var-200806-0101
Vulnerability from variot
Unspecified vulnerability in the Interstage Management Console, as used in Fujitsu Interstage Application Server 6.0 through 9.0.0A, Apworks Modelers-J 6.0 through 7.0, and Studio 8.0.1 and 9.0.0, allows remote attackers to read or delete arbitrary files via unspecified vectors. Very few technical details are currently available. We will update this BID as more information emerges.
Please see the vendor's advisory for a list of affected products and versions.
SOLUTION: Please see the vendor's advisory for workaround details.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: http://www.fujitsu.com/global/support/software/security/products-f/interstage-200805e.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200806-0101", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "interstage application server plus", "scope": "eq", "trust": 1.3, "vendor": "fujitsu", "version": "7.0.1" }, { "model": "interstage application server plus", "scope": "eq", "trust": 1.3, "vendor": "fujitsu", "version": "7.0" }, { "model": "interstage application server plus developer", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v7.0" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v7.0.1" }, { "model": "interstage application server standard j", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v9.0.0" }, { "model": "interstage application server standard j", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v9.0.0a" }, { "model": "interstage business application server enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v8.0.0" }, { "model": "interstage application server plus", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v7.0.1" }, { "model": "interstage apworks modelers j", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v6.0a" }, { "model": "interstage studio enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v9.0.0" }, { "model": "interstage application server standard j", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "8.0.0" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v6.0" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v7.0" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v9.0.0" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v7.0.0" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "6.0" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "7.0.1" }, { "model": "interstage application server plus", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v7.0.0" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "7.0" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v9.0.0a" }, { "model": "interstage application server plus", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v6.0" }, { "model": "interstage application server plus", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v7.0" }, { "model": "interstage application server standard j", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "9.0.0" }, { "model": "interstage apworks modelers j", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v6.0" }, { "model": "interstage apworks modelers j", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v7.0" }, { "model": "interstage application server standard j", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "8.0.2" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "8.0.0" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "8.0.1" }, { "model": "interstage studio standard j", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v9.0.0" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "9.0.0" }, { "model": "interstage studio enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "8.0.1" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "8.0.2" }, { "model": "interstage studio standard j", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "8.0.1" }, { "model": "interstage application server plus developer", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "v6.0" }, { "model": "interstage application framework suite", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage application server", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage apworks", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage business application server", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage job workload server", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage studio", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage web server", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "windows nt", "scope": null, "trust": 0.6, "vendor": "microsoft", "version": null }, { "model": "interstage studio standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.0" }, { "model": "interstage studio standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.1" }, { "model": "interstage studio enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.0" }, { "model": "interstage studio enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.1" }, { "model": "interstage business application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.0" }, { "model": "interstage apworks modelers-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0" }, { "model": "interstage apworks modelers-j edition 6.0a", "scope": null, "trust": 0.3, "vendor": "fujitsu", "version": null }, { "model": "interstage apworks modelers-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "6.0" }, { "model": "interstage application server standard-j edition a", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.0" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.0" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.3" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.2" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.1" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0" }, { "model": "interstage application server plus developer", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0" }, { "model": "interstage application server plus developer", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "6.0" }, { "model": "interstage application server enterprise edition a", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.3" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.2" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.1" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0.1" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0" }, { "model": "interstage application server enterprise edition 6.0a", "scope": null, "trust": 0.3, "vendor": "fujitsu", "version": null }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "6.0" } ], "sources": [ { "db": "BID", "id": "29624" }, { "db": "JVNDB", "id": "JVNDB-2008-001576" }, { "db": "CNNVD", "id": "CNNVD-200806-174" }, { "db": "NVD", "id": "CVE-2008-2674" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:fujitsu:interstage_application_framework_suite", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fujitsu:interstage_application_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fujitsu:interstage_apworks", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fujitsu:interstage_business_application_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fujitsu:interstage_job_workload_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fujitsu:interstage_studio", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fujitsu:interstage_web_server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001576" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Fujitsu", "sources": [ { "db": "BID", "id": "29624" }, { "db": "CNNVD", "id": "CNNVD-200806-174" } ], "trust": 0.9 }, "cve": "CVE-2008-2674", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2008-2674", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-2674", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2008-2674", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200806-174", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001576" }, { "db": "CNNVD", "id": "CNNVD-200806-174" }, { "db": "NVD", "id": "CVE-2008-2674" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in the Interstage Management Console, as used in Fujitsu Interstage Application Server 6.0 through 9.0.0A, Apworks Modelers-J 6.0 through 7.0, and Studio 8.0.1 and 9.0.0, allows remote attackers to read or delete arbitrary files via unspecified vectors. \nVery few technical details are currently available. We will update this BID as more information emerges. \n\nPlease see the vendor\u0027s advisory for a list of affected products and\nversions. \n\nSOLUTION:\nPlease see the vendor\u0027s advisory for workaround details. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.fujitsu.com/global/support/software/security/products-f/interstage-200805e.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-2674" }, { "db": "JVNDB", "id": "JVNDB-2008-001576" }, { "db": "BID", "id": "29624" }, { "db": "PACKETSTORM", "id": "67148" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-2674", "trust": 2.7 }, { "db": "SECUNIA", "id": "30589", "trust": 2.5 }, { "db": "BID", "id": "29624", "trust": 1.9 }, { "db": "JVNDB", "id": "JVNDB-2008-001576", "trust": 1.6 }, { "db": "SECTRACK", "id": "1020235", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2008-1771", "trust": 1.6 }, { "db": "BID", "id": "27966", "trust": 0.8 }, { "db": "XF", "id": "42949", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200806-174", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "67148", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "29624" }, { "db": "JVNDB", "id": "JVNDB-2008-001576" }, { "db": "PACKETSTORM", "id": "67148" }, { "db": "CNNVD", "id": "CNNVD-200806-174" }, { "db": "NVD", "id": "CVE-2008-2674" } ] }, "id": "VAR-200806-0101", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.16519225 }, "last_update_date": "2024-11-23T22:39:41.026000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "interstage-200805", "trust": 0.8, "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200805e.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001576" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2008-2674" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://secunia.com/advisories/30589" }, { "trust": 2.0, "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200805e.html" }, { "trust": 1.6, "url": "http://www.securitytracker.com/id?1020235" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/29624" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/1771/references" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42949" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2674" }, { "trust": 0.8, "url": "http://www.frsirt.com/english/advisories/2008/1771" }, { "trust": 0.8, "url": "http://jvndb.jvn.jp/ja/contents/2008/jvndb-2008-001576.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-2674" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/27966" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/42949" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/1771/references" }, { "trust": 0.3, "url": "http://www.fujitsu.com/" }, { "trust": 0.1, "url": "http://secunia.com/product/13692/" }, { "trust": 0.1, "url": "http://secunia.com/product/15986/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/13690/" }, { "trust": 0.1, "url": "http://secunia.com/product/13688/" }, { "trust": 0.1, "url": "http://secunia.com/product/13689/" }, { "trust": 0.1, "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/" }, { "trust": 0.1, "url": "http://secunia.com/product/13693/" }, { "trust": 0.1, "url": "http://secunia.com/product/13687/" }, { "trust": 0.1, "url": "http://secunia.com/product/15610/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_specialist/" }, { "trust": 0.1, "url": "http://corporate.secunia.com/about_secunia/64/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/30589/" }, { "trust": 0.1, "url": "http://secunia.com/product/13685/" } ], "sources": [ { "db": "BID", "id": "29624" }, { "db": "JVNDB", "id": "JVNDB-2008-001576" }, { "db": "PACKETSTORM", "id": "67148" }, { "db": "CNNVD", "id": "CNNVD-200806-174" }, { "db": "NVD", "id": "CVE-2008-2674" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "29624" }, { "db": "JVNDB", "id": "JVNDB-2008-001576" }, { "db": "PACKETSTORM", "id": "67148" }, { "db": "CNNVD", "id": "CNNVD-200806-174" }, { "db": "NVD", "id": "CVE-2008-2674" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-06-10T00:00:00", "db": "BID", "id": "29624" }, { "date": "2008-09-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001576" }, { "date": "2008-06-11T00:36:08", "db": "PACKETSTORM", "id": "67148" }, { "date": "2008-06-12T00:00:00", "db": "CNNVD", "id": "CNNVD-200806-174" }, { "date": "2008-06-12T12:21:00", "db": "NVD", "id": "CVE-2008-2674" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-05-07T17:28:00", "db": "BID", "id": "29624" }, { "date": "2012-02-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001576" }, { "date": "2009-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200806-174" }, { "date": "2024-11-21T00:47:26.340000", "db": "NVD", "id": "CVE-2008-2674" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200806-174" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Fujitsu Interstage Application Server Interstage Management Console Arbitrary File Read/Delete Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001576" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-200806-174" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.