BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, and 7.0 SP6 and earlier, in certain "heavy usage" scenarios, report incorrect severity levels for an audit event, which might allow attackers to perform unauthorized actions and avoid detection.
References
Link | Resource |
---|---|
http://dev2dev.bea.com/pub/advisory/143 | Patch Vendor Advisory |
http://secunia.com/advisories/17138 | Third Party Advisory |
http://www.securityfocus.com/bid/15052 | Third Party Advisory VDB Entry |
http://dev2dev.bea.com/pub/advisory/143 | Patch Vendor Advisory |
http://secunia.com/advisories/17138 | Third Party Advisory |
http://www.securityfocus.com/bid/15052 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://dev2dev.bea.com/pub/advisory/143 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/17138 - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/15052 - Third Party Advisory, VDB Entry |
Information
Published : 2005-12-31 05:00
Updated : 2024-11-21 00:05
NVD link : CVE-2005-4753
Mitre link : CVE-2005-4753
CVE.ORG link : CVE-2005-4753
JSON object : View
Products Affected
bea
- weblogic_server
CWE