Vulnerabilites related to bea - weblogic_integration
Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
An undocumented extension for the Servlet mappings in the Servlet 2.3 specification, when upgrading to WebLogic Server and Express 7.0 Service Pack 1 from BEA WebLogic Server and Express 6.0 through 7.0.0.1, does not prepend a "/" character in certain URL patterns, which prevents the proper enforcement of role mappings and policies in applications that use the extension.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bea | weblogic_integration | 7.0 | |
bea | weblogic_integration | 7.0 | |
bea | weblogic_server | 6.0 | |
bea | weblogic_server | 6.0 | |
bea | weblogic_server | 6.1 | |
bea | weblogic_server | 6.1 | |
bea | weblogic_server | 7.0 | |
bea | weblogic_server | 7.0 | |
bea | weblogic_server | 7.0.0.1 | |
bea | weblogic_server | 7.0.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bea:weblogic_integration:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AB49671-9D20-44B1-93DE-261AD900679E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "F84AF19F-BC6C-4C4E-86E4-C4BA27A8A424", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2D9AB3C0-8783-4160-AE2D-D1E5AAAA0A78", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.0:*:express:*:*:*:*:*", "matchCriteriaId": "80D90123-74BA-4A70-9A10-6980BAD270B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "1FDCF6AE-43DC-4AE5-9260-CA657F40BE77", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:*:express:*:*:*:*:*", "matchCriteriaId": "05AFBE78-C611-4EA2-8B00-5F8B61696CBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9C5AFCF-79D8-4005-B800-B0C6BD461276", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*", "matchCriteriaId": "FBDF3AC0-0680-4EEE-898C-47D194667BE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "74AE35FF-AC1C-435B-8CE9-F40AFFFA3A46", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:express:*:*:*:*:*", "matchCriteriaId": "25C711BB-E7E0-41D8-985E-5DD386C54637", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An undocumented extension for the Servlet mappings in the Servlet 2.3 specification, when upgrading to WebLogic Server and Express 7.0 Service Pack 1 from BEA WebLogic Server and Express 6.0 through 7.0.0.1, does not prepend a \"/\" character in certain URL patterns, which prevents the proper enforcement of role mappings and policies in applications that use the extension." } ], "id": "CVE-2002-2142", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://dev2dev.bea.com/pub/advisory/3" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/10392.php" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/5971" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev2dev.bea.com/pub/advisory/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/10392.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/5971" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in WebLogic Integration 7.0 and 2.0, Liquid Data 1.1, and WebLogic Server and Express 5.1 through 7.0, allow remote attackers to execute arbitrary web script and steal authentication credentials via (1) a forward instruction to the Servlet container or (2) other vulnerabilities in the WebLogic Server console application.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bea | liquid_data | 1.1 | |
bea | weblogic_integration | 2.0 | |
bea | weblogic_integration | 7.0 | |
bea | weblogic_server | 5.1 | |
bea | weblogic_server | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bea:liquid_data:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "33A4F5FB-69A0-49D0-81D1-D831C3E7BE1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "075BB751-A3EF-40DB-8D9C-9F7FB49061C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AB49671-9D20-44B1-93DE-261AD900679E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "CCD5D4AD-0BA3-42F7-852F-524488D74A96", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*", "matchCriteriaId": "FBDF3AC0-0680-4EEE-898C-47D194667BE2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in WebLogic Integration 7.0 and 2.0, Liquid Data 1.1, and WebLogic Server and Express 5.1 through 7.0, allow remote attackers to execute arbitrary web script and steal authentication credentials via (1) a forward instruction to the Servlet container or (2) other vulnerabilities in the WebLogic Server console application." } ], "id": "CVE-2003-0733", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/SA_BEA03_36.00.jsp" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/8357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/SA_BEA03_36.00.jsp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/8357" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-10-18 21:17
Modified
2025-04-09 00:30
Severity ?
Summary
BEA Tuxedo 8.0 before RP392 and 8.1 before RP293, and WebLogic Enterprise 5.1 before RP174, echo the password in cleartext, which allows physically proximate attackers to obtain sensitive information via the (1) cnsbind, (2) cnsunbind, or (3) cnsls commands.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bea:tuxedo:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "95C77782-600F-4BBB-B71D-C28FDD9AAF60", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:tuxedo:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "30BF1224-40A6-454F-B6CF-3BEEBE3272B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "53E28DE8-4868-4DCE-8F8C-7967F2515D80", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:8.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "60231665-A976-4831-9419-AA332D3CC3D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:8.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "C67B3D8E-EBFF-4926-B696-9DC123A667EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:8.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "DA53F4D4-CABE-47A4-A900-840B5B933D5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:8.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "4CE99F33-A818-441D-A4AF-773C5422D992", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:8.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "FC355584-B0B1-4834-B2C9-4671AC4ED382", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "C64003CF-C562-491A-8430-B8D40CEC528C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:5.1:*:enterprise:*:*:*:*:*", "matchCriteriaId": "AC966FC9-3ED4-4CCD-B1E6-74E8CC7CEBCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:*:express:*:*:*:*:*", "matchCriteriaId": "05AFBE78-C611-4EA2-8B00-5F8B61696CBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp1:express:*:*:*:*:*", "matchCriteriaId": "C3B7752C-B297-480A-B3FC-948EA081670C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp2:express:*:*:*:*:*", "matchCriteriaId": "71892EC0-E6B1-4214-AC53-06489F711829", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp3:express:*:*:*:*:*", "matchCriteriaId": "696F52AE-FEB9-4090-872E-FDFD969F5604", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp4:express:*:*:*:*:*", "matchCriteriaId": "DCED03B6-7565-4F53-8D85-F3391BF66988", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp5:express:*:*:*:*:*", "matchCriteriaId": "B70F0353-635F-465B-A7E5-AF2D017AB008", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp6:express:*:*:*:*:*", "matchCriteriaId": "FED6AE20-974B-44A7-98C4-F69E6E33D9DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp7:express:*:*:*:*:*", "matchCriteriaId": "F77E777F-7EB5-4A08-9063-C772B49B5E36", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9C5AFCF-79D8-4005-B800-B0C6BD461276", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*", "matchCriteriaId": "FBDF3AC0-0680-4EEE-898C-47D194667BE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "6828CE4B-91E8-4688-977F-DC7BC21131C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*", "matchCriteriaId": "BBDB9094-78E8-4CBF-9F5F-321D5174F1EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "E141AA86-C6D0-4FA8-9268-0FB0635DF9CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*", "matchCriteriaId": "6FB8930F-C6D8-40B9-8D08-751F5B47229B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "893D9D88-43C4-4F9F-A364-0585DE6FA9E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*", "matchCriteriaId": "D59F9859-7344-43F0-9348-E57FABB9E431", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "D34E2925-DE2A-437F-B349-BD7103F4C37E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*", "matchCriteriaId": "0A4EC87D-EF83-48C5-B516-A6A482D9F525", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*", "matchCriteriaId": "16E3F943-D920-4C0A-8545-5CF7D792011F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp5:express:*:*:*:*:*", "matchCriteriaId": "6BBA04D4-BA2E-4495-85DE-38918A878012", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*", "matchCriteriaId": "B46A3EBE-B268-427E-AAB5-62DDF255F1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp6:express:*:*:*:*:*", "matchCriteriaId": "A3024422-1CA9-4E5D-80D1-2F4B57FDAEBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp7:*:*:*:*:*:*", "matchCriteriaId": "F5D61A68-E83A-4374-832A-C9A2FEA0AD6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp7:express:*:*:*:*:*", "matchCriteriaId": "596178D8-B7BB-4793-81C1-119ED353CF2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "74AE35FF-AC1C-435B-8CE9-F40AFFFA3A46", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "32E8797D-1B62-4480-A79D-0345E65699E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "2FC1486C-6AC4-44F7-9015-40FD4A341C38", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "5485722F-5DE4-4CD4-865F-32585537F523", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "3CCEDE54-97F3-457A-9886-5BD91C9AED2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*", "matchCriteriaId": "ADED8968-EA9C-4F0E-AD2F-BC834F4D8A58", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*", "matchCriteriaId": "F7560131-A6AC-4BBB-AA2D-C7C63AB51226", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*", "matchCriteriaId": "893C2387-03E3-4F8E-9029-BC64C64239EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp3:express:*:*:*:*:*", "matchCriteriaId": "55661356-58E0-49D3-9C79-B4BB5EBE24CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp4:express:*:*:*:*:*", "matchCriteriaId": "107C2FC6-BC60-4817-8A21-14C81DA6DEF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp5:express:*:*:*:*:*", "matchCriteriaId": "24E0BA12-971C-4DC4-8ED2-9B7DCD6390E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CA97F1A-49F7-4511-8959-D62155491DF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "DCAAE8F1-CB25-4871-BE48-ABF7DFAD8AD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:9.1:*:express:*:*:*:*:*", "matchCriteriaId": "17280B97-D499-434E-BD89-FD348E9E2E0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "7BA8C449-ECD0-46E5-A7D6-740DE8DEE0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:9.2:*:express:*:*:*:*:*", "matchCriteriaId": "B06BDF43-A534-4F38-813D-72F538549F6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "AD6F9694-259F-4631-BC93-B1136F08E77E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "77624161-7740-4162-9C83-C0DFEA2BBCCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "E785D039-3426-4C1F-BBA8-7C6D32FB141E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "D4B2A474-B6C4-47B6-8B20-8722A8C25238", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "2FDBD7AF-51AC-48B9-A465-0C13B9230EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_portal:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B04835B2-7FE9-462B-B989-4031D43C9670", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "BEA Tuxedo 8.0 before RP392 and 8.1 before RP293, and WebLogic Enterprise 5.1 before RP174, echo the password in cleartext, which allows physically proximate attackers to obtain sensitive information via the (1) cnsbind, (2) cnsunbind, or (3) cnsls commands." }, { "lang": "es", "value": "BEA Tuxedo 8.0 anterior al RP392 y el 8.1 anterior al RP293 y el WebLogic Enterprise 5.1 anterior al RP174, muestra la contrase\u00f1a en texto claro, lo que permite a atacantes f\u00edsicamente pr\u00f3ximos obtener informaci\u00f3n sensible a trav\u00e9s de los comandos (1) cnsbind, (2) cnsunbind o (3) cnsls." } ], "evaluatorSolution": "More information can be found regarding patch information at:\r\nhttp://www.securityfocus.com/bid/23979/solution", "id": "CVE-2007-5576", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-10-18T21:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://dev2dev.bea.com/pub/advisory/226" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/45478" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1813" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34290" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev2dev.bea.com/pub/advisory/226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/45478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34290" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-05-16 01:19
Modified
2025-04-09 00:30
Severity ?
Summary
Directory traversal vulnerability in the Test View Console in BEA WebLogic Integration 9.2 before SP1 and WebLogic Workshop 8.1 SP2 through SP6, when "deployed in an exploded format," allows remote attackers to list a WebLogic Workshop Directory (wlwdir) parent directory via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bea | weblogic_integration | 9.2 | |
bea | weblogic_workshop | 8.1 | |
bea | weblogic_workshop | 8.1 | |
bea | weblogic_workshop | 8.1 | |
bea | weblogic_workshop | 8.1 | |
bea | weblogic_workshop | 8.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bea:weblogic_integration:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "C64003CF-C562-491A-8430-B8D40CEC528C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "AD6F9694-259F-4631-BC93-B1136F08E77E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "77624161-7740-4162-9C83-C0DFEA2BBCCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "E785D039-3426-4C1F-BBA8-7C6D32FB141E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "D4B2A474-B6C4-47B6-8B20-8722A8C25238", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "2FDBD7AF-51AC-48B9-A465-0C13B9230EE3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the Test View Console in BEA WebLogic Integration 9.2 before SP1 and WebLogic Workshop 8.1 SP2 through SP6, when \"deployed in an exploded format,\" allows remote attackers to list a WebLogic Workshop Directory (wlwdir) parent directory via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en Test View Console de BEA WebLogic Integration 9.2 anterior a SP1 y WebLogic Workshop 8.1 SP2 hasta SP6, cuando es \"desplegado en formato expandido\" permite a atacantes remotos listar un directorio padre de WebLogic Workshop Directory (wlwdir) a trav\u00e9s de vectores sin especificar." } ], "evaluatorSolution": "The vendor has addressed this issue through the following product releases: \r\n\r\nBEA WebLogic Server patches :\r\nhttp://commerce.bea.com/showallversions.jsp?family=WLS\r\n\r\nBEA WebLogic Platform patches :\r\nhttp://commerce.bea.com/showallversions.jsp?family=WLP \r\n", "id": "CVE-2007-2705", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-16T01:19:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://dev2dev.bea.com/pub/advisory/239" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/36063" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018059" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://dev2dev.bea.com/pub/advisory/239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34281" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2002-2142 (GCVE-0-2002-2142)
Vulnerability from cvelistv5
Published
2005-11-16 21:17
Modified
2024-08-08 03:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An undocumented extension for the Servlet mappings in the Servlet 2.3 specification, when upgrading to WebLogic Server and Express 7.0 Service Pack 1 from BEA WebLogic Server and Express 6.0 through 7.0.0.1, does not prepend a "/" character in certain URL patterns, which prevents the proper enforcement of role mappings and policies in applications that use the extension.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:51:17.671Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "weblogic-security-policy-ignored(10392)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10392.php" }, { "name": "5971", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5971" }, { "name": "BEA02-22.00", "tags": [ "vendor-advisory", "x_refsource_BEA", "x_transferred" ], "url": "http://dev2dev.bea.com/pub/advisory/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-10-15T00:00:00", "descriptions": [ { "lang": "en", "value": "An undocumented extension for the Servlet mappings in the Servlet 2.3 specification, when upgrading to WebLogic Server and Express 7.0 Service Pack 1 from BEA WebLogic Server and Express 6.0 through 7.0.0.1, does not prepend a \"/\" character in certain URL patterns, which prevents the proper enforcement of role mappings and policies in applications that use the extension." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-04-04T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "weblogic-security-policy-ignored(10392)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10392.php" }, { "name": "5971", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5971" }, { "name": "BEA02-22.00", "tags": [ "vendor-advisory", "x_refsource_BEA" ], "url": "http://dev2dev.bea.com/pub/advisory/3" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-2142", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An undocumented extension for the Servlet mappings in the Servlet 2.3 specification, when upgrading to WebLogic Server and Express 7.0 Service Pack 1 from BEA WebLogic Server and Express 6.0 through 7.0.0.1, does not prepend a \"/\" character in certain URL patterns, which prevents the proper enforcement of role mappings and policies in applications that use the extension." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "weblogic-security-policy-ignored(10392)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10392.php" }, { "name": "5971", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5971" }, { "name": "BEA02-22.00", "refsource": "BEA", "url": "http://dev2dev.bea.com/pub/advisory/3" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-2142", "datePublished": "2005-11-16T21:17:00", "dateReserved": "2005-11-16T00:00:00", "dateUpdated": "2024-08-08T03:51:17.671Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-2705 (GCVE-0-2007-2705)
Vulnerability from cvelistv5
Published
2007-05-16 01:00
Modified
2024-08-07 13:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory traversal vulnerability in the Test View Console in BEA WebLogic Integration 9.2 before SP1 and WebLogic Workshop 8.1 SP2 through SP6, when "deployed in an exploded format," allows remote attackers to list a WebLogic Workshop Directory (wlwdir) parent directory via unspecified vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:49:57.112Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1018059", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018059" }, { "name": "36063", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36063" }, { "name": "ADV-2007-1815", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "name": "BEA07-170.00", "tags": [ "vendor-advisory", "x_refsource_BEA", "x_transferred" ], "url": "http://dev2dev.bea.com/pub/advisory/239" }, { "name": "weblogic-testview-directory-traversal(34281)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34281" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the Test View Console in BEA WebLogic Integration 9.2 before SP1 and WebLogic Workshop 8.1 SP2 through SP6, when \"deployed in an exploded format,\" allows remote attackers to list a WebLogic Workshop Directory (wlwdir) parent directory via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1018059", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018059" }, { "name": "36063", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36063" }, { "name": "ADV-2007-1815", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "name": "BEA07-170.00", "tags": [ "vendor-advisory", "x_refsource_BEA" ], "url": "http://dev2dev.bea.com/pub/advisory/239" }, { "name": "weblogic-testview-directory-traversal(34281)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34281" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2705", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in the Test View Console in BEA WebLogic Integration 9.2 before SP1 and WebLogic Workshop 8.1 SP2 through SP6, when \"deployed in an exploded format,\" allows remote attackers to list a WebLogic Workshop Directory (wlwdir) parent directory via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1018059", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018059" }, { "name": "36063", "refsource": "OSVDB", "url": "http://osvdb.org/36063" }, { "name": "ADV-2007-1815", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "name": "BEA07-170.00", "refsource": "BEA", "url": "http://dev2dev.bea.com/pub/advisory/239" }, { "name": "weblogic-testview-directory-traversal(34281)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34281" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2705", "datePublished": "2007-05-16T01:00:00", "dateReserved": "2007-05-15T00:00:00", "dateUpdated": "2024-08-07T13:49:57.112Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-0733 (GCVE-0-2003-0733)
Vulnerability from cvelistv5
Published
2003-09-04 04:00
Modified
2024-08-08 02:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in WebLogic Integration 7.0 and 2.0, Liquid Data 1.1, and WebLogic Server and Express 5.1 through 7.0, allow remote attackers to execute arbitrary web script and steal authentication credentials via (1) a forward instruction to the Servlet container or (2) other vulnerabilities in the WebLogic Server console application.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:05:12.198Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "8357", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/8357" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/SA_BEA03_36.00.jsp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in WebLogic Integration 7.0 and 2.0, Liquid Data 1.1, and WebLogic Server and Express 5.1 through 7.0, allow remote attackers to execute arbitrary web script and steal authentication credentials via (1) a forward instruction to the Servlet container or (2) other vulnerabilities in the WebLogic Server console application." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-15T16:36:24", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "8357", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/8357" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/SA_BEA03_36.00.jsp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0733", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in WebLogic Integration 7.0 and 2.0, Liquid Data 1.1, and WebLogic Server and Express 5.1 through 7.0, allow remote attackers to execute arbitrary web script and steal authentication credentials via (1) a forward instruction to the Servlet container or (2) other vulnerabilities in the WebLogic Server console application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "8357", "refsource": "BID", "url": "http://www.securityfocus.com/bid/8357" }, { "name": "http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/SA_BEA03_36.00.jsp", "refsource": "CONFIRM", "url": "http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/SA_BEA03_36.00.jsp" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0733", "datePublished": "2003-09-04T04:00:00", "dateReserved": "2003-09-03T00:00:00", "dateUpdated": "2024-08-08T02:05:12.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-5576 (GCVE-0-2007-5576)
Vulnerability from cvelistv5
Published
2007-10-18 21:00
Modified
2024-08-07 15:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
BEA Tuxedo 8.0 before RP392 and 8.1 before RP293, and WebLogic Enterprise 5.1 before RP174, echo the password in cleartext, which allows physically proximate attackers to obtain sensitive information via the (1) cnsbind, (2) cnsunbind, or (3) cnsls commands.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:39:13.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "45478", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/45478" }, { "name": "weblogic-tuxedo-information-disclosure(34290)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34290" }, { "name": "BEA07-158.00", "tags": [ "vendor-advisory", "x_refsource_BEA", "x_transferred" ], "url": "http://dev2dev.bea.com/pub/advisory/226" }, { "name": "ADV-2007-1813", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1813" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-14T00:00:00", "descriptions": [ { "lang": "en", "value": "BEA Tuxedo 8.0 before RP392 and 8.1 before RP293, and WebLogic Enterprise 5.1 before RP174, echo the password in cleartext, which allows physically proximate attackers to obtain sensitive information via the (1) cnsbind, (2) cnsunbind, or (3) cnsls commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "45478", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/45478" }, { "name": "weblogic-tuxedo-information-disclosure(34290)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34290" }, { "name": "BEA07-158.00", "tags": [ "vendor-advisory", "x_refsource_BEA" ], "url": "http://dev2dev.bea.com/pub/advisory/226" }, { "name": "ADV-2007-1813", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1813" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5576", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "BEA Tuxedo 8.0 before RP392 and 8.1 before RP293, and WebLogic Enterprise 5.1 before RP174, echo the password in cleartext, which allows physically proximate attackers to obtain sensitive information via the (1) cnsbind, (2) cnsunbind, or (3) cnsls commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "45478", "refsource": "OSVDB", "url": "http://osvdb.org/45478" }, { "name": "weblogic-tuxedo-information-disclosure(34290)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34290" }, { "name": "BEA07-158.00", "refsource": "BEA", "url": "http://dev2dev.bea.com/pub/advisory/226" }, { "name": "ADV-2007-1813", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1813" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5576", "datePublished": "2007-10-18T21:00:00", "dateReserved": "2007-10-18T00:00:00", "dateUpdated": "2024-08-07T15:39:13.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }