fkie_cve-2007-5808
Vulnerability from fkie_nvd
Published
2007-11-05 17:46
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the Groupmax Collaboration - Schedule component in Hitachi Groupmax Collaboration Portal 07-30 through 07-30-/F and 07-32 through 07-32-/C, uCosminexus Collaboration Portal 06-30 through 06-30-/F and 06-32 through 06-32-/C, and Groupmax Collaboration Web Client - Mail/Schedule 07-30 through 07-30-/F and 07-32 through 07-32-/B might allow remote attackers to obtain sensitive information via unspecified vectors related to schedule portlets.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_30:*:*:*:*:*:*:*",
              "matchCriteriaId": "4746A3B3-DA42-43EB-8B55-87928275558E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_30_b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A53B498-655B-4F1E-BFC8-35106D0109EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_30_c:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE8D7B18-527F-4281-846E-FFC7A5AD42D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_30_d:*:*:*:*:*:*:*",
              "matchCriteriaId": "44211524-5666-42EB-B5BC-98AABE0B828A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_30_e:*:*:*:*:*:*:*",
              "matchCriteriaId": "1191CEED-D2EB-4C3C-9F4B-5F41160E49E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_30_f:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E05C56-C0BD-4D0D-851F-16743DFE3904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_32:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B6375C2-A93F-4F24-86DF-1BC2D2AD42F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_32_b:*:*:*:*:*:*:*",
              "matchCriteriaId": "38D212D2-105E-41C1-B814-8508497F4246",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_32_c:*:*:*:*:*:*:*",
              "matchCriteriaId": "F244C0DE-CF59-4872-9BC5-7686F425E0F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_30:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDFF2D01-2431-41F4-A6BE-336FC958FD51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_30_b:*:*:*:*:*:*:*",
              "matchCriteriaId": "574496FB-C368-4F9F-9378-D33F336B44D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_30_c:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F9E19B7-A631-49FA-B2CA-B4138076957F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_30_d:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F7B7264-129B-4BF4-90FA-931DE1980877",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_30_e:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA5075A5-9B3D-4125-9D64-1A3E95320156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_30_f:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9A636C4-E877-421D-9B56-57B34A791BAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_32:*:*:*:*:*:*:*",
              "matchCriteriaId": "417FFDE7-63C0-4A6B-A0D3-9738158D7017",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_32_b:*:*:*:*:*:*:*",
              "matchCriteriaId": "B92A78E4-098D-4416-879B-A34F1115B4BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADA1115-0978-4CA6-A54C-1733B430D24D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_30_b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3A542BF-3785-42DD-A42A-494ED774F5AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_30_c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DFA57C9-6601-489F-9751-162DF6D52D3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_30_d:*:*:*:*:*:*:*",
              "matchCriteriaId": "99899CF6-2A31-419F-8DF1-7B14917E5BA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_30_e:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDB74A03-FF81-4583-98C2-A10229F932C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_30_f:*:*:*:*:*:*:*",
              "matchCriteriaId": "F76ECE73-F247-4233-B57D-8CC9F5C1A0A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_32:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8F74FE7-5937-4C27-AC20-3DBDD005BD29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_32_b:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF32455F-DF21-46CA-9BA0-8CFD63362CFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:ucosminexus_collaboration_portal:06_32_c:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDC29AA5-7CD6-447A-985F-1A2B876F3C48",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the Groupmax Collaboration - Schedule component in Hitachi Groupmax Collaboration Portal 07-30 through 07-30-/F and 07-32 through 07-32-/C, uCosminexus Collaboration Portal 06-30 through 06-30-/F and 06-32 through 06-32-/C, and Groupmax Collaboration Web Client - Mail/Schedule 07-30 through 07-30-/F and 07-32 through 07-32-/B might allow remote attackers to obtain sensitive information via unspecified vectors related to schedule portlets."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente  Groupmax Collaboration - Schedule de Hitachi Groupmax Collaboration Portal 07-30 hasta 07-30-/F y 07-32 hasta 07-32-/C, uCosminexus Collaboration Portal 06-30 hasta 06-30-/F y 06-32 hasta 06-32-/C, y Groupmax Collaboration Web Client - Mail/Schedule 07-30 hasta 07-30-/F y d 07-32 hasta 07-32-/B podr\u00eda permitir a atacantes remotos obtener informaci\u00f3n confidencial mediante vectores no especificados  relativos a portlets de agenda."
    }
  ],
  "id": "CVE-2007-5808",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-11-05T17:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/42025"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27451"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-036_e/index-e.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/26272"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/3667"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38188"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/42025"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27451"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-036_e/index-e.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/26272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3667"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38188"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…