Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2007-5576

Опубликовано: 18 окт. 2007
Источник: nvd
CVSS2: 6.8
EPSS Низкий

Описание

BEA Tuxedo 8.0 before RP392 and 8.1 before RP293, and WebLogic Enterprise 5.1 before RP174, echo the password in cleartext, which allows physically proximate attackers to obtain sensitive information via the (1) cnsbind, (2) cnsunbind, or (3) cnsls commands.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:bea:tuxedo:8.0:*:*:*:*:*:*:*
cpe:2.3:a:bea:tuxedo:8.1:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_integration:8.1:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_integration:8.1:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_integration:8.1:sp3:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_integration:8.1:sp4:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_integration:8.1:sp5:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_integration:8.1:sp6:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_integration:9.2:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:*:enterprise:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:*:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp1:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp2:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp3:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp4:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp5:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp6:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp7:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp5:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp6:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp7:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp7:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp3:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp4:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp5:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.1:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.1:*:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.2:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.2:*:express:*:*:*:*:*
cpe:2.3:a:bea:weblogic_workshop:8.1:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_workshop:8.1:sp3:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_workshop:8.1:sp4:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_workshop:8.1:sp5:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_workshop:8.1:sp6:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_portal:9.2:*:*:*:*:*:*:*

EPSS

Процентиль: 69%
0.00602
Низкий

6.8 Medium

CVSS2

Дефекты

CWE-200

Связанные уязвимости

github
почти 4 года назад

BEA Tuxedo 8.0 before RP392 and 8.1 before RP293, and WebLogic Enterprise 5.1 before RP174, echo the password in cleartext, which allows physically proximate attackers to obtain sensitive information via the (1) cnsbind, (2) cnsunbind, or (3) cnsls commands.

EPSS

Процентиль: 69%
0.00602
Низкий

6.8 Medium

CVSS2

Дефекты

CWE-200