René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

102 lines
2.7 KiB
JSON

{
"id": "CVE-2000-0684",
"sourceIdentifier": "cve@mitre.org",
"published": "2000-10-20T04:00:00.000",
"lastModified": "2008-09-10T19:05:37.103",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "BEA WebLogic 5.1.x does not properly restrict access to the JSPServlet, which could allow remote attackers to compile and execute Java JSP code by directly invoking the servlet on any source file."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:3.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "742DCC2D-B4AD-4D16-8338-21E258C4FD17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6E3A5C91-82C4-40B6-B8F2-C083AEF76723"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "76738B84-33DD-450B-90A2-B22B77D52857"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0434.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://developer.bea.com/alerts/security_000731.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/1525",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
}
]
}