1.2 CVE-2005-4761

Patch
 

BEA WebLogic Server e WebLogic Express 8.1 SP4 e anterior, 7.0 SP5 e anterior e 6.1 SP7 e anterior registram a linha de comando Java na inicialização do servidor, que pode incluir informações confidenciais (senhas ou frases-chave) no arquivo de log do servidor quando a opção -D é usado.
https://nvd.nist.gov/vuln/detail/CVE-2005-4761

Categorias

CWE-NVD-Other

Referências

BEA Patch

BEA05-98.00
Patch Vendor Advisory

BID Patch

15052
Patch

SECUNIA Patch

17138
Patch Vendor Advisory


 

CPE

cpe começar fim
Configuration 1
cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:*:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:*:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp1:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp1:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp2:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp2:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp3:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp3:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp4:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp4:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp5:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp5:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp6:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp6:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp7:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp7:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp7:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:*:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp1:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp2:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp3:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp4:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp5:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp5:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:*:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp1:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp2:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp3:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp3:win32:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp4:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp4:win32:*:*:*:*:*


REMEDIAÇÃO


Patch

Url
BEA05-98.00
15052
17138


EXPLOITS


Exploit-db.com

id descrição datado
Nenhum exploit conhecido

Outros (github, ...)

Url
Nenhum exploit conhecido


CAPEC


Common Attack Pattern Enumerations and Classifications

id descrição gravidade
Entrada proibida


MITRE