Search criteria
9 vulnerabilities found for access_analyzer_cgi by futomi
FKIE_CVE-2010-2366
Vulnerability from fkie_nvd - Published: 2010-09-13 21:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:*:*:pro:*:*:*:*:*",
"matchCriteriaId": "AE498989-6141-42B7-B9CB-89BF150ADB49",
"versionEndIncluding": "4.0.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:*:*:std:*:*:*:*:*",
"matchCriteriaId": "6AE14AF3-0E9B-4B4F-B87E-E810732266C7",
"versionEndIncluding": "4.0.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.0:*:pro:*:*:*:*:*",
"matchCriteriaId": "4DACE21F-6BD1-4B6A-B981-962EDEF18960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.0:*:std:*:*:*:*:*",
"matchCriteriaId": "77EC711D-E051-46BA-A4C6-867F1E54AF18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.1:*:pro:*:*:*:*:*",
"matchCriteriaId": "BC69DFE1-8470-49F9-A9A2-5DAA078D6FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.1:*:std:*:*:*:*:*",
"matchCriteriaId": "20ABFF4F-26C3-461D-9F38-6B8DE57B2782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.2:*:pro:*:*:*:*:*",
"matchCriteriaId": "00C4AF36-6CC0-4ED4-ADE2-DF512D08BF46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.2:*:std:*:*:*:*:*",
"matchCriteriaId": "FA7F7688-CD90-46B7-9AB2-D52A57C5BA81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.3:*:pro:*:*:*:*:*",
"matchCriteriaId": "B5327842-F28A-498B-BF64-79834317A10A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.3:*:std:*:*:*:*:*",
"matchCriteriaId": "0490EFA6-AEAB-4F11-B679-B9DC1245EFF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.4:*:pro:*:*:*:*:*",
"matchCriteriaId": "867F9024-F6CB-403D-85E4-6971E80BF39F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.4:*:std:*:*:*:*:*",
"matchCriteriaId": "6974958E-E0C9-4AB5-AE67-B8A2483772A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.5:*:pro:*:*:*:*:*",
"matchCriteriaId": "DC4D1007-5F20-4FA2-ACF1-CA042EAA2381",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.5:*:std:*:*:*:*:*",
"matchCriteriaId": "5A264EF6-755C-41F7-B935-E99CC96FF5F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.6:*:pro:*:*:*:*:*",
"matchCriteriaId": "A476143A-F9D9-4859-84D2-09A55C8950F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.6:*:std:*:*:*:*:*",
"matchCriteriaId": "99904C92-2329-491C-BA92-6BFDB8C9799D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.7:*:pro:*:*:*:*:*",
"matchCriteriaId": "8F33DA4C-C29B-4754-9109-87EBF0385AF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.7:*:std:*:*:*:*:*",
"matchCriteriaId": "E2594263-4BEC-488D-B116-15A4724AE007",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.0:*:pro:*:*:*:*:*",
"matchCriteriaId": "A7118E38-478B-4372-B99C-54F970C01417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.0:*:std:*:*:*:*:*",
"matchCriteriaId": "B2375FDF-B383-44BC-A2DF-F71416790EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.1:*:pro:*:*:*:*:*",
"matchCriteriaId": "A949929A-048A-43C2-9C97-F25DD8EEA20B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.1:*:std:*:*:*:*:*",
"matchCriteriaId": "629AAD4C-BB24-4F13-8EAD-6081964470F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.2:*:pro:*:*:*:*:*",
"matchCriteriaId": "B3401E94-03C9-448D-8035-A23B7FFC2B36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.2:*:std:*:*:*:*:*",
"matchCriteriaId": "A70FB601-1673-447E-8FF0-4B6EAB44C602",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.3:*:pro:*:*:*:*:*",
"matchCriteriaId": "3B7662E9-9A3D-4665-A521-1840413626F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.3:*:std:*:*:*:*:*",
"matchCriteriaId": "74956E00-B195-488B-8CDF-7497D238629A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.4:*:pro:*:*:*:*:*",
"matchCriteriaId": "ECCED7DD-36CA-4E34-9A4C-52588BC1A159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.4:*:std:*:*:*:*:*",
"matchCriteriaId": "5DAB8541-7F13-4D7F-9313-B2242BA8EEF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.0:*:pro:*:*:*:*:*",
"matchCriteriaId": "6AC99C14-1D90-454F-AC0E-4AED96655C10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.0:*:std:*:*:*:*:*",
"matchCriteriaId": "9108EF94-DDBB-4F07-B83C-9CAFD7821BD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.1:*:pro:*:*:*:*:*",
"matchCriteriaId": "AFC88E31-EEC2-40A7-88CB-76E6F492A0D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.1:*:std:*:*:*:*:*",
"matchCriteriaId": "F566B688-0734-4C28-9BF1-CAD72C910568",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.2:*:pro:*:*:*:*:*",
"matchCriteriaId": "AA918131-934C-4817-8287-EF81BECAF53B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.2:*:std:*:*:*:*:*",
"matchCriteriaId": "8AD08FFB-D51A-4A93-A0FC-14F2F8AE80B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.3:*:pro:*:*:*:*:*",
"matchCriteriaId": "FA031486-A7F2-4A3F-A798-E391C069AB02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.3:*:std:*:*:*:*:*",
"matchCriteriaId": "D4BF8DD9-C511-46B2-AA71-83E0D214591C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.4:*:pro:*:*:*:*:*",
"matchCriteriaId": "E85F427A-F93F-434F-A558-92081C074450",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.4:*:std:*:*:*:*:*",
"matchCriteriaId": "845055EE-C586-4238-A6D9-9A72F4F302B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.5:*:pro:*:*:*:*:*",
"matchCriteriaId": "9193D6DC-58C2-4EE0-97D9-00C6313084A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.5:*:std:*:*:*:*:*",
"matchCriteriaId": "E522C8B4-EF1C-44BF-B7F3-27E36AE975A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.6:*:pro:*:*:*:*:*",
"matchCriteriaId": "F6359E78-DB9D-4C3D-92E4-B58BC64C16D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.6:*:std:*:*:*:*:*",
"matchCriteriaId": "567641E9-8618-48B8-83CD-25AF4C7A27D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.7:*:pro:*:*:*:*:*",
"matchCriteriaId": "91E96CE9-5CAA-45F0-A8E9-41AA29EBAA10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.7:*:std:*:*:*:*:*",
"matchCriteriaId": "04260F18-1816-4347-83E0-6CE9C736841F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.8:*:pro:*:*:*:*:*",
"matchCriteriaId": "D11D9AC4-D506-423F-9F3A-E6C8955A2A43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.8:*:std:*:*:*:*:*",
"matchCriteriaId": "002162F2-C5AD-48AE-96D9-1A4D95E2F763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.8.1:*:pro:*:*:*:*:*",
"matchCriteriaId": "3122DDE1-FA0A-438C-A504-1613AB53431A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.8.1:*:std:*:*:*:*:*",
"matchCriteriaId": "56952B57-9376-4016-BC01-23DA0383172E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.0.0:*:pro:*:*:*:*:*",
"matchCriteriaId": "D469C8D7-D454-4379-83FD-9E94443EEFA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.0.0:*:std:*:*:*:*:*",
"matchCriteriaId": "F403BCDE-3C50-4871-BF0E-AD5F78531D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.0.1:*:pro:*:*:*:*:*",
"matchCriteriaId": "EC17D897-7035-45A1-A84D-D27F880720B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.0.1:*:std:*:*:*:*:*",
"matchCriteriaId": "3FFE7790-6558-42C9-8966-BDF5D11C172D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
},
{
"lang": "es",
"value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados en futomi CGI Cafe Access Analyzer CGI en sus versiones Professional y Standard v4.0.2, y versiones anteriores, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados."
}
],
"id": "CVE-2010-2366",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2010-09-13T21:00:02.667",
"references": [
{
"source": "cve@mitre.org",
"url": "http://jvn.jp/en/jp/JVN35605523/index.html"
},
{
"source": "cve@mitre.org",
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.futomi.com/library/info/2010/20100910.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/43142"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN35605523/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.futomi.com/library/info/2010/20100910.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/43142"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-0971
Vulnerability from fkie_nvd - Published: 2009-03-19 10:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in futomi's CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| futomi | access_analyzer_cgi | * | |
| futomi | access_analyzer_cgi | 1.1 | |
| futomi | access_analyzer_cgi | 1.2 | |
| futomi | access_analyzer_cgi | 1.3 | |
| futomi | access_analyzer_cgi | 1.4 | |
| futomi | access_analyzer_cgi | 2.0 | |
| futomi | access_analyzer_cgi | 2.1 | |
| futomi | access_analyzer_cgi | 2.2 | |
| futomi | access_analyzer_cgi | 2.3 | |
| futomi | access_analyzer_cgi | 2.4 | |
| futomi | access_analyzer_cgi | 3.0 | |
| futomi | access_analyzer_cgi | 3.1 | |
| futomi | access_analyzer_cgi | 3.2 | |
| futomi | access_analyzer_cgi | 3.3 | |
| futomi | access_analyzer_cgi | 3.4 | |
| futomi | access_analyzer_cgi | 3.5 | |
| futomi | access_analyzer_cgi | 3.6 | |
| futomi | access_analyzer_cgi | 3.7 | |
| futomi | access_analyzer_cgi | 3.8 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:*:*:std:*:*:*:*:*",
"matchCriteriaId": "F6175713-CFAA-415D-87D8-F54EB2FC91AF",
"versionEndIncluding": "3.8.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.1:*:std:*:*:*:*:*",
"matchCriteriaId": "20ABFF4F-26C3-461D-9F38-6B8DE57B2782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.2:*:std:*:*:*:*:*",
"matchCriteriaId": "FA7F7688-CD90-46B7-9AB2-D52A57C5BA81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.3:*:std:*:*:*:*:*",
"matchCriteriaId": "0490EFA6-AEAB-4F11-B679-B9DC1245EFF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.4:*:std:*:*:*:*:*",
"matchCriteriaId": "6974958E-E0C9-4AB5-AE67-B8A2483772A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.0:*:std:*:*:*:*:*",
"matchCriteriaId": "B2375FDF-B383-44BC-A2DF-F71416790EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.1:*:std:*:*:*:*:*",
"matchCriteriaId": "629AAD4C-BB24-4F13-8EAD-6081964470F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.2:*:std:*:*:*:*:*",
"matchCriteriaId": "A70FB601-1673-447E-8FF0-4B6EAB44C602",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.3:*:std:*:*:*:*:*",
"matchCriteriaId": "74956E00-B195-488B-8CDF-7497D238629A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.4:*:std:*:*:*:*:*",
"matchCriteriaId": "5DAB8541-7F13-4D7F-9313-B2242BA8EEF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.0:*:std:*:*:*:*:*",
"matchCriteriaId": "9108EF94-DDBB-4F07-B83C-9CAFD7821BD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.1:*:std:*:*:*:*:*",
"matchCriteriaId": "F566B688-0734-4C28-9BF1-CAD72C910568",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.2:*:std:*:*:*:*:*",
"matchCriteriaId": "8AD08FFB-D51A-4A93-A0FC-14F2F8AE80B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.3:*:std:*:*:*:*:*",
"matchCriteriaId": "D4BF8DD9-C511-46B2-AA71-83E0D214591C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.4:*:std:*:*:*:*:*",
"matchCriteriaId": "845055EE-C586-4238-A6D9-9A72F4F302B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.5:*:std:*:*:*:*:*",
"matchCriteriaId": "E522C8B4-EF1C-44BF-B7F3-27E36AE975A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.6:*:std:*:*:*:*:*",
"matchCriteriaId": "567641E9-8618-48B8-83CD-25AF4C7A27D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.7:*:std:*:*:*:*:*",
"matchCriteriaId": "04260F18-1816-4347-83E0-6CE9C736841F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.8:*:std:*:*:*:*:*",
"matchCriteriaId": "002162F2-C5AD-48AE-96D9-1A4D95E2F763",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in futomi\u0027s CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en futomi\u0027s CGI Cafe Access Analyzer CGI Standard Version v3.8.1, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores desconocidos."
}
],
"id": "CVE-2009-0971",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2009-03-19T10:30:00.610",
"references": [
{
"source": "cve@mitre.org",
"url": "http://jvn.jp/en/jp/JVN23558374/index.html"
},
{
"source": "cve@mitre.org",
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000015.html"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/52802"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34271"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.futomi.com/library/info/2009/20090316.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/34123"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/0737"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49264"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN23558374/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000015.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/52802"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34271"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.futomi.com/library/info/2009/20090316.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/34123"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/0737"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49264"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-5809
Vulnerability from fkie_nvd - Published: 2009-01-02 18:11 - Updated: 2025-04-09 00:30
Severity ?
Summary
futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:*:*:std:*:*:*:*:*",
"matchCriteriaId": "433A48C4-668C-4180-9F15-AF4EE2C177FD",
"versionEndIncluding": "4.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:_nil_:beta1:pro:*:*:*:*:*",
"matchCriteriaId": "96C6AB92-C9B1-427C-BF22-C6732756A915",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:_nil_:beta2:pro:*:*:*:*:*",
"matchCriteriaId": "CDA70C01-8CEE-40E7-9878-D74E34CE8E5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.0:*:pro:*:*:*:*:*",
"matchCriteriaId": "4DACE21F-6BD1-4B6A-B981-962EDEF18960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.1:*:pro:*:*:*:*:*",
"matchCriteriaId": "BC69DFE1-8470-49F9-A9A2-5DAA078D6FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.1:*:std:*:*:*:*:*",
"matchCriteriaId": "20ABFF4F-26C3-461D-9F38-6B8DE57B2782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.2:*:pro:*:*:*:*:*",
"matchCriteriaId": "00C4AF36-6CC0-4ED4-ADE2-DF512D08BF46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.2:*:std:*:*:*:*:*",
"matchCriteriaId": "FA7F7688-CD90-46B7-9AB2-D52A57C5BA81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.3:*:pro:*:*:*:*:*",
"matchCriteriaId": "B5327842-F28A-498B-BF64-79834317A10A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.3:*:std:*:*:*:*:*",
"matchCriteriaId": "0490EFA6-AEAB-4F11-B679-B9DC1245EFF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.4:*:pro:*:*:*:*:*",
"matchCriteriaId": "867F9024-F6CB-403D-85E4-6971E80BF39F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.4:*:std:*:*:*:*:*",
"matchCriteriaId": "6974958E-E0C9-4AB5-AE67-B8A2483772A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.5:*:pro:*:*:*:*:*",
"matchCriteriaId": "DC4D1007-5F20-4FA2-ACF1-CA042EAA2381",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.6:*:pro:*:*:*:*:*",
"matchCriteriaId": "A476143A-F9D9-4859-84D2-09A55C8950F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:1.7:*:pro:*:*:*:*:*",
"matchCriteriaId": "8F33DA4C-C29B-4754-9109-87EBF0385AF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.0:*:pro:*:*:*:*:*",
"matchCriteriaId": "A7118E38-478B-4372-B99C-54F970C01417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.0:*:std:*:*:*:*:*",
"matchCriteriaId": "B2375FDF-B383-44BC-A2DF-F71416790EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.1:*:pro:*:*:*:*:*",
"matchCriteriaId": "A949929A-048A-43C2-9C97-F25DD8EEA20B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.1:*:std:*:*:*:*:*",
"matchCriteriaId": "629AAD4C-BB24-4F13-8EAD-6081964470F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.2:*:pro:*:*:*:*:*",
"matchCriteriaId": "B3401E94-03C9-448D-8035-A23B7FFC2B36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.2:*:std:*:*:*:*:*",
"matchCriteriaId": "A70FB601-1673-447E-8FF0-4B6EAB44C602",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.3:*:pro:*:*:*:*:*",
"matchCriteriaId": "3B7662E9-9A3D-4665-A521-1840413626F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.3:*:std:*:*:*:*:*",
"matchCriteriaId": "74956E00-B195-488B-8CDF-7497D238629A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.4:*:pro:*:*:*:*:*",
"matchCriteriaId": "ECCED7DD-36CA-4E34-9A4C-52588BC1A159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:2.4:*:std:*:*:*:*:*",
"matchCriteriaId": "5DAB8541-7F13-4D7F-9313-B2242BA8EEF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.0:*:pro:*:*:*:*:*",
"matchCriteriaId": "6AC99C14-1D90-454F-AC0E-4AED96655C10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.0:*:std:*:*:*:*:*",
"matchCriteriaId": "9108EF94-DDBB-4F07-B83C-9CAFD7821BD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.1:*:pro:*:*:*:*:*",
"matchCriteriaId": "AFC88E31-EEC2-40A7-88CB-76E6F492A0D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.1:*:std:*:*:*:*:*",
"matchCriteriaId": "F566B688-0734-4C28-9BF1-CAD72C910568",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.2:*:pro:*:*:*:*:*",
"matchCriteriaId": "AA918131-934C-4817-8287-EF81BECAF53B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.2:*:std:*:*:*:*:*",
"matchCriteriaId": "8AD08FFB-D51A-4A93-A0FC-14F2F8AE80B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.3:*:pro:*:*:*:*:*",
"matchCriteriaId": "FA031486-A7F2-4A3F-A798-E391C069AB02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.3:*:std:*:*:*:*:*",
"matchCriteriaId": "D4BF8DD9-C511-46B2-AA71-83E0D214591C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.4:*:pro:*:*:*:*:*",
"matchCriteriaId": "E85F427A-F93F-434F-A558-92081C074450",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.4:*:std:*:*:*:*:*",
"matchCriteriaId": "845055EE-C586-4238-A6D9-9A72F4F302B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.5:*:pro:*:*:*:*:*",
"matchCriteriaId": "9193D6DC-58C2-4EE0-97D9-00C6313084A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.5:*:std:*:*:*:*:*",
"matchCriteriaId": "E522C8B4-EF1C-44BF-B7F3-27E36AE975A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.6:*:std:*:*:*:*:*",
"matchCriteriaId": "567641E9-8618-48B8-83CD-25AF4C7A27D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.7:*:std:*:*:*:*:*",
"matchCriteriaId": "04260F18-1816-4347-83E0-6CE9C736841F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.8:*:std:*:*:*:*:*",
"matchCriteriaId": "002162F2-C5AD-48AE-96D9-1A4D95E2F763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:3.8.1:*:std:*:*:*:*:*",
"matchCriteriaId": "56952B57-9376-4016-BC01-23DA0383172E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.0:*:pro:*:*:*:*:*",
"matchCriteriaId": "CF1C66B0-1254-42AF-91FC-8AC9AC4ADD6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.0.0:*:std:*:*:*:*:*",
"matchCriteriaId": "F403BCDE-3C50-4871-BF0E-AD5F78531D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.1:*:pro:*:*:*:*:*",
"matchCriteriaId": "4281B455-28D4-4D49-A17C-2534E82A0B74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.2:*:pro:*:*:*:*:*",
"matchCriteriaId": "26E142EF-81D2-4477-AE06-0375BCF7CD8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.3:*:pro:*:*:*:*:*",
"matchCriteriaId": "0C767C19-1453-4945-AB7C-436C742D4422",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.4:*:pro:*:*:*:*:*",
"matchCriteriaId": "E4D39FCF-B280-49A3-9E5F-F149958A5092",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.5:*:pro:*:*:*:*:*",
"matchCriteriaId": "86227B63-A790-42B4-9152-F26D67961BA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.6:*:pro:*:*:*:*:*",
"matchCriteriaId": "65679525-6A75-467A-A099-74E125B09616",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.7:*:pro:*:*:*:*:*",
"matchCriteriaId": "122E6C60-AACA-4BD9-A1C1-B054456518FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.8:*:pro:*:*:*:*:*",
"matchCriteriaId": "D4C86C16-1221-4C23-B2AE-C8E0301E840E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.9:*:pro:*:*:*:*:*",
"matchCriteriaId": "407F0D69-34B2-458F-9B81-85D39B354E2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.10:*:pro:*:*:*:*:*",
"matchCriteriaId": "EBDEC8D6-7B21-42CF-BFF1-C9771445C470",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.10.1:*:pro:*:*:*:*:*",
"matchCriteriaId": "4C379B11-5340-4C44-8250-7C2193FA65B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.10.2:*:pro:*:*:*:*:*",
"matchCriteriaId": "66856EBA-7090-44C7-8BD5-DBF3B49400E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.10.3:*:pro:*:*:*:*:*",
"matchCriteriaId": "4953F16E-98B2-4E77-B342-34A12DEDC6AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.10.4:*:pro:*:*:*:*:*",
"matchCriteriaId": "0C3B196D-ACD1-49BB-B619-9EB010FB692F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.10.5:*:pro:*:*:*:*:*",
"matchCriteriaId": "35C6DB72-D288-4183-917D-B9A65342C56D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.11.0:*:pro:*:*:*:*:*",
"matchCriteriaId": "9A6C11FD-0501-47AB-82B5-D2D81312C91B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.11.1:*:pro:*:*:*:*:*",
"matchCriteriaId": "D6A9827B-A26E-42D9-AEF3-7A0D30DBA1AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.11.2:*:pro:*:*:*:*:*",
"matchCriteriaId": "5F8F4CDA-9ECB-461D-AED1-E425B96ECD67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:futomi:access_analyzer_cgi:4.11.3:*:pro:*:*:*:*:*",
"matchCriteriaId": "F9BD338F-F5A6-4F23-9BD1-5CB44A59B8B2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id."
},
{
"lang": "es",
"value": "futomi CGI Cafe Access Analyzer CGI Standard v4.0.1 y anteriores y Analyzer CGI Professional v4.11.3 y anteriores usan una \"id\" predecible, lo que hace sencillo a atacantes remotos, secuestrar sesiones, y obtener informaci\u00f3n sensible acerca de los resultados de los an\u00e1lisis, mediante una \"id\" modificada."
}
],
"id": "CVE-2008-5809",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-01-02T18:11:09.530",
"references": [
{
"source": "cve@mitre.org",
"url": "http://jvn.jp/en/jp/JVN07468800/index.html"
},
{
"source": "cve@mitre.org",
"url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000083.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.futomi.com/library/info/2008/20081212.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/32794"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN07468800/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000083.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.futomi.com/library/info/2008/20081212.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/32794"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2010-2366 (GCVE-0-2010-2366)
Vulnerability from cvelistv5 – Published: 2010-09-13 20:00 – Updated: 2024-09-16 18:48
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:32:16.385Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#35605523",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN35605523/index.html"
},
{
"name": "43142",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/43142"
},
{
"name": "JVNDB-2010-000035",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.futomi.com/library/info/2010/20100910.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-09-13T20:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "JVN#35605523",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN35605523/index.html"
},
{
"name": "43142",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/43142"
},
{
"name": "JVNDB-2010-000035",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.futomi.com/library/info/2010/20100910.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-2366",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#35605523",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN35605523/index.html"
},
{
"name": "43142",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43142"
},
{
"name": "JVNDB-2010-000035",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html"
},
{
"name": "http://www.futomi.com/library/info/2010/20100910.html",
"refsource": "CONFIRM",
"url": "http://www.futomi.com/library/info/2010/20100910.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-2366",
"datePublished": "2010-09-13T20:00:00Z",
"dateReserved": "2010-06-21T00:00:00Z",
"dateUpdated": "2024-09-16T18:48:57.905Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-0971 (GCVE-0-2009-0971)
Vulnerability from cvelistv5 – Published: 2009-03-19 10:00 – Updated: 2024-08-07 04:57
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in futomi's CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:57:17.189Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.futomi.com/library/info/2009/20090316.html"
},
{
"name": "34123",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34123"
},
{
"name": "34271",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34271"
},
{
"name": "JVNDB-2009-000015",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000015.html"
},
{
"name": "ADV-2009-0737",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0737"
},
{
"name": "52802",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/52802"
},
{
"name": "JVN#23558374",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN23558374/index.html"
},
{
"name": "cgicafe-unspecified-xss(49264)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49264"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-03-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in futomi\u0027s CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.futomi.com/library/info/2009/20090316.html"
},
{
"name": "34123",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34123"
},
{
"name": "34271",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34271"
},
{
"name": "JVNDB-2009-000015",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000015.html"
},
{
"name": "ADV-2009-0737",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0737"
},
{
"name": "52802",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/52802"
},
{
"name": "JVN#23558374",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN23558374/index.html"
},
{
"name": "cgicafe-unspecified-xss(49264)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49264"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0971",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in futomi\u0027s CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.futomi.com/library/info/2009/20090316.html",
"refsource": "CONFIRM",
"url": "http://www.futomi.com/library/info/2009/20090316.html"
},
{
"name": "34123",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34123"
},
{
"name": "34271",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34271"
},
{
"name": "JVNDB-2009-000015",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000015.html"
},
{
"name": "ADV-2009-0737",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0737"
},
{
"name": "52802",
"refsource": "OSVDB",
"url": "http://osvdb.org/52802"
},
{
"name": "JVN#23558374",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN23558374/index.html"
},
{
"name": "cgicafe-unspecified-xss(49264)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49264"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-0971",
"datePublished": "2009-03-19T10:00:00",
"dateReserved": "2009-03-18T00:00:00",
"dateUpdated": "2024-08-07T04:57:17.189Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-5809 (GCVE-0-2008-5809)
Vulnerability from cvelistv5 – Published: 2009-01-02 18:00 – Updated: 2024-08-07 11:04
VLAI?
Summary
futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T11:04:44.629Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2008-000083",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000083.html"
},
{
"name": "32794",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/32794"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.futomi.com/library/info/2008/20081212.html"
},
{
"name": "JVN#07468800",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN07468800/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-12-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-02-26T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "JVNDB-2008-000083",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000083.html"
},
{
"name": "32794",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/32794"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.futomi.com/library/info/2008/20081212.html"
},
{
"name": "JVN#07468800",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN07468800/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-5809",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2008-000083",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000083.html"
},
{
"name": "32794",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32794"
},
{
"name": "http://www.futomi.com/library/info/2008/20081212.html",
"refsource": "CONFIRM",
"url": "http://www.futomi.com/library/info/2008/20081212.html"
},
{
"name": "JVN#07468800",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN07468800/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-5809",
"datePublished": "2009-01-02T18:00:00",
"dateReserved": "2009-01-02T00:00:00",
"dateUpdated": "2024-08-07T11:04:44.629Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-2366 (GCVE-0-2010-2366)
Vulnerability from nvd – Published: 2010-09-13 20:00 – Updated: 2024-09-16 18:48
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:32:16.385Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#35605523",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN35605523/index.html"
},
{
"name": "43142",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/43142"
},
{
"name": "JVNDB-2010-000035",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.futomi.com/library/info/2010/20100910.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-09-13T20:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "JVN#35605523",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN35605523/index.html"
},
{
"name": "43142",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/43142"
},
{
"name": "JVNDB-2010-000035",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.futomi.com/library/info/2010/20100910.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-2366",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#35605523",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN35605523/index.html"
},
{
"name": "43142",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43142"
},
{
"name": "JVNDB-2010-000035",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000035.html"
},
{
"name": "http://www.futomi.com/library/info/2010/20100910.html",
"refsource": "CONFIRM",
"url": "http://www.futomi.com/library/info/2010/20100910.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-2366",
"datePublished": "2010-09-13T20:00:00Z",
"dateReserved": "2010-06-21T00:00:00Z",
"dateUpdated": "2024-09-16T18:48:57.905Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-0971 (GCVE-0-2009-0971)
Vulnerability from nvd – Published: 2009-03-19 10:00 – Updated: 2024-08-07 04:57
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in futomi's CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:57:17.189Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.futomi.com/library/info/2009/20090316.html"
},
{
"name": "34123",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34123"
},
{
"name": "34271",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34271"
},
{
"name": "JVNDB-2009-000015",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000015.html"
},
{
"name": "ADV-2009-0737",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0737"
},
{
"name": "52802",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/52802"
},
{
"name": "JVN#23558374",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN23558374/index.html"
},
{
"name": "cgicafe-unspecified-xss(49264)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49264"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-03-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in futomi\u0027s CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.futomi.com/library/info/2009/20090316.html"
},
{
"name": "34123",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34123"
},
{
"name": "34271",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34271"
},
{
"name": "JVNDB-2009-000015",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000015.html"
},
{
"name": "ADV-2009-0737",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0737"
},
{
"name": "52802",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/52802"
},
{
"name": "JVN#23558374",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN23558374/index.html"
},
{
"name": "cgicafe-unspecified-xss(49264)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49264"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0971",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in futomi\u0027s CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.futomi.com/library/info/2009/20090316.html",
"refsource": "CONFIRM",
"url": "http://www.futomi.com/library/info/2009/20090316.html"
},
{
"name": "34123",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34123"
},
{
"name": "34271",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34271"
},
{
"name": "JVNDB-2009-000015",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000015.html"
},
{
"name": "ADV-2009-0737",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0737"
},
{
"name": "52802",
"refsource": "OSVDB",
"url": "http://osvdb.org/52802"
},
{
"name": "JVN#23558374",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN23558374/index.html"
},
{
"name": "cgicafe-unspecified-xss(49264)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49264"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-0971",
"datePublished": "2009-03-19T10:00:00",
"dateReserved": "2009-03-18T00:00:00",
"dateUpdated": "2024-08-07T04:57:17.189Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-5809 (GCVE-0-2008-5809)
Vulnerability from nvd – Published: 2009-01-02 18:00 – Updated: 2024-08-07 11:04
VLAI?
Summary
futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T11:04:44.629Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2008-000083",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000083.html"
},
{
"name": "32794",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/32794"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.futomi.com/library/info/2008/20081212.html"
},
{
"name": "JVN#07468800",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN07468800/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-12-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-02-26T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "JVNDB-2008-000083",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000083.html"
},
{
"name": "32794",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/32794"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.futomi.com/library/info/2008/20081212.html"
},
{
"name": "JVN#07468800",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN07468800/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-5809",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "futomi CGI Cafe Access Analyzer CGI Standard 4.0.1 and earlier and Access Analyzer CGI Professional 4.11.3 and earlier use a predictable session id, which makes it easier for remote attackers to hijack sessions, and obtain sensitive information about analysis results, via a modified id."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2008-000083",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000083.html"
},
{
"name": "32794",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32794"
},
{
"name": "http://www.futomi.com/library/info/2008/20081212.html",
"refsource": "CONFIRM",
"url": "http://www.futomi.com/library/info/2008/20081212.html"
},
{
"name": "JVN#07468800",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN07468800/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-5809",
"datePublished": "2009-01-02T18:00:00",
"dateReserved": "2009-01-02T00:00:00",
"dateUpdated": "2024-08-07T11:04:44.629Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}