Filtered by vendor Fujitsu
Subscribe
Total
73 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2014-7254 | 1 Fujitsu | 1 Arrows Me F-11d | 2014-12-08 | 4.6 MEDIUM | N/A |
Unspecified vulnerability in ARROWS Me F-11D allows physically proximate attackers to read or modify flash memory via unknown vectors. | |||||
CVE-2014-7252 | 4 Disney Interactive, Fujitsu, Lg and 1 more | 7 Disney Mobile, Arrows Tab Lte F-01d, Arrows X Lte F-05d and 4 more | 2014-12-08 | 4.6 MEDIUM | N/A |
Multiple unspecified vulnerabilities in the Syslink driver for Texas Instruments OMAP mobile processor, as used on NTT DOCOMO ARROWS Tab LTE F-01D, ARROWS X LTE F-05D, Disney Mobile on docomo F-08D, REGZA Phone T-01D, and PRADA phone by LG L-02D; and SoftBank SHARP handsets 102SH allow local users to execute arbitrary code or read kernel memory via unknown vectors related to userland data and "improper data validation." | |||||
CVE-2014-7253 | 1 Fujitsu | 4 Arrows Kiss F-03d, Arrows Tab Lte F-01d, F-12c and 1 more | 2014-12-08 | 7.2 HIGH | N/A |
FUJITSU F-12C, ARROWS Tab LTE F-01D, ARROWS Kiss F-03D, and REGZA Phone T-01D for Android allows local users to execute arbitrary commands via unspecified vectors. | |||||
CVE-2013-7105 | 1 Fujitsu | 2 Interstage Application Server, Interstage Studio | 2013-12-20 | 10.0 HIGH | N/A |
Buffer overflow in the Interstage HTTP Server log functionality, as used in Fujitsu Interstage Application Server 9.0.0, 9.1.0, 9.2.0, 9.3.1, and 10.0.0; and Interstage Studio 9.0.0, 9.1.0, 9.2.0, and 10.0.0, has unspecified impact and attack vectors related to "ihsrlog/rotatelogs." | |||||
CVE-2009-0271 | 1 Fujitsu | 1 Systemcastwizard Lite | 2011-03-08 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in the TFTP service in Fujitsu SystemcastWizard Lite 2.0A, 2.0, 1.9, and earlier allows remote attackers to read arbitrary files via directory traversal sequences in unspecified vectors. | |||||
CVE-2008-1040 | 1 Fujitsu | 6 Interstage Application Server Enterprise, Interstage Application Server Standard J, Interstage Apworks Enterprise and 3 more | 2011-03-08 | 10.0 HIGH | N/A |
Buffer overflow in the Single Sign-On function in Fujitsu Interstage Application Server 8.0.0 through 8.0.3 and 9.0.0, Interstage Studio 8.0.1 and 9.0.0, and Interstage Apworks 8.0.0 allows remote attackers to execute arbitrary code via a long URI. | |||||
CVE-2010-2149 | 1 Fujitsu | 1 E-pares | 2010-09-21 | 4.0 MEDIUM | N/A |
Session fixation vulnerability in Fujitsu e-Pares V01 L01, L03, L10, L20, L30 allows remote attackers to hijack web sessions via unspecified vectors. | |||||
CVE-2010-2151 | 1 Fujitsu | 1 E-pares | 2010-06-04 | 2.6 LOW | N/A |
Cross-site request forgery (CSRF) vulnerability in Fujitsu e-Pares V01 L01 V01 L01, L03, L10, L20, L30, and L40 allows remote attackers to hijack the authentication of users for requests that modify "facility reservation data" via unknown vectors. | |||||
CVE-2010-2150 | 1 Fujitsu | 1 E-pares | 2010-06-04 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability Fujitsu e-Pares V01 L01 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | |||||
CVE-1999-0672 | 1 Fujitsu | 1 Chocoa | 2008-09-09 | 5.1 MEDIUM | N/A |
Buffer overflow in Fujitsu Chocoa IRC client via IRC channel topics. | |||||
CVE-2006-3578 | 1 Fujitsu | 1 Serverview | 2008-09-05 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in Fujitsu ServerView 2.50 up to 3.60L98 and 4.10L11 up to 4.11L81 allows remote attackers to read arbitrary files via unspecified vectors. | |||||
CVE-2006-3579 | 1 Fujitsu | 1 Serverview | 2008-09-05 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in Fujitsu ServerView 2.50 up to 3.60L98 and 4.10L11 up to 4.11L81 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | |||||
CVE-2002-2212 | 2 Fujitsu, Isc | 2 Uxp V, Bind | 2008-09-05 | 5.0 MEDIUM | N/A |
The DNS resolver in unspecified versions of Fujitsu UXP/V, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods. |