fkie_cve-2008-2579
Vulnerability from fkie_nvd
Published
2008-07-15 23:41
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors.
References
cve@mitre.orghttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143Broken Link
cve@mitre.orghttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143Broken Link
cve@mitre.orghttp://jvn.jp/en/jp/JVN81667751/index.htmlThird Party Advisory
cve@mitre.orghttp://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000040.htmlThird Party Advisory, VDB Entry
cve@mitre.orghttp://secunia.com/advisories/31087Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/31113Third Party Advisory
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/cpujul2008-090335.htmlBroken Link
cve@mitre.orghttp://www.securitytracker.com/id?1020498Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2109/referencesThird Party Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2115Third Party Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/43823Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143Broken Link
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143Broken Link
af854a3a-2127-422b-91ae-364da2661108http://jvn.jp/en/jp/JVN81667751/index.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000040.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31087Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31113Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020498Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2109/referencesThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2115Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/43823Third Party Advisory, VDB Entry
Impacted products
Vendor Product Version
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 9.0
oracle weblogic_server 9.0
oracle weblogic_server 9.0
oracle weblogic_server 9.0
oracle weblogic_server 9.0
oracle weblogic_server 9.0
oracle weblogic_server 9.1
oracle weblogic_server 9.1
oracle weblogic_server 9.1
oracle weblogic_server 9.1
oracle weblogic_server 9.1
oracle weblogic_server 9.1
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 10.0
oracle weblogic_server 10.0
oracle weblogic_server 10.0
oracle weblogic_server 10.0
oracle weblogic_server 10.0
oracle weblogic_server 10.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:-:*:*:*:apache:*:*",
              "matchCriteriaId": "E43B18F0-47F0-4C52-84A9-E16412AA11EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:-:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "BB1EAE5D-3785-4E81-938A-F958FDFC84EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:-:*:*:*:sun:*:*",
              "matchCriteriaId": "ECF910A3-E34D-47BC-A3F8-08A217D58C8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp1:*:*:*:apache:*:*",
              "matchCriteriaId": "572464F2-BA8E-4959-8A7D-D28A236EECE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp1:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "5F252F84-01FE-4888-B53A-BFA6CAB26216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp1:*:*:*:sun:*:*",
              "matchCriteriaId": "D1146945-531E-4580-8053-24BC56BE1373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp2:*:*:*:apache:*:*",
              "matchCriteriaId": "90DDCE84-39A0-4803-9CE0-40DF773C0662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp2:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "EA030DC7-EF2A-4B79-ADB8-512B9CE8EF77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp2:*:*:*:sun:*:*",
              "matchCriteriaId": "21FBA4F6-EA8E-4F8A-A302-AB72071FD800",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp3:*:*:*:apache:*:*",
              "matchCriteriaId": "E8A8FA50-834E-456D-8C98-EE3E9C10A0E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp3:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "1932701E-91D9-4CD4-B638-F08E2C31249A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp3:*:*:*:sun:*:*",
              "matchCriteriaId": "0AB6AA30-6FEE-404B-AB02-86761D8292E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp4:*:*:*:apache:*:*",
              "matchCriteriaId": "0546FC1E-398A-472B-9BCA-66E25C1609D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp4:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "4EA30379-D3CB-4855-B173-0D66F1A8DECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp4:*:*:*:sun:*:*",
              "matchCriteriaId": "53F70A3E-F0CF-4E5F-BD0C-A2FCCD445751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp5:*:*:*:apache:*:*",
              "matchCriteriaId": "7056642D-2BB6-46AA-811B-C1E13664D75A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp5:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "90B880DB-DF75-4288-B851-3D89CA878B0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp5:*:*:*:sun:*:*",
              "matchCriteriaId": "BCC2A90C-0047-4B59-AF08-3BBA59AC9E7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp6:*:*:*:apache:*:*",
              "matchCriteriaId": "B1D6291B-8E48-4BCB-8A07-C3F5412C7428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp6:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "DD552EC5-347B-4531-8EEA-E59437EEA31F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp6:*:*:*:sun:*:*",
              "matchCriteriaId": "C9D10658-03C8-4851-8704-175BBB7311EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp7:*:*:*:apache:*:*",
              "matchCriteriaId": "D830D8DD-1961-4253-8D46-799323AEB6A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp7:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "C904ADAB-F88B-43F8-BB27-4C9C0F6B2852",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp7:*:*:*:sun:*:*",
              "matchCriteriaId": "A6E954B4-BE8D-4D01-A8CF-C41B7323B64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:-:*:*:*:apache:*:*",
              "matchCriteriaId": "53D5FE9F-2257-45F0-A4DA-A5353EDC41B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:-:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "8D21D045-53F9-4C82-9E41-DF57E0501E7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:-:*:*:*:sun:*:*",
              "matchCriteriaId": "E6CE412C-27FE-46E7-A031-29E3CCE56F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp1:*:*:*:apache:*:*",
              "matchCriteriaId": "F5D08F2B-0F07-4F47-B42E-B32CC08B41FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp1:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "FA064E05-4837-4889-BD06-1EB1DB2BF41C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp1:*:*:*:sun:*:*",
              "matchCriteriaId": "632C8D94-5C82-4811-A6DA-DC81C23A8933",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp2:*:*:*:apache:*:*",
              "matchCriteriaId": "6178B9BA-90B6-4125-A4D0-D61163964906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp2:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "FB4C2A78-CEF7-42A8-B14E-61A54D3CAECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp2:*:*:*:sun:*:*",
              "matchCriteriaId": "D3E58951-01C8-4A15-A115-E640DC6CD6BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp3:*:*:*:apache:*:*",
              "matchCriteriaId": "DD9F4E94-5232-449E-B27E-5654FEB6B0ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp3:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "A6E7775D-2A02-40EF-A94D-1C8316D7116B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp3:*:*:*:sun:*:*",
              "matchCriteriaId": "2DE7CBE2-37F1-4250-8ACF-6E7A1E29D2A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp4:*:*:*:apache:*:*",
              "matchCriteriaId": "2A3E3090-12B7-49F1-B33E-18F1CA875DDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp4:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "1F430843-4C31-4CF9-B5F8-C4D2B61B2981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp4:*:*:*:sun:*:*",
              "matchCriteriaId": "5DFC1E55-880C-481D-A4E0-24CFB6E7CC1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp5:*:*:*:apache:*:*",
              "matchCriteriaId": "87FAECDC-4B58-405D-AEF3-F7CD6706D07A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp5:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "366A3C71-505F-49E3-8B06-D2E3DC8ED458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp5:*:*:*:sun:*:*",
              "matchCriteriaId": "87646B76-6B7B-410E-8049-3492111CB52F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp6:*:*:*:apache:*:*",
              "matchCriteriaId": "00946481-536A-4202-8CAA-C36A234F1BC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp6:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "AD51247A-3D9C-41F0-A339-BAFA12A6D9D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp6:*:*:*:sun:*:*",
              "matchCriteriaId": "1239B3C8-657D-4E53-810E-69CCC42D3A22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp7:*:*:*:apache:*:*",
              "matchCriteriaId": "8E20FCB4-CFCD-4323-9455-B3EB781FEF42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp7:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "8776D7B7-64C7-46AC-B966-30468DA2501A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp7:*:*:*:sun:*:*",
              "matchCriteriaId": "F4B3C431-7242-4F5E-969D-F5F0DA0A8F14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:-:*:*:*:apache:*:*",
              "matchCriteriaId": "71F17F89-E92B-4D9C-B716-7763BDB212C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:-:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "DEE183EF-7FDA-4A6C-9383-B146367B667F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:-:*:*:*:sun:*:*",
              "matchCriteriaId": "AAFB9DFF-D096-4627-9DCA-1A5F67D44BA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp1:*:*:*:apache:*:*",
              "matchCriteriaId": "238D1D0F-E1F0-49DA-9109-98DAEF9B7BBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp1:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "2E8DAAE1-DEB0-4121-BE3C-A1AE6CC05915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp1:*:*:*:sun:*:*",
              "matchCriteriaId": "3D369B05-EB1C-45F7-BB27-B7FEE20E62A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp2:*:*:*:apache:*:*",
              "matchCriteriaId": "0F79DAE8-413F-4287-BF51-680CB47F5E13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp2:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "C2ABE1D8-7BAE-4B30-9B51-AEF2878F09C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp2:*:*:*:sun:*:*",
              "matchCriteriaId": "1BF0B362-C5A6-41A6-B333-7835DEBD71A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp3:*:*:*:apache:*:*",
              "matchCriteriaId": "39F54918-9C4D-40EF-A23E-47761DA374A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp3:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "175DD532-2221-4FF7-8B87-89F01B5D91E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp3:*:*:*:sun:*:*",
              "matchCriteriaId": "2DB01146-81F5-45D1-9590-E37C4216618F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp4:*:*:*:apache:*:*",
              "matchCriteriaId": "065415C0-1C0E-49D3-8F00-0BC703BE2F62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp4:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "62E605DA-64A4-43B3-A9CC-8AB60636AFF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp4:*:*:*:sun:*:*",
              "matchCriteriaId": "D38D058D-0BBF-41FC-8BA7-6B318E0D9FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp5:*:*:*:apache:*:*",
              "matchCriteriaId": "F658C32E-C751-4D6E-ACB0-015B65B31BDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp5:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "F72742DD-2682-4E7F-9A01-E93EF2C70F6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp5:*:*:*:sun:*:*",
              "matchCriteriaId": "E57BC804-B660-4165-8CD8-727254869133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp6:*:*:*:apache:*:*",
              "matchCriteriaId": "6513014C-7DE6-4D28-852C-787A8E9CF970",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp6:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "D8892EFD-2EB8-4FA5-84E1-447D47D608FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp6:*:*:*:sun:*:*",
              "matchCriteriaId": "92808D75-AE0B-44A2-BC26-17B7BCBBA06D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.0:-:*:*:*:apache:*:*",
              "matchCriteriaId": "675BDBAC-1956-493E-B493-BB6C098DA65E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.0:-:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "875D5372-2807-42B2-8688-9160794E897E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.0:-:*:*:*:sun:*:*",
              "matchCriteriaId": "1328142F-E9B8-4D44-B4F1-4CBC2FCB5504",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.0:maintenance_pack3:*:*:*:apache:*:*",
              "matchCriteriaId": "AA0C1AEE-124D-41C9-815B-BCE5FA0B146C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.0:maintenance_pack3:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "307716C2-D09B-4B43-9435-A62106909ACD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.0:maintenance_pack3:*:*:*:sun:*:*",
              "matchCriteriaId": "D4106FD7-CEB0-41E2-9A32-850C11F3A39C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.1:-:*:*:*:apache:*:*",
              "matchCriteriaId": "CF3915B8-1D82-4306-A7D4-0C72D04C653B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.1:-:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "D9F541C4-3A4B-4647-81A1-9BD6E106A0EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.1:-:*:*:*:sun:*:*",
              "matchCriteriaId": "9137FA52-1E72-495A-9440-05F4BA71CB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.1:maintenance_pack3:*:*:*:apache:*:*",
              "matchCriteriaId": "E3A83D20-89F3-4D9C-9D21-E5A2FDBA248D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.1:maintenance_pack3:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "D6B43644-C1D5-44AC-B6BF-9935EBC604C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.1:maintenance_pack3:*:*:*:sun:*:*",
              "matchCriteriaId": "247B2940-F6BC-417C-9D5A-46E0202900AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:-:*:*:*:apache:*:*",
              "matchCriteriaId": "12D35456-F34C-49C3-86BB-C58D5F7C0616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:-:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "64A48C05-80EC-4103-8904-855A8EA3FE46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:-:*:*:*:sun:*:*",
              "matchCriteriaId": "7F19C69B-64D3-4BF1-A5B0-4C42E00369FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack1:*:*:*:apache:*:*",
              "matchCriteriaId": "C3E8FEAE-8F5D-417E-87CA-A56D05C08846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack1:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "07CB3132-5711-48C5-9528-FE020F2C4E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack1:*:*:*:sun:*:*",
              "matchCriteriaId": "C2282A0E-2083-4676-8394-918011E047B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack2:*:*:*:apache:*:*",
              "matchCriteriaId": "E40165F2-3278-4943-AE51-5699653BFDD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack2:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "D022F5CD-9942-41AF-98A6-1EACFB83B760",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack2:*:*:*:sun:*:*",
              "matchCriteriaId": "22C9B7EA-1EA6-4FC9-82B1-75C03579001E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack3:*:*:*:apache:*:*",
              "matchCriteriaId": "D008650F-05BF-435E-AC81-E42D38AD442E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack3:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "6EA45D27-74DD-49BC-B574-B77F3186713B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack3:*:*:*:sun:*:*",
              "matchCriteriaId": "1512C1C3-17BF-4BA5-A8FD-A3E469FB1A06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:10.0:-:*:*:*:apache:*:*",
              "matchCriteriaId": "D20F2359-2408-4517-AE0E-2CC9604C8F86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:10.0:-:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "35E44B52-683E-4242-8FFC-C28448CE8ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:10.0:-:*:*:*:sun:*:*",
              "matchCriteriaId": "C4419213-8283-4C97-BEA5-793475FD03BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:10.0:maintenance_pack1:*:*:*:apache:*:*",
              "matchCriteriaId": "A33CB38D-6A2B-477A-B22B-6DE2BE96FB75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:10.0:maintenance_pack1:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "A843E056-9160-4834-A5C5-A812EF0CB628",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:10.0:maintenance_pack1:*:*:*:sun:*:*",
              "matchCriteriaId": "19C2ED85-0A82-41B2-A9B5-BCD35DD5EE97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en el componente WebLogic Server Plugins para Apache, servidores web Sun e IIS en BEA Product Suite de Oracle versiones 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7 y 6.1 SP7, presenta un impacto desconocido y vectores de ataque remotos."
    }
  ],
  "id": "CVE-2008-2579",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-07-15T23:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN81667751/index.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000040.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31087"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31113"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1020498"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2109/references"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2115"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43823"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN81667751/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000040.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31087"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1020498"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2109/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2115"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43823"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…