "versionEndIncluding": "4.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:_nil_:beta1:pro:*:*:*:*:*",
              "matchCriteriaId": "96C6AB92-C9B1-427C-BF22-C6732756A915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:_nil_:beta2:pro:*:*:*:*:*",
              "matchCriteriaId": "CDA70C01-8CEE-40E7-9878-D74E34CE8E5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.0:*:pro:*:*:*:*:*",
              "matchCriteriaId": "4DACE21F-6BD1-4B6A-B981-962EDEF18960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.1:*:pro:*:*:*:*:*",
              "matchCriteriaId": "BC69DFE1-8470-49F9-A9A2-5DAA078D6FBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.1:*:std:*:*:*:*:*",
              "matchCriteriaId": "20ABFF4F-26C3-461D-9F38-6B8DE57B2782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.2:*:pro:*:*:*:*:*",
              "matchCriteriaId": "00C4AF36-6CC0-4ED4-ADE2-DF512D08BF46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.2:*:std:*:*:*:*:*",
              "matchCriteriaId": "FA7F7688-CD90-46B7-9AB2-D52A57C5BA81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.3:*:pro:*:*:*:*:*",
              "matchCriteriaId": "B5327842-F28A-498B-BF64-79834317A10A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.3:*:std:*:*:*:*:*",
              "matchCriteriaId": "0490EFA6-AEAB-4F11-B679-B9DC1245EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.4:*:pro:*:*:*:*:*",
              "matchCriteriaId": "867F9024-F6CB-403D-85E4-6971E80BF39F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.4:*:std:*:*:*:*:*",
              "matchCriteriaId": "6974958E-E0C9-4AB5-AE67-B8A2483772A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.5:*:pro:*:*:*:*:*",
              "matchCriteriaId": "DC4D1007-5F20-4FA2-ACF1-CA042EAA2381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.6:*:pro:*:*:*:*:*",
              "matchCriteriaId": "A476143A-F9D9-4859-84D2-09A55C8950F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.7:*:pro:*:*:*:*:*",
              "matchCriteriaId": "8F33DA4C-C29B-4754-9109-87EBF0385AF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.0:*:pro:*:*:*:*:*",
              "matchCriteriaId": "A7118E38-478B-4372-B99C-54F970C01417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.0:*:std:*:*:*:*:*",
              "matchCriteriaId": "B2375FDF-B383-44BC-A2DF-F71416790EBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.1:*:pro:*:*:*:*:*",
              "matchCriteriaId": "A949929A-048A-43C2-9C97-F25DD8EEA20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.1:*:std:*:*:*:*:*",
              "matchCriteriaId": "629AAD4C-BB24-4F13-8EAD-6081964470F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.2:*:pro:*:*:*:*:*",
              "matchCriteriaId": "B3401E94-03C9-448D-8035-A23B7FFC2B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.2:*:std:*:*:*:*:*",
              "matchCriteriaId": "A70FB601-1673-447E-8FF0-4B6EAB44C602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.3:*:pro:*:*:*:*:*",
              "matchCriteriaId": "3B7662E9-9A3D-4665-A521-1840413626F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.3:*:std:*:*:*:*:*",
              "matchCriteriaId": "74956E00-B195-488B-8CDF-7497D238629A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.4:*:pro:*:*:*:*:*",
              "matchCriteriaId": "ECCED7DD-36CA-4E34-9A4C-52588BC1A159",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.4:*:std:*:*:*:*:*",
              "matchCriteriaId": "5DAB8541-7F13-4D7F-9313-B2242BA8EEF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.0:*:pro:*:*:*:*:*",
              "matchCriteriaId": "6AC99C14-1D90-454F-AC0E-4AED96655C10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.0:*:std:*:*:*:*:*",
              "matchCriteriaId": "9108EF94-DDBB-4F07-B83C-9CAFD7821BD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.1:*:pro:*:*:*:*:*",
              "matchCriteriaId": "AFC88E31-EEC2-40A7-88CB-76E6F492A0D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.1:*:std:*:*:*:*:*",
              "matchCriteriaId": "F566B688-0734-4C28-9BF1-CAD72C910568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.2:*:pro:*:*:*:*:*",
              "matchCriteriaId": "AA918131-934C-4817-8287-EF81BECAF53B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.2:*:std:*:*:*:*:*",
              "matchCriteriaId": "8AD08FFB-D51A-4A93-A0FC-14F2F8AE80B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.3:*:pro:*:*:*:*:*",
              "matchCriteriaId": "FA031486-A7F2-4A3F-A798-E391C069AB02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.3:*:std:*:*:*:*:*",
              "matchCriteriaId": "D4BF8DD9-C511-46B2-AA71-83E0D214591C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.4:*:pro:*:*:*:*:*",
              "matchCriteriaId": "E85F427A-F93F-434F-A558-92081C074450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.4:*:std:*:*:*:*:*",
              "matchCriteriaId": "845055EE-C586-4238-A6D9-9A72F4F302B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.5:*:pro:*:*:*:*:*",
              "matchCriteriaId": "9193D6DC-58C2-4EE0-97D9-00C6313084A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.5:*:std:*:*:*:*:*",
              "matchCriteriaId": "E522C8B4-EF1C-44BF-B7F3-27E36AE975A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.6:*:std:*:*:*:*:*",
              "matchCriteriaId": "567641E9-8618-48B8-83CD-25AF4C7A27D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.7:*:std:*:*:*:*:*",
              "matchCriteriaId": "04260F18-1816-4347-83E0-6CE9C736841F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.8:*:std:*:*:*:*:*",
              "matchCriteriaId": "002162F2-C5AD-48AE-96D9-1A4D95E2F763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.8.1:*:std:*:*:*:*:*",
              "matchCriteriaId": "56952B57-9376-4016-BC01-23DA0383172E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.0:*:pro:*:*:*:*:*",
              "matchCriteriaId": "CF1C66B0-1254-42AF-91FC-8AC9AC4ADD6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.0.0:*:std:*:*:*:*:*",
              "matchCriteriaId": "F403BCDE-3C50-4871-BF0E-AD5F78531D47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.1:*:pro:*:*:*:*:*",
              "matchCriteriaId": "4281B455-28D4-4D49-A17C-2534E82A0B74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.2:*:pro:*:*:*:*:*",
              "matchCriteriaId": "26E142EF-81D2-4477-AE06-0375BCF7CD8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.3:*:pro:*:*:*:*:*",
              "matchCriteriaId": "0C767C19-1453-4945-AB7C-436C742D4422",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.4:*:pro:*:*:*:*:*",
              "matchCriteriaId": "E4D39FCF-B280-49A3-9E5F-F149958A5092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.5:*:pro:*:*:*:*:*",
              "matchCriteriaId": "86227B63-A790-42B4-9152-F26D67961BA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.6:*:pro:*:*:*:*:*",
              "matchCriteriaId": "65679525-6A75-467A-A099-74E125B09616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.7:*:pro:*:*:*:*:*",
              "matchCriteriaId": "122E6C60-AACA-4BD9-A1C1-B054456518FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.8:*:pro:*:*:*:*:*",
              "matchCriteriaId": "D4C86C16-1221-4C23-B2AE-C8E0301E840E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.9:*:pro:*:*:*:*:*",
              "matchCriteriaId": "407F0D69-34B2-458F-9B81-85D39B354E2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.10:*:pro:*:*:*:*:*",
              "matchCriteriaId": "EBDEC8D6-7B21-42CF-BFF1-C9771445C470",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.10.1:*:pro:*:*:*:*:*",
              "matchCriteriaId": "4C379B11-5340-4C44-8250-7C2193FA65B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.10.2:*:pro:*:*:*:*:*",
              "matchCriteriaId": "66856EBA-7090-44C7-8BD5-DBF3B49400E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.10.3:*:pro:*:*:*:*:*",
              "matchCriteriaId": "4953F16E-98B2-4E77-B342-34A12DEDC6AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.10.4:*:pro:*:*:*:*:*",
              "matchCriteriaId": "0C3B196D-ACD1-49BB-B619-9EB010FB692F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.10.5:*:pro:*:*:*:*:*",
              "matchCriteriaId": "35C6DB72-D288-4183-917D-B9A65342C56D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.11.0:*:pro:*:*:*:*:*",
              "matchCriteriaId": "9A6C11FD-0501-47AB-82B5-D2D81312C91B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.11.1:*:pro:*:*:*:*:*",
              "matchCriteriaId": "D6A9827B-A26E-42D9-AEF3-7A0D30DBA1AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.11.2:*:pro:*:*:*:*:*",
              "matchCriteriaId": "5F8F4CDA-9ECB-461D-AED1-E425B96ECD67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.11.3:*:pro:*:*:*:*:*",
              "matchCriteriaId": "F9BD338F-F5A6-4F23-9BD1-5CB44A59B8B2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id."
    },
    {
      "lang": "es",
      "value": "futomi CGI Cafe Access Analyzer CGI Standard v4.0.1 y anteriores y Analyzer CGI Professional v4.11.3 y anteriores usan una \"id\" predecible, lo que hace sencillo a atacantes remotos, secuestrar sesiones, y obtener informaci\u00f3n sensible acerca de los resultados de los an\u00e1lisis, mediante una \"id\" modificada."
    }
  ],
  "id": "CVE-2008-5809",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-01-02T18:11:09.530",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://jvn.jp/en/jp/JVN07468800/index.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000083.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.futomi.com/library/info/2008/20081212.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/32794"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN07468800/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000083.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.futomi.com/library/info/2008/20081212.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/32794"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2010-2366 (GCVE-0-2010-2366)

Vulnerability from cvelistv5 – Published: 2010-09-13 20:00 – Updated: 2024-09-16 18:48
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN35605523/index.html third-party-advisoryx_refsource_JVN
http://www.securityfocus.com/bid/43142 vdb-entryx_refsource_BID
http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-0… third-party-advisoryx_refsource_JVNDB
http://www.futomi.com/library/info/2010/20100910.html x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:32:16.385Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#35605523",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN35605523/index.html"
          },
          {
            "name": "43142",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43142"
          },
          {
            "name": "JVNDB-2010-000035",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.futomi.com/library/info/2010/20100910.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-09-13T20:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "JVN#35605523",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN35605523/index.html"
        },
        {
          "name": "43142",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43142"
        },
        {
          "name": "JVNDB-2010-000035",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.futomi.com/library/info/2010/20100910.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-2366",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#35605523",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN35605523/index.html"
            },
            {
              "name": "43142",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/43142"
            },
            {
              "name": "JVNDB-2010-000035",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html"
            },
            {
              "name": "http://www.futomi.com/library/info/2010/20100910.html",
              "refsource": "CONFIRM",
              "url": "http://www.futomi.com/library/info/2010/20100910.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-2366",
    "datePublished": "2010-09-13T20:00:00Z",
    "dateReserved": "2010-06-21T00:00:00Z",
    "dateUpdated": "2024-09-16T18:48:57.905Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-0971 (GCVE-0-2009-0971)

Vulnerability from cvelistv5 – Published: 2009-03-19 10:00 – Updated: 2024-08-07 04:57
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in futomi's CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.futomi.com/library/info/2009/20090316.html x_refsource_CONFIRM
http://www.securityfocus.com/bid/34123 vdb-entryx_refsource_BID
http://secunia.com/advisories/34271 third-party-advisoryx_refsource_SECUNIA
http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-0… third-party-advisoryx_refsource_JVNDB
http://www.vupen.com/english/advisories/2009/0737 vdb-entryx_refsource_VUPEN
http://osvdb.org/52802 vdb-entryx_refsource_OSVDB
http://jvn.jp/en/jp/JVN23558374/index.html third-party-advisoryx_refsource_JVN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:57:17.189Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.futomi.com/library/info/2009/20090316.html"
          },
          {
            "name": "34123",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34123"
          },
          {
            "name": "34271",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34271"
          },
          {
            "name": "JVNDB-2009-000015",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000015.html"
          },
          {
            "name": "ADV-2009-0737",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0737"
          },
          {
            "name": "52802",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/52802"
          },
          {
            "name": "JVN#23558374",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN23558374/index.html"
          },
          {
            "name": "cgicafe-unspecified-xss(49264)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49264"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in futomi\u0027s CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.futomi.com/library/info/2009/20090316.html"
        },
        {
          "name": "34123",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34123"
        },
        {
          "name": "34271",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34271"
        },
        {
          "name": "JVNDB-2009-000015",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000015.html"
        },
        {
          "name": "ADV-2009-0737",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0737"
        },
        {
          "name": "52802",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/52802"
        },
        {
          "name": "JVN#23558374",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN23558374/index.html"
        },
        {
          "name": "cgicafe-unspecified-xss(49264)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49264"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0971",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in futomi\u0027s CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.futomi.com/library/info/2009/20090316.html",
              "refsource": "CONFIRM",
              "url": "http://www.futomi.com/library/info/2009/20090316.html"
            },
            {
              "name": "34123",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34123"
            },
            {
              "name": "34271",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34271"
            },
            {
              "name": "JVNDB-2009-000015",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000015.html"
            },
            {
              "name": "ADV-2009-0737",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0737"
            },
            {
              "name": "52802",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/52802"
            },
            {
              "name": "JVN#23558374",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN23558374/index.html"
            },
            {
              "name": "cgicafe-unspecified-xss(49264)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49264"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-0971",
    "datePublished": "2009-03-19T10:00:00",
    "dateReserved": "2009-03-18T00:00:00",
    "dateUpdated": "2024-08-07T04:57:17.189Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5809 (GCVE-0-2008-5809)

Vulnerability from cvelistv5 – Published: 2009-01-02 18:00 – Updated: 2024-08-07 11:04
VLAI?
Summary
futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-0… third-party-advisoryx_refsource_JVNDB
http://www.securityfocus.com/bid/32794 vdb-entryx_refsource_BID
http://www.futomi.com/library/info/2008/20081212.html x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN07468800/index.html third-party-advisoryx_refsource_JVN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:04:44.629Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2008-000083",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000083.html"
          },
          {
            "name": "32794",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32794"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.futomi.com/library/info/2008/20081212.html"
          },
          {
            "name": "JVN#07468800",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN07468800/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "JVNDB-2008-000083",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000083.html"
        },
        {
          "name": "32794",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32794"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.futomi.com/library/info/2008/20081212.html"
        },
        {
          "name": "JVN#07468800",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN07468800/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5809",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2008-000083",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000083.html"
            },
            {
              "name": "32794",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32794"
            },
            {
              "name": "http://www.futomi.com/library/info/2008/20081212.html",
              "refsource": "CONFIRM",
              "url": "http://www.futomi.com/library/info/2008/20081212.html"
            },
            {
              "name": "JVN#07468800",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN07468800/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5809",
    "datePublished": "2009-01-02T18:00:00",
    "dateReserved": "2009-01-02T00:00:00",
    "dateUpdated": "2024-08-07T11:04:44.629Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-2366 (GCVE-0-2010-2366)

Vulnerability from nvd – Published: 2010-09-13 20:00 – Updated: 2024-09-16 18:48
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN35605523/index.html third-party-advisoryx_refsource_JVN
http://www.securityfocus.com/bid/43142 vdb-entryx_refsource_BID
http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-0… third-party-advisoryx_refsource_JVNDB
http://www.futomi.com/library/info/2010/20100910.html x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:32:16.385Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#35605523",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN35605523/index.html"
          },
          {
            "name": "43142",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43142"
          },
          {
            "name": "JVNDB-2010-000035",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.futomi.com/library/info/2010/20100910.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-09-13T20:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "JVN#35605523",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN35605523/index.html"
        },
        {
          "name": "43142",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43142"
        },
        {
          "name": "JVNDB-2010-000035",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.futomi.com/library/info/2010/20100910.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-2366",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#35605523",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN35605523/index.html"
            },
            {
              "name": "43142",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/43142"
            },
            {
              "name": "JVNDB-2010-000035",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html"
            },
            {
              "name": "http://www.futomi.com/library/info/2010/20100910.html",
              "refsource": "CONFIRM",
              "url": "http://www.futomi.com/library/info/2010/20100910.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-2366",
    "datePublished": "2010-09-13T20:00:00Z",
    "dateReserved": "2010-06-21T00:00:00Z",
    "dateUpdated": "2024-09-16T18:48:57.905Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-0971 (GCVE-0-2009-0971)

Vulnerability from nvd – Published: 2009-03-19 10:00 – Updated: 2024-08-07 04:57
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in futomi's CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.futomi.com/library/info/2009/20090316.html x_refsource_CONFIRM
http://www.securityfocus.com/bid/34123 vdb-entryx_refsource_BID
http://secunia.com/advisories/34271 third-party-advisoryx_refsource_SECUNIA
http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-0… third-party-advisoryx_refsource_JVNDB
http://www.vupen.com/english/advisories/2009/0737 vdb-entryx_refsource_VUPEN
http://osvdb.org/52802 vdb-entryx_refsource_OSVDB
http://jvn.jp/en/jp/JVN23558374/index.html third-party-advisoryx_refsource_JVN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:57:17.189Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.futomi.com/library/info/2009/20090316.html"
          },
          {
            "name": "34123",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34123"
          },
          {
            "name": "34271",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34271"
          },
          {
            "name": "JVNDB-2009-000015",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000015.html"
          },
          {
            "name": "ADV-2009-0737",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0737"
          },
          {
            "name": "52802",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/52802"
          },
          {
            "name": "JVN#23558374",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN23558374/index.html"
          },
          {
            "name": "cgicafe-unspecified-xss(49264)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49264"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in futomi\u0027s CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.futomi.com/library/info/2009/20090316.html"
        },
        {
          "name": "34123",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34123"
        },
        {
          "name": "34271",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34271"
        },
        {
          "name": "JVNDB-2009-000015",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000015.html"
        },
        {
          "name": "ADV-2009-0737",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0737"
        },
        {
          "name": "52802",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/52802"
        },
        {
          "name": "JVN#23558374",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN23558374/index.html"
        },
        {
          "name": "cgicafe-unspecified-xss(49264)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49264"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0971",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in futomi\u0027s CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.futomi.com/library/info/2009/20090316.html",
              "refsource": "CONFIRM",
              "url": "http://www.futomi.com/library/info/2009/20090316.html"
            },
            {
              "name": "34123",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34123"
            },
            {
              "name": "34271",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34271"
            },
            {
              "name": "JVNDB-2009-000015",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000015.html"
            },
            {
              "name": "ADV-2009-0737",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0737"
            },
            {
              "name": "52802",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/52802"
            },
            {
              "name": "JVN#23558374",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN23558374/index.html"
            },
            {
              "name": "cgicafe-unspecified-xss(49264)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49264"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-0971",
    "datePublished": "2009-03-19T10:00:00",
    "dateReserved": "2009-03-18T00:00:00",
    "dateUpdated": "2024-08-07T04:57:17.189Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5809 (GCVE-0-2008-5809)

Vulnerability from nvd – Published: 2009-01-02 18:00 – Updated: 2024-08-07 11:04
VLAI?
Summary
futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-0… third-party-advisoryx_refsource_JVNDB
http://www.securityfocus.com/bid/32794 vdb-entryx_refsource_BID
http://www.futomi.com/library/info/2008/20081212.html x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN07468800/index.html third-party-advisoryx_refsource_JVN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:04:44.629Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2008-000083",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000083.html"
          },
          {
            "name": "32794",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32794"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.futomi.com/library/info/2008/20081212.html"
          },
          {
            "name": "JVN#07468800",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN07468800/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "JVNDB-2008-000083",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000083.html"
        },
        {
          "name": "32794",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32794"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.futomi.com/library/info/2008/20081212.html"
        },
        {
          "name": "JVN#07468800",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN07468800/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5809",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2008-000083",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000083.html"
            },
            {
              "name": "32794",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32794"
            },
            {
              "name": "http://www.futomi.com/library/info/2008/20081212.html",
              "refsource": "CONFIRM",
              "url": "http://www.futomi.com/library/info/2008/20081212.html"
            },
            {
              "name": "JVN#07468800",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN07468800/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5809",
    "datePublished": "2009-01-02T18:00:00",
    "dateReserved": "2009-01-02T00:00:00",
    "dateUpdated": "2024-08-07T11:04:44.629Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}