Vulnerability Details : CVE-2004-0652
BEA WebLogic Server and WebLogic Express 7.0 through 7.0 Service Pack 4, and 8.1 through 8.1 Service Pack 2, allows attackers to obtain the username and password for booting the server by directly accessing certain internal methods.
Exploit prediction scoring system (EPSS) score for CVE-2004-0652
Probability of exploitation activity in the next 30 days: 0.08%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 33 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-0652
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
[email protected] |
References for CVE-2004-0652
-
http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_55.00.jsp
-
http://www.kb.cert.org/vuls/id/352110
Patch;Third Party Advisory;US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/15865
-
http://securitytracker.com/id?1009766
-
http://www.securityfocus.com/bid/10133
Patch;Vendor Advisory
Products affected by CVE-2004-0652
- cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp3:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp1:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp2:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp4:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:*:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:*:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp1:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp2:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*