Vulnerabilities > Fujitsu

DATE CVE VULNERABILITY TITLE RISK
2014-12-05 CVE-2014-7254 Local Information Disclosure vulnerability in ARROWS Me F-11D
Unspecified vulnerability in ARROWS Me F-11D allows physically proximate attackers to read or modify flash memory via unknown vectors.
local
low complexity
fujitsu
4.6
2014-12-05 CVE-2014-7253 OS Command Injection vulnerability in Fujitsu products
FUJITSU F-12C, ARROWS Tab LTE F-01D, ARROWS Kiss F-03D, and REGZA Phone T-01D for Android allows local users to execute arbitrary commands via unspecified vectors.
local
low complexity
fujitsu CWE-78
7.2
2014-12-05 CVE-2014-7252 Multiple Security vulnerability in OMAP Mobile Processors Syslink Driver
Multiple unspecified vulnerabilities in the Syslink driver for Texas Instruments OMAP mobile processor, as used on NTT DOCOMO ARROWS Tab LTE F-01D, ARROWS X LTE F-05D, Disney Mobile on docomo F-08D, REGZA Phone T-01D, and PRADA phone by LG L-02D; and SoftBank SHARP handsets 102SH allow local users to execute arbitrary code or read kernel memory via unknown vectors related to userland data and "improper data validation."
local
low complexity
disney-interactive fujitsu sharp lg
4.6
2014-08-14 CVE-2014-3898 Cross-Site Scripting vulnerability in Fujitsu Serverview Operations Manager 5.00.09/6.30.05
Cross-site scripting (XSS) vulnerability in Fujitsu ServerView Operations Manager 5.00.09 through 6.30.05 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
network
fujitsu CWE-79
4.3
2013-12-14 CVE-2013-7105 Buffer Errors vulnerability in Fujitsu Interstage Application Server and Interstage Studio
Buffer overflow in the Interstage HTTP Server log functionality, as used in Fujitsu Interstage Application Server 9.0.0, 9.1.0, 9.2.0, 9.3.1, and 10.0.0; and Interstage Studio 9.0.0, 9.1.0, 9.2.0, and 10.0.0, has unspecified impact and attack vectors related to "ihsrlog/rotatelogs."
network
low complexity
fujitsu CWE-119
critical
10.0
2013-03-15 CVE-2013-2566 Inadequate Encryption Strength vulnerability in multiple products
The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.
4.3
2010-06-03 CVE-2010-2151 Cross-Site Request Forgery (CSRF) vulnerability in Fujitsu E-Pares
Cross-site request forgery (CSRF) vulnerability in Fujitsu e-Pares V01 L01 V01 L01, L03, L10, L20, L30, and L40 allows remote attackers to hijack the authentication of users for requests that modify "facility reservation data" via unknown vectors.
network
high complexity
fujitsu CWE-352
2.6
2010-06-03 CVE-2010-2150 Cross-Site Scripting vulnerability in Fujitsu E-Pares L01/V01
Cross-site scripting (XSS) vulnerability Fujitsu e-Pares V01 L01 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
network
fujitsu CWE-79
4.3
2010-06-03 CVE-2010-2149 Improper Authentication vulnerability in Fujitsu E-Pares
Session fixation vulnerability in Fujitsu e-Pares V01 L01, L03, L10, L20, L30 allows remote attackers to hijack web sessions via unspecified vectors.
network
high complexity
fujitsu CWE-287
4.0
2010-05-19 CVE-2010-1942 Unspecified vulnerability in Fujitsu Interstage Application Server
Unspecified vulnerability in the Servlet service in Fujitsu Limited Interstage Application Server 3.0 through 7.0, as used in Interstage Application Framework Suite, Interstage Business Application Server, and Interstage List Manager, allows attackers to obtain sensitive information or force invalid requests to be processed via unknown vectors related to unspecified invalid requests and settings on the load balancing device.
network
low complexity
fujitsu
6.4