var-200703-0432
Vulnerability from variot

SQL injection vulnerability in Hitachi Collaboration - Online Community Management 01-00 through 01-30, as used in Groupmax Collaboration Portal, Groupmax Collaboration Web Client, uCosminexus Collaboration Portal, Cosminexus Collaboration Portal, and uCosminexus Content Manager, allows remote attackers to execute arbitrary SQL commands via unspecified vectors. Multiple Hitachi products are prone to an SQL-injection vulnerability because the applications fail to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Please see the vendor's advisory for a list of affected products and versions.

SOLUTION: Please see the vendor's advisory for fix information.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: Hitachi: http://www.hitachi-support.com/security_e/vuls_e/HS07-008_e/index-e.html

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.

Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200703-0432",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cosminexus collaboration portal",
        "scope": null,
        "trust": 1.4,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "groupmax collaboration portal",
        "scope": null,
        "trust": 1.4,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "groupmax collaboration web client",
        "scope": null,
        "trust": 1.4,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "ucosminexus collaboration portal",
        "scope": null,
        "trust": 1.4,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "ucosminexus content manager",
        "scope": null,
        "trust": 1.4,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "cosminexus collaboration portal",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "*"
      },
      {
        "model": "groupmax collaboration web client",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "*"
      },
      {
        "model": "ucosminexus collaboration portal",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "*"
      },
      {
        "model": "groupmax collaboration portal",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "*"
      },
      {
        "model": "ucosminexus content manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "*"
      },
      {
        "model": "ucosminexus content manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "1-00"
      },
      {
        "model": "ucosminexus collaboration portal forum/file share",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "6-30"
      },
      {
        "model": "ucosminexus collaboration portal forum/file share 6-20-/d",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "ucosminexus collaboration portal forum/file share",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "6-20"
      },
      {
        "model": "ucosminexus collaboration portal 6-30-/c",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "ucosminexus collaboration portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "6-30"
      },
      {
        "model": "ucosminexus collaboration portal 6-20-/e",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "ucosminexus collaboration portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "6-20"
      },
      {
        "model": "groupmax collaboration web client forum/file share 7-30-/b",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "groupmax collaboration web client forum/file share",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "7-30"
      },
      {
        "model": "groupmax collaboration web client forum/file share 7-20-/d",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "groupmax collaboration web client forum/file share",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "7-20"
      },
      {
        "model": "groupmax collaboration web client forum/file share 7-10-/c",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "groupmax collaboration web client forum/file share",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "7-10"
      },
      {
        "model": "groupmax collaboration web client forum/file share 7-00-/a",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "groupmax collaboration web client forum/file share",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "7-00"
      },
      {
        "model": "groupmax collaboration web client mail/schedule 7-30-/c",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "groupmax collaboration web client mail/schedule",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "-7-30"
      },
      {
        "model": "groupmax collaboration web client mail/schedule 7-20-/c",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "groupmax collaboration web client mail/schedule",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "-7-20"
      },
      {
        "model": "groupmax collaboration portal 7-30-/c",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "groupmax collaboration portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "7-30"
      },
      {
        "model": "groupmax collaboration portal 7-20-/e",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "groupmax collaboration portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "7-20"
      },
      {
        "model": "groupmax collaboration portal 7-10-/d",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "groupmax collaboration portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "7-10"
      },
      {
        "model": "groupmax collaboration portal 7-00-/a",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "groupmax collaboration portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "7-00"
      },
      {
        "model": "cosminexus collaboration portal forum/file share 6-10-/c",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "cosminexus collaboration portal forum/file share",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "6-10"
      },
      {
        "model": "cosminexus collaboration portal forum/file share 6-00-/a",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "cosminexus collaboration portal forum/file share",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "6-00"
      },
      {
        "model": "cosminexus collaboration portal 6-10-/d",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "cosminexus collaboration portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "6-10"
      },
      {
        "model": "cosminexus collaboration portal 6-00-/a",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "cosminexus collaboration portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "6-00"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "23208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003613"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-701"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1786"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:hitachi:cosminexus_collaboration_portal",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:hitachi:groupmax_collaboration_portal",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:hitachi:groupmax_collaboration_web_client",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:hitachi:ucosminexus_collaboration_portal",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:hitachi:ucosminexus_content_manager",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003613"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "23208"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-701"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2007-1786",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2007-1786",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2007-1786",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2007-1786",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200703-701",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003613"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-701"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1786"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SQL injection vulnerability in Hitachi Collaboration - Online Community Management 01-00 through 01-30, as used in Groupmax Collaboration Portal, Groupmax Collaboration Web Client, uCosminexus Collaboration Portal, Cosminexus Collaboration Portal, and uCosminexus Content Manager, allows remote attackers to execute arbitrary SQL commands via unspecified vectors. Multiple Hitachi products are prone to an SQL-injection vulnerability because the applications fail to properly sanitize user-supplied input before using it in an SQL query. \nA successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.  This can be exploited to manipulate SQL queries by\ninjecting arbitrary SQL code. \n\nPlease see the vendor\u0027s advisory for a list of affected products and\nversions. \n\nSOLUTION:\nPlease see the vendor\u0027s advisory for fix information. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nHitachi:\nhttp://www.hitachi-support.com/security_e/vuls_e/HS07-008_e/index-e.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-1786"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003613"
      },
      {
        "db": "BID",
        "id": "23208"
      },
      {
        "db": "PACKETSTORM",
        "id": "55483"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-1786",
        "trust": 2.4
      },
      {
        "db": "HITACHI",
        "id": "HS07-008",
        "trust": 2.0
      },
      {
        "db": "BID",
        "id": "23208",
        "trust": 1.9
      },
      {
        "db": "SECUNIA",
        "id": "24693",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-1168",
        "trust": 1.6
      },
      {
        "db": "OSVDB",
        "id": "34544",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003613",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "33348",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-701",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "55483",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "23208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003613"
      },
      {
        "db": "PACKETSTORM",
        "id": "55483"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-701"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1786"
      }
    ]
  },
  "id": "VAR-200703-0432",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.19325397333333336
  },
  "last_update_date": "2024-11-23T22:15:02.938000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HS07-008",
        "trust": 0.8,
        "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS07-008/index.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003613"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-1786"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "http://www.hitachi-support.com/security_e/vuls_e/hs07-008_e/index-e.html"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/24693"
      },
      {
        "trust": 1.6,
        "url": "http://osvdb.org/34544"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/23208"
      },
      {
        "trust": 1.0,
        "url": "http://www.vupen.com/english/advisories/2007/1168"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33348"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1786"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1786"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2007/1168"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/33348"
      },
      {
        "trust": 0.3,
        "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/prod/cosminexus/sol/epf/port_view.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.hitachi.com/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/10832/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/disassembling_og_reversing/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_vacancies/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/10834/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/24693/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/10835/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/linux_security_specialist/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6161/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/10833/"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "23208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003613"
      },
      {
        "db": "PACKETSTORM",
        "id": "55483"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-701"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1786"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "23208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003613"
      },
      {
        "db": "PACKETSTORM",
        "id": "55483"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-701"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1786"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-03-30T00:00:00",
        "db": "BID",
        "id": "23208"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-003613"
      },
      {
        "date": "2007-04-02T02:42:23",
        "db": "PACKETSTORM",
        "id": "55483"
      },
      {
        "date": "2007-03-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200703-701"
      },
      {
        "date": "2007-03-31T10:19:00",
        "db": "NVD",
        "id": "CVE-2007-1786"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-03-30T16:43:00",
        "db": "BID",
        "id": "23208"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-003613"
      },
      {
        "date": "2007-04-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200703-701"
      },
      {
        "date": "2024-11-21T00:29:09.383000",
        "db": "NVD",
        "id": "CVE-2007-1786"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-701"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Groupmax Used for products such as  Hitachi Collaboration - Online Community Management In  SQL Injection vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003613"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "sql injection",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "55483"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-701"
      }
    ],
    "trust": 0.7
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.