Vulnerability Database

328,181

Total vulnerabilities in the database

CVE-2009-3169

Multiple unspecified vulnerabilities in Hitachi JP1/File Transmission Server/FTP before 09-00 allow remote attackers to execute arbitrary code via unknown attack vectors.

  • Published: Sep 11, 2009
  • Updated: Nov 9, 2025
  • CVE: CVE-2009-3169
  • Severity: High
  • Exploit:

CVSS v2:

  • Severity: High
  • Score: 10
  • AV:N/AC:L/Au:N/C:C/I:C/A:C

No CWE or OWASP classifications available.

Software From Fixed in
hitachi / jp1_file_transmission_server 05_10 05_10.x
hitachi / jp1_file_transmission_server 08_01_02 08_01_02.x
hitachi / jp1_file_transmission_server 07_00_a 07_00_a.x
hitachi / jp1_file_transmission_server 05_10_b 05_10_b.x
hitachi / jp1_file_transmission_server 08_00 08_00.x
hitachi / jp1_file_transmission_server 05_00 05_00.x
hitachi / jp1_file_transmission_server 06_01_d 06_01_d.x
hitachi / jp1_file_transmission_server 07_50 07_50.x
hitachi / jp1_file_transmission_server 06_00_f 06_00_f.x
hitachi / jp1_file_transmission_server 06_02_c 06_02_c.x
hitachi / jp1_file_transmission_server 07_50_02 07_50_02.x
hitachi / jp1_file_transmission_server 05_10_d 05_10_d.x
hitachi / jp1_file_transmission_server 08_01_01 08_01_01.x
hitachi / jp1_file_transmission_server 07_50_03 07_50_03.x
hitachi / jp1_file_transmission_server 06_02_e 06_02_e.x
hitachi / jp1_file_transmission_server 08_10_01 08_10_01.x
hitachi / jp1_file_transmission_server 06_00_d 06_00_d.x
hitachi / jp1_file_transmission_server 08_01 08_01.x
hitachi / jp1_file_transmission_server 07_20 07_20.x
hitachi / jp1_file_transmission_server 07_00 07_00.x
hitachi / jp1_file_transmission_server 07_20_a 07_20_a.x
hitachi / jp1_file_transmission_server 08_00_04 08_00_04.x
hitachi / jp1_file_transmission_server 06_00_c 06_00_c.x
hitachi / jp1_file_transmission_server 06_02_d 06_02_d.x
hitachi / jp1_file_transmission_server 06_01_e 06_01_e.x
hitachi / jp1_file_transmission_server 07_11 07_11.x
hitachi / jp1_file_transmission_server 07_10 07_10.x
hitachi / jp1_file_transmission_server 07_50_01 07_50_01.x
hitachi / jp1_file_transmission_server 05_10_c 05_10_c.x
hitachi / jp1_file_transmission_server 06_01_a 06_01_a.x
hitachi / jp1_file_transmission_server 08_00_02 08_00_02.x
hitachi / jp1_file_transmission_server 06_02_a 06_02_a.x
hitachi / jp1_file_transmission_server 06_00_a 06_00_a.x
hitachi / jp1_file_transmission_server 08_01_03 08_01_03.x
hitachi / jp1_file_transmission_server 08_00_01 08_00_01.x
hitachi / jp1_file_transmission_server 05_10_e 05_10_e.x
hitachi / jp1_file_transmission_server 07_10_a 07_10_a.x
hitachi / jp1_file_transmission_server 05_10_g 05_10_g.x
hitachi / jp1_file_transmission_server 06_01 06_01.x
hitachi / jp1_file_transmission_server 07_50_04 07_50_04.x
hitachi / jp1_file_transmission_server 06_02_b 06_02_b.x
hitachi / jp1_file_transmission_server 06_00 06_00.x
hitachi / jp1_file_transmission_server 06_01_b 06_01_b.x
hitachi / jp1_file_transmission_server 08_00_03 08_00_03.x
hitachi / jp1_file_transmission_server 06_02_f 06_02_f.x
hitachi / jp1_file_transmission_server 08_01_04 08_01_04.x
hitachi / jp1_file_transmission_server 05_10_a 05_10_a.x
hitachi / jp1_file_transmission_server 06_02 06_02.x
hitachi / jp1_file_transmission_server 07_10_c 07_10_c.x
hitachi / jp1_file_transmission_server - 08_10.x
hitachi / jp1_file_transmission_server 07_10_b 07_10_b.x
hitachi / jp1_file_transmission_server 06_00_b 06_00_b.x
hitachi / jp1_file_transmission_server 07_00_b 07_00_b.x
hitachi / jp1_file_transmission_server 01_00 01_00.x
hitachi / jp1_file_transmission_server 05_10_f 05_10_f.x
hitachi / jp1_file_transmission_server 07_11_a 07_11_a.x
hitachi / jp1_file_transmission_server 07_10_ 07_10_.x
hitachi / jp1_file_transmission_server 06_01_c 06_01_c.x
hitachi / jp1_file_transmission_server 06_2_f 06_2_f.x
hitachi / jp1_file_transmission_server 06_00_e 06_00_e.x
hitachi / jp1_file_transmission_server 08_00_05 08_00_05.x
hitachi / jp1_file_transmission_server 05_10_h 05_10_h.x
hitachi / jp1_file_transmission_server 06_02_g 06_02_g.x
hitachi / jp1_file_transmission_server 07_20_b 07_20_b.x

Frequently Asked Questions

A security vulnerability is a weakness in software, hardware, or configuration that can be exploited to compromise confidentiality, integrity, or availability. Many vulnerabilities are tracked as CVEs (Common Vulnerabilities and Exposures), which provide a standardized identifier so teams can coordinate patching, mitigation, and risk assessment across tools and vendors.

CVSS (Common Vulnerability Scoring System) estimates technical severity, but it doesn't automatically equal business risk. Prioritize using context like internet exposure, affected asset criticality, known exploitation (proof-of-concept or in-the-wild), and whether compensating controls exist. A "Medium" CVSS on an exposed, production system can be more urgent than a "Critical" on an isolated, non-production host.

A vulnerability is the underlying weakness. An exploit is the method or code used to take advantage of it. A zero-day is a vulnerability that is unknown to the vendor or has no publicly available fix when attackers begin using it. In practice, risk increases sharply when exploitation becomes reliable or widespread.

Recurring findings usually come from incomplete Asset Discovery, inconsistent patch management, inherited images, and configuration drift. In modern environments, you also need to watch the software supply chain: dependencies, containers, build pipelines, and third-party services can reintroduce the same weakness even after you patch a single host. Unknown or unmanaged assets (often called Shadow IT) are a common reason the same issues resurface.

Use a simple, repeatable triage model: focus first on externally exposed assets, high-value systems (identity, VPN, email, production), vulnerabilities with known exploits, and issues that enable remote code execution or privilege escalation. Then enforce patch SLAs and track progress using consistent metrics so remediation is steady, not reactive.

SynScan combines attack surface monitoring and continuous security auditing to keep your inventory current, flag high-impact vulnerabilities early, and help you turn raw findings into a practical remediation plan.