fkie_cve-2007-5635
Vulnerability from fkie_nvd
Published
2007-10-23 17:46
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in Salford Software Support Incident Tracker (SiT!) before 3.30 have unknown impact and attack vectors.
Impacted products
Vendor Product Version
sitracker support_incident_tracker *
sitracker support_incident_tracker 1.8.00
sitracker support_incident_tracker 2.8.00
sitracker support_incident_tracker 3.00
sitracker support_incident_tracker 3.00
sitracker support_incident_tracker 3.00
sitracker support_incident_tracker 3.00
sitracker support_incident_tracker 3.01
sitracker support_incident_tracker 3.02
sitracker support_incident_tracker 3.03
sitracker support_incident_tracker 3.03a
sitracker support_incident_tracker 3.04a
sitracker support_incident_tracker 3.05
sitracker support_incident_tracker 3.06
sitracker support_incident_tracker 3.07
sitracker support_incident_tracker 3.07.1
sitracker support_incident_tracker 3.07.2
sitracker support_incident_tracker 3.07.3
sitracker support_incident_tracker 3.08
sitracker support_incident_tracker 3.08.1
sitracker support_incident_tracker 3.09
sitracker support_incident_tracker 3.10
sitracker support_incident_tracker 3.11
sitracker support_incident_tracker 3.12
sitracker support_incident_tracker 3.14
sitracker support_incident_tracker 3.15
sitracker support_incident_tracker 3.16
sitracker support_incident_tracker 3.17
sitracker support_incident_tracker 3.18
sitracker support_incident_tracker 3.19
sitracker support_incident_tracker 3.20
sitracker support_incident_tracker 3.21
sitracker support_incident_tracker 3.22
sitracker support_incident_tracker 3.22pl1
sitracker support_incident_tracker 3.23
sitracker support_incident_tracker 3.24
sitracker support_incident_tracker 3.24
sitracker support_incident_tracker 10.8.00
sitracker support_incident_tracker 11.8.00
sitracker support_incident_tracker 14.8.00
sitracker support_incident_tracker 16.8.00
sitracker support_incident_tracker 17.8.00
sitracker support_incident_tracker 18.8.00
sitracker support_incident_tracker 21.8.00



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82C7CE1C-D911-40A5-BE77-AE74A25D12B1",
              "versionEndIncluding": "3.24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:1.8.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D641D2-158D-4570-B2E4-FFCF63A942DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:2.8.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD0D1949-AB42-462D-A348-F9CDCDCFF9C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA68017-3E7C-4393-86F6-8E42EB0F3549",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.00:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F04128DD-1BBB-47B0-8CAC-8DBDFE647046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.00:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "6F228481-19D5-4E98-933F-5D1C5CC20008",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.00:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "7A085965-4106-40BB-9374-374986E88AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EA97C93-F0DA-43DA-8BA2-706A1E541D97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "194634B9-5EBF-4365-ADFB-BD56D6DBA827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "93CE290D-A031-40BB-AB85-9911C0F438FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.03a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E2CF1C2-DBCE-416A-9C0F-DC19BF7161F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.04a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E08CC85C-7D41-493D-BC81-A898EDE83B54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0AD14E-31D8-4DA2-94D2-D7C3BFCE3396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "2273ED90-763F-45BD-81B2-E20B5A011DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4807E76-3324-480C-BF17-85B5C94ED70B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.07.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D522A5DE-D7D2-4CD4-B7D6-6B755519E912",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.07.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF4AC591-4928-4421-A548-22D035787A33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.07.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "04AA4F97-FDA8-4CFA-BE92-C623806B4A71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C65EB3E-845C-4FD3-B6E9-0929171D57CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.08.1:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1015EED1-30C8-4347-84C6-A357163BBC86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "90C21F7A-2687-4D2B-A70E-3EAF0DE22195",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D19ED38-F333-4C38-B45B-FAD5F4EF9C9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9DD8CDB-FF21-4154-8A76-395933634634",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "148C8BE2-270B-4E51-916C-EAD40CE549AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3005328-AF78-44FD-B59D-AC953785025A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "47E1FB9B-E521-464E-8435-861035E6A5BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A258DCC8-E72E-44B9-BAD1-511B421BC82C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "797E3EB6-38BA-45CA-8593-4726D8CF608D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "45DD490B-6724-4B2C-BC96-93B82ECF3654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C78A070-939B-4B26-AE62-520DE4C59B61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "83B4876D-D439-48BE-88B1-CD2560FDF1AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C5F688E-5CF7-4D74-ACC6-A3310529FFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "26752759-E802-4CBC-9D73-2665A4AABF51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.22pl1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0A1A041-E0FC-41C2-A170-15A03C31FD5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2EECD19-D7EA-4C64-A722-F0C4285092BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.24:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "0ECEEB33-FE66-48FF-8945-ACC6A51E8FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:3.24:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E4A98A90-3328-4EC1-9B24-075BECB77E80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:10.8.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "38294648-4298-48EE-9331-50585A97C6E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:11.8.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4ED869A-4880-4D99-9138-429D07DF778C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:14.8.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E5A892B-8A11-4E5B-B5A2-837FC7295B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:16.8.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0DCD82-24F9-4212-8AD6-340726E26C24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:17.8.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB2AF8C-B1AC-4164-A389-EC8F1493FE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:18.8.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D4DABA-CDA4-4742-AD39-F48590D8A7C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sitracker:support_incident_tracker:21.8.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6771A58-D40C-456B-BF6A-282E8CF291FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Salford Software Support Incident Tracker (SiT!) before 3.30 have unknown impact and attack vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Salford Software Support Incident Tracker (SiT!) anterior a 3.30 tienen un impacto desconocido y vectores de ataque."
    }
  ],
  "id": "CVE-2007-5635",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-10-23T17:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27226"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=547027"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/26151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27226"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=547027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/26151"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…