Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-3004 (GCVE-0-2007-3004)
Vulnerability from cvelistv5 – Published: 2007-06-04 21:00 – Updated: 2018-10-19 18:57DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-2788. Reason: This candidate is a duplicate of CVE-2007-2788. Notes: All CVE users should reference CVE-2007-2788 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
Show details on NVD website{
"containers": {
"cna": {
"providerMetadata": {
"dateUpdated": "2018-10-19T18:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"rejectedReasons": [
{
"lang": "en",
"value": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-2788. Reason: This candidate is a duplicate of CVE-2007-2788. Notes: All CVE users should reference CVE-2007-2788 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-3004",
"datePublished": "2007-06-04T21:00:00.000Z",
"dateRejected": "2007-07-19T13:00:00.000Z",
"dateReserved": "2007-06-04T04:00:00.000Z",
"dateUpdated": "2018-10-19T18:57:01.000Z",
"state": "REJECTED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0"
}
GSD-2007-3004
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2007-3004",
"description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-2788. Reason: This candidate is a duplicate of CVE-2007-2788. Notes: All CVE users should reference CVE-2007-2788 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"id": "GSD-2007-3004",
"references": [
"https://www.suse.com/security/cve/CVE-2007-3004.html",
"https://access.redhat.com/errata/RHSA-2008:0133"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2007-3004"
],
"details": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-2788. Reason: This candidate is a duplicate of CVE-2007-2788. Notes: All CVE users should reference CVE-2007-2788 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"id": "GSD-2007-3004",
"modified": "2023-12-13T01:21:42.050738Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-3004",
"STATE": "REJECT"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-2788. Reason: This candidate is a duplicate of CVE-2007-2788. Notes: All CVE users should reference CVE-2007-2788 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
]
}
}
}
}
CERTA-2007-AVI-348
Vulnerability from certfr_avis - Published: 2007-08-07 - Updated: 2007-11-16
Plusieurs vulnérabilités dans les paquetages java-1.4.2-ibm permettent à un utilisateur malveillant de contourner la politique de sécurité du système vulnérable.
Description
Une première vulnérabilité, liée à Java Web Start, permet à un utilisateur d'élever ses privilèges et d'accéder indûment à des fichiers en lecture et en modification (CVE-2007-2435).
Une seconde vulnérabilité permet à une application (ou à une applet) d'élever ses privilèges et d'exécuter un code arbitraire sur la machine virtuelle (CVE-2007-3004).
Une troisième vulnérabilité permet de bloquer la machine virtuelle, provoquant un déni de service (CVE-2007-3005).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | Sun Java JDK 1.6.x ; | ||
| IBM | N/A | Sun Java JDK 1.5.x ; | ||
| IBM | N/A | Sun Java JRE 1.3.x ; | ||
| IBM | N/A | Sun Java JRE 1.5.x / 5.x ; | ||
| IBM | N/A | Sun Java SDK 1.3.x ; | ||
| IBM | N/A | Sun Java JRE 1.4.x ; | ||
| IBM | N/A | Sun Java JRE 1.6.x / 6.x ; | ||
| IBM | N/A | Sun Java SDK 1.4.x. | ||
| IBM | N/A | Sun Java Enterprise System 5.x (JSSE) 1.x ; |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sun Java JDK 1.6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sun Java JDK 1.5.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sun Java JRE 1.3.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sun Java JRE 1.5.x / 5.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sun Java SDK 1.3.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sun Java JRE 1.4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sun Java JRE 1.6.x / 6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sun Java SDK 1.4.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sun Java Enterprise System 5.x (JSSE) 1.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne premi\u00e8re vuln\u00e9rabilit\u00e9, li\u00e9e \u00e0 Java Web Start, permet \u00e0 un\nutilisateur d\u0027\u00e9lever ses privil\u00e8ges et d\u0027acc\u00e9der ind\u00fbment \u00e0 des fichiers\nen lecture et en modification (CVE-2007-2435).\n\nUne seconde vuln\u00e9rabilit\u00e9 permet \u00e0 une application (ou \u00e0 une applet)\nd\u0027\u00e9lever ses privil\u00e8ges et d\u0027ex\u00e9cuter un code arbitraire sur la machine\nvirtuelle (CVE-2007-3004).\n\nUne troisi\u00e8me vuln\u00e9rabilit\u00e9 permet de bloquer la machine virtuelle,\nprovoquant un d\u00e9ni de service (CVE-2007-3005).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2788"
},
{
"name": "CVE-2007-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3004"
},
{
"name": "CVE-2007-3922",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3922"
},
{
"name": "CVE-2007-3503",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3503"
},
{
"name": "CVE-2007-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3655"
},
{
"name": "CVE-2007-3005",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3005"
},
{
"name": "CVE-2007-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2789"
},
{
"name": "CVE-2007-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2435"
}
],
"initial_release_date": "2007-08-07T00:00:00",
"last_revision_date": "2007-11-16T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200705-23 du 31 mai 2007 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200705-23.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200706-08 du 26 juin 2007 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200706-08.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP OpenView c01269450 du 14 novembre 2007 :",
"url": "http://www4.itrc.hp.com/service/cki/docDisplay.do?docId=c01269450"
},
{
"title": "Avis du CERTA CERTA-2007-AVI-238 du 01 juin 2007 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2007-AVI-238/index.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Avaya ASA-2007-199 du 23 mai 2007 :",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-199.htm"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SA:2007:045 du 18 juillet 2008 :",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00007.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0829 du 07 ao\u00fbt 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0829.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0818 du 06 ao\u00fbt 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0818.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0817 du 06 ao\u00fbt 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0817.html"
}
],
"reference": "CERTA-2007-AVI-348",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-08-07T00:00:00.000000"
},
{
"description": "modification des syst\u00e8mes affect\u00e9s, ajout des r\u00e9f\u00e9rences CVE et des bulletins de s\u00e9curit\u00e9 des \u00e9diteurs SuSE, Red Hat, Avaya et Gentoo.",
"revision_date": "2007-08-08T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 HP OpenView.",
"revision_date": "2007-11-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans les paquetages java-1.4.2-ibm permettent \u00e0\nun utilisateur malveillant de contourner la politique de s\u00e9curit\u00e9 du\nsyst\u00e8me vuln\u00e9rable.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans la machine Java d\u0027IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis Redhat RHSA-2007:0817-2 du 06 ao\u00fbt 2007",
"url": null
}
]
}
CERTA-2008-AVI-008
Vulnerability from certfr_avis - Published: 2008-01-08 - Updated: 2008-01-08
De multiples vulnérabilités sur VMWare ESX Server et VirtualCenter Management Server permettent notamment à une personne malintentionnée distante d'exécuter du code arbitraire.
Description
De multiples vulnérabilités existent sur VMWare ESX Server. Celles-ci concernent des modules ou logiciels utilisés par le serveur et récemment mis à jour : OpenPegasus, Tomcat, Samba, OpenSSL, JRE, util-linux, et Perl. Certaines de ces failles permettent notamment à une personne malintentionnée distante d'exécuter du code arbitraire.
Solution
Se référer aux bulletins de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VirtualCenter Management Server 2.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMWare ESX Server 2.0.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMWare ESX Server 3.0.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s existent sur VMWare ESX Server. Celles-ci\nconcernent des modules ou logiciels utilis\u00e9s par le serveur et r\u00e9cemment\nmis \u00e0 jour : OpenPegasus, Tomcat, Samba, OpenSSL, JRE, util-linux, et\nPerl. Certaines de ces failles permettent notamment \u00e0 une personne\nmalintentionn\u00e9e distante d\u0027ex\u00e9cuter du code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-5360",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5360"
},
{
"name": "CVE-2007-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0450"
},
{
"name": "CVE-2007-5135",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5135"
},
{
"name": "CVE-2007-5116",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5116"
},
{
"name": "CVE-2007-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3004"
},
{
"name": "CVE-2005-2090",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2090"
},
{
"name": "CVE-2007-5398",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5398"
},
{
"name": "CVE-2007-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3108"
},
{
"name": "CVE-2007-4572",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4572"
},
{
"name": "CVE-2006-7195",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7195"
},
{
"name": "CVE-2007-5191",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5191"
}
],
"initial_release_date": "2008-01-08T00:00:00",
"last_revision_date": "2008-01-08T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMWare VMSA-2008-0002 du 07 janvier 2008 :",
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000003.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 VMWare VMSA-2008-0001 du 07 janvier 2008 :",
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000002.html"
}
],
"reference": "CERTA-2008-AVI-008",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-01-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s sur \u003cspan class=\"textit\"\u003eVMWare ESX\nServer\u003c/span\u003e et \u003cspan class=\"textit\"\u003eVirtualCenter Management\nServer\u003c/span\u003e permettent notamment \u00e0 une personne malintentionn\u00e9e\ndistante d\u0027ex\u00e9cuter du code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMWare VMSA-2008-0001 du 07 janvier 2008",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMWare VMSA-2008-0002 du 07 janvier 2008",
"url": null
}
]
}
CERTA-2007-AVI-546
Vulnerability from certfr_avis - Published: 2007-12-17 - Updated: 2007-12-17
De multiples vulnérabilités ont été découvertes dans Java pour Mac OS X.
Description
De multiples vulérabilités de Java pour Mac OS X ont été découvertes. Les vulnérabilités les plus importantes permettent :
- un contournement de la politique de sécurité via une appliquette spécialement conçue permettant la suppression et l'insertion d'objets ;
- une exécution de code arbitraire à distance et une élévation de privilèges via une vulnérabilité de Java 1.4 ;
- une exécution de code arbitraire à distance et une élévation de privilèges via une vulnérabilité de J2SE 5.0.
Solution
Se référer au bulletin de sécurité Apple 307177 pour l'obtention des correctifs (cf. section Documentation).
Mac OS X version 10.4.10 et les versions antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eMac OS X version 10.4.10 et les versions ant\u00e9rieures.\u003c/P\u003e",
"content": "## Description\n\nDe multiples vul\u00e9rabilit\u00e9s de Java pour Mac OS X ont \u00e9t\u00e9 d\u00e9couvertes.\nLes vuln\u00e9rabilit\u00e9s les plus importantes permettent :\n\n- un contournement de la politique de s\u00e9curit\u00e9 via une appliquette\n sp\u00e9cialement con\u00e7ue permettant la suppression et l\u0027insertion\n d\u0027objets ;\n- une ex\u00e9cution de code arbitraire \u00e0 distance et une \u00e9l\u00e9vation de\n privil\u00e8ges via une vuln\u00e9rabilit\u00e9 de Java 1.4 ;\n- une ex\u00e9cution de code arbitraire \u00e0 distance et une \u00e9l\u00e9vation de\n privil\u00e8ges via une vuln\u00e9rabilit\u00e9 de J2SE 5.0.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 Apple 307177 pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2788"
},
{
"name": "CVE-2006-4339",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4339"
},
{
"name": "CVE-2007-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3004"
},
{
"name": "CVE-2007-3698",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3698"
},
{
"name": "CVE-2007-3922",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3922"
},
{
"name": "CVE-2007-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0243"
},
{
"name": "CVE-2007-3503",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3503"
},
{
"name": "CVE-2006-6731",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6731"
},
{
"name": "CVE-2007-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3655"
},
{
"name": "CVE-2007-5862",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5862"
},
{
"name": "CVE-2006-6745",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6745"
},
{
"name": "CVE-2007-4381",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4381"
},
{
"name": "CVE-2007-3504",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3504"
},
{
"name": "CVE-2006-6736",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6736"
},
{
"name": "CVE-2007-3005",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3005"
},
{
"name": "CVE-2007-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2789"
},
{
"name": "CVE-2007-5232",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5232"
},
{
"name": "CVE-2007-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2435"
}
],
"initial_release_date": "2007-12-17T00:00:00",
"last_revision_date": "2007-12-17T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple 307177 du 12 d\u00e9cembre 2007 :",
"url": "http://docs.info.apple.com/article.html?artnum=307177"
}
],
"reference": "CERTA-2007-AVI-546",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-12-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Java pour Mac OS X.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Apple 307177 du 12 d\u00e9cembre 2007",
"url": null
}
]
}
FKIE_CVE-2007-3004
Vulnerability from fkie_nvd - Published: 2007-06-04 17:30 - Updated: 2023-11-07 02:00| URL | Tags |
|---|
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-2788. Reason: This candidate is a duplicate of CVE-2007-2788. Notes: All CVE users should reference CVE-2007-2788 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage"
}
],
"id": "CVE-2007-3004",
"lastModified": "2023-11-07T02:00:43.630",
"metrics": {},
"published": "2007-06-04T17:30:00.000",
"references": [],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Rejected",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.