Skip to main content
Site Update
- December 28, 2011
- December 7, 2011
- November 8, 2011
- October 28, 2011
- October 19, 2011
- October 12, 2011
- September 30, 2011
- September 5, 2011
- August 26, 2011
- July 29, 2011
- July 14, 2011
- July 8, 2011
- June 17, 2011
- June 3, 2011
- May 16, 2011
- April 26, 2011
- April 8, 2011
- March 23, 2011
- March 7, 2011
- Multiple Vulnerabilities in Cosminexus is added.
- Buffer Overflow Vulnerability of Cosminexus, Processing Kit for XML, and Hitachi Developer's Kit for Java(TM) is updated.
- Problem about Handling Session Data when Using the Session Failover Function in uCosminexus Application Server is updated.
- Problem about Illegal Granting of Group Permissions in Cosminexus Application Server is updated.
- Buffer Overflow and DoS Vulnerabilities in Cosminexus and Processing Kit for XML is updated.
- Cross-site Scripting Vulnerability in Cosminexus Component Container is updated.
- Vulnerability in the UTF-8 decode function in Cosminexus, Processing Kit for XML, and Hitachi Developer's Kit for Java is updated.
- Vulnerability in reading arbitrary memory locations by using a parsing zip file API in Cosminexus, Processing Kit for XML, Hitachi Developer's Kit for Java is updated.
- Buffer overflow vulnerability in Cosminexus, Processing Kit for XML, and Hitachi Developer's Kit for Java is updated.
- Buffer Overflow Vulnerability in Cosminexus, Processing Kit for XML, and Hitachi Developer's Kit for Java is updated.
- Multiple vulnerabilities in Cosminexus is updated.
- Multiple Vulnerabilities in Cosminexus is updated.
- February 28, 2011
- January 31, 2011
- Security Vulnerabilities in EUR Form Client is added.
- Buffer Overflow Vulnerability in Groupmax Integrated Desktop, Groupmax Client Light Ex, and Groupmax World Wide Web Desktop is added.
- DoS Vulnerability in Collaboration - File Sharing is added.
- Multiple Vulnerabilities in Cosminexus is added.
- Buffer Overflow and DoS Vulnerabilities in Cosminexus and Processing Kit for XML is updated.
- Vulnerability in the UTF-8 decode function in Cosminexus, Processing Kit for XML, and Hitachi Developer's Kit for Java is updated.
- Vulnerability in reading arbitrary memory locations by using a parsing zip file API in Cosminexus, Processing Kit for XML, Hitachi Developer's Kit for Java is updated.
- Cross-site Scripting Vulnerability in Hitachi Business Logic - Container and Hitachi Business Logic - Container 2 is updated.
- Buffer overflow vulnerability in Cosminexus, Processing Kit for XML, and Hitachi Developer's Kit for Java is updated.
- DoS Vulnerability in Cosminexus XML Processor is updated.
- Buffer Overflow Vulnerability in Cosminexus, Processing Kit for XML, and Hitachi Developer's Kit for Java is updated.
- Cross-site Scripting Vulnerability in uCosminexus Portal Framework is updated.
- DoS Vulnerability in Cosminexus is updated.
- DoS Vulnerability in JP1/NETM is updated.
- Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
- The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
- The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
- The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.