{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T20:22:09.540","vulnerabilities":[{"cve":{"id":"CVE-2008-7194","sourceIdentifier":"cve@mitre.org","published":"2009-09-10T10:30:00.953","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Fujitsu Interstage HTTP Server, as used in Interstage Application Server 5.0, 7.0, 7.0.1, and 8.0.0 for Windows, allows attackers to cause a denial of service via a crafted request."},{"lang":"es","value":"Vulnerabilidad no especificada en Fujitsu Interstage HTTP Server, como el que se usa en Interstage Application Server v5.0, v7.0, v7.0.1 y v8.0.0 para Windows, permite a los atacantes provocar una denegación de servicio a través de una solicitud manipulada."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:*:*:*:*:*:*","matchCriteriaId":"B5C41BEF-22FE-460D-B195-2B77B073C424"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:enterprise:*:*:*:*:*","matchCriteriaId":"0314571B-98D3-40B0-AA16-56916E1169E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:standard:*:*:*:*:*","matchCriteriaId":"BF689AB2-DE03-4B8F-B1AF-B7B3EDD15081"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:standard_windows:*:*:*:*:*","matchCriteriaId":"90A435DC-3EA9-45EB-ADE5-7502AB3A5057"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:web_j:*:*:*:*:*","matchCriteriaId":"45AC726E-2709-4244-8A1F-F8EB2D9A7D29"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:5.0:*:web_j_windows:*:*:*:*:*","matchCriteriaId":"CF25C19E-1A38-4308-A9C8-2B003A9295A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:*:*:*:*:*:*","matchCriteriaId":"63C3AAED-7C59-493F-B705-A12704110289"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:enterprise:*:*:*:*:*","matchCriteriaId":"99AC7276-3FF3-42D0-AA5A-E807C916E1AD"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:enterprise_windows:*:*:*:*:*","matchCriteriaId":"F7F7B5B2-5C36-4353-85CA-97356CFF79EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:plus:*:*:*:*:*","matchCriteriaId":"CEEEE36C-E14C-4D0F-B382-0903D104E578"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:plus_developer:*:*:*:*:*","matchCriteriaId":"C23324B8-E010-4E21-ADEF-58FC0A0D2BFB"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:plus_developer_windows:*:*:*:*:*","matchCriteriaId":"D1768BFE-51D4-4474-B4D4-E6EDD2F2EC7B"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:plus_windows:*:*:*:*:*","matchCriteriaId":"132550E0-8EF8-4318-B885-F9516F836540"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:7.0:*:standard:*:*:*:*:*","matchCriteriaId":"59E78C8D-7009-4CFB-85B7-9B564BD74AF2"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"8838238A-FD20-4481-8D5C-EB6BEBE95133"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:enterprise:*:*:*:*:*","matchCriteriaId":"390FBC71-1CF2-4D05-9931-9F4E7ED9C096"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:enterprise_windows:*:*:*:*:*","matchCriteriaId":"2AFD1C0D-AF98-4B93-B449-24CB07A429AF"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:plus:*:*:*:*:*","matchCriteriaId":"BDD9380C-8224-44C5-9688-F3134A6A0C04"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:7.0.1:*:plus_windows:*:*:*:*:*","matchCriteriaId":"D98630E0-FE0C-43DB-8A0A-1A71C998156E"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:*:*:*:*:*:*","matchCriteriaId":"8C657792-A571-4095-B966-D353C22A35E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:enterprise:*:*:*:*:*","matchCriteriaId":"E7F2EDBD-8799-4EAF-9925-3C07FAEEBE77"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:enterprise_windows:*:*:*:*:*","matchCriteriaId":"8F3CB91A-FA1F-4C62-AAEB-1263487E09D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:standard_j:*:*:*:*:*","matchCriteriaId":"AA6ED703-53F9-4536-8E1D-46C30E547B06"},{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:interstage_application_server:8.0.0:*:standard_j_windows:*:*:*:*:*","matchCriteriaId":"207A8246-0063-4D58-9E7D-C64535017BC1"}]}]}],"references":[{"url":"http://secunia.com/advisories/28606","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/27391","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2008/0233","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/39847","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/28606","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/27391","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2008/0233","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/39847","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}