102 lines
2.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2000-0685",
"sourceIdentifier": "cve@mitre.org",
"published": "2000-10-20T04:00:00.000",
"lastModified": "2008-09-10T19:05:37.180",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "BEA WebLogic 5.1.x does not properly restrict access to the PageCompileServlet, which could allow remote attackers to compile and execute Java JHTML code by directly invoking the servlet on any source file."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:3.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "742DCC2D-B4AD-4D16-8338-21E258C4FD17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6E3A5C91-82C4-40B6-B8F2-C083AEF76723"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "76738B84-33DD-450B-90A2-B22B77D52857"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0434.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://developer.bea.com/alerts/security_000731.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/1525",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
}
]
}