FKIE_CVE-2008-2579

Vulnerability from fkie_nvd - Published: 2008-07-15 23:41 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors.
References
cve@mitre.orghttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143Broken Link
cve@mitre.orghttp://jvn.jp/en/jp/JVN81667751/index.htmlThird Party Advisory
cve@mitre.orghttp://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000040.htmlThird Party Advisory, VDB Entry
cve@mitre.orghttp://secunia.com/advisories/31087Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/31113Third Party Advisory
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/cpujul2008-090335.htmlBroken Link
cve@mitre.orghttp://www.securitytracker.com/id?1020498Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2109/referencesThird Party Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2115Third Party Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/43823Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143Broken Link
af854a3a-2127-422b-91ae-364da2661108http://jvn.jp/en/jp/JVN81667751/index.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000040.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31087Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31113Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020498Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2109/referencesThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2115Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/43823Third Party Advisory, VDB Entry
Impacted products
Vendor Product Version
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 6.1
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 7.0
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 8.1
oracle weblogic_server 9.0
oracle weblogic_server 9.0
oracle weblogic_server 9.0
oracle weblogic_server 9.0
oracle weblogic_server 9.0
oracle weblogic_server 9.0
oracle weblogic_server 9.1
oracle weblogic_server 9.1
oracle weblogic_server 9.1
oracle weblogic_server 9.1
oracle weblogic_server 9.1
oracle weblogic_server 9.1
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 9.2
oracle weblogic_server 10.0
oracle weblogic_server 10.0
oracle weblogic_server 10.0
oracle weblogic_server 10.0
oracle weblogic_server 10.0
oracle weblogic_server 10.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:-:*:*:*:apache:*:*",
              "matchCriteriaId": "E43B18F0-47F0-4C52-84A9-E16412AA11EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:-:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "BB1EAE5D-3785-4E81-938A-F958FDFC84EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:-:*:*:*:sun:*:*",
              "matchCriteriaId": "ECF910A3-E34D-47BC-A3F8-08A217D58C8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp1:*:*:*:apache:*:*",
              "matchCriteriaId": "572464F2-BA8E-4959-8A7D-D28A236EECE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp1:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "5F252F84-01FE-4888-B53A-BFA6CAB26216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp1:*:*:*:sun:*:*",
              "matchCriteriaId": "D1146945-531E-4580-8053-24BC56BE1373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp2:*:*:*:apache:*:*",
              "matchCriteriaId": "90DDCE84-39A0-4803-9CE0-40DF773C0662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp2:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "EA030DC7-EF2A-4B79-ADB8-512B9CE8EF77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp2:*:*:*:sun:*:*",
              "matchCriteriaId": "21FBA4F6-EA8E-4F8A-A302-AB72071FD800",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp3:*:*:*:apache:*:*",
              "matchCriteriaId": "E8A8FA50-834E-456D-8C98-EE3E9C10A0E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp3:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "1932701E-91D9-4CD4-B638-F08E2C31249A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp3:*:*:*:sun:*:*",
              "matchCriteriaId": "0AB6AA30-6FEE-404B-AB02-86761D8292E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp4:*:*:*:apache:*:*",
              "matchCriteriaId": "0546FC1E-398A-472B-9BCA-66E25C1609D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp4:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "4EA30379-D3CB-4855-B173-0D66F1A8DECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp4:*:*:*:sun:*:*",
              "matchCriteriaId": "53F70A3E-F0CF-4E5F-BD0C-A2FCCD445751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp5:*:*:*:apache:*:*",
              "matchCriteriaId": "7056642D-2BB6-46AA-811B-C1E13664D75A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp5:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "90B880DB-DF75-4288-B851-3D89CA878B0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp5:*:*:*:sun:*:*",
              "matchCriteriaId": "BCC2A90C-0047-4B59-AF08-3BBA59AC9E7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp6:*:*:*:apache:*:*",
              "matchCriteriaId": "B1D6291B-8E48-4BCB-8A07-C3F5412C7428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp6:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "DD552EC5-347B-4531-8EEA-E59437EEA31F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp6:*:*:*:sun:*:*",
              "matchCriteriaId": "C9D10658-03C8-4851-8704-175BBB7311EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp7:*:*:*:apache:*:*",
              "matchCriteriaId": "D830D8DD-1961-4253-8D46-799323AEB6A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp7:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "C904ADAB-F88B-43F8-BB27-4C9C0F6B2852",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:6.1:sp7:*:*:*:sun:*:*",
              "matchCriteriaId": "A6E954B4-BE8D-4D01-A8CF-C41B7323B64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:-:*:*:*:apache:*:*",
              "matchCriteriaId": "53D5FE9F-2257-45F0-A4DA-A5353EDC41B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:-:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "8D21D045-53F9-4C82-9E41-DF57E0501E7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:-:*:*:*:sun:*:*",
              "matchCriteriaId": "E6CE412C-27FE-46E7-A031-29E3CCE56F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp1:*:*:*:apache:*:*",
              "matchCriteriaId": "F5D08F2B-0F07-4F47-B42E-B32CC08B41FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp1:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "FA064E05-4837-4889-BD06-1EB1DB2BF41C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp1:*:*:*:sun:*:*",
              "matchCriteriaId": "632C8D94-5C82-4811-A6DA-DC81C23A8933",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp2:*:*:*:apache:*:*",
              "matchCriteriaId": "6178B9BA-90B6-4125-A4D0-D61163964906",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp2:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "FB4C2A78-CEF7-42A8-B14E-61A54D3CAECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp2:*:*:*:sun:*:*",
              "matchCriteriaId": "D3E58951-01C8-4A15-A115-E640DC6CD6BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp3:*:*:*:apache:*:*",
              "matchCriteriaId": "DD9F4E94-5232-449E-B27E-5654FEB6B0ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp3:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "A6E7775D-2A02-40EF-A94D-1C8316D7116B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp3:*:*:*:sun:*:*",
              "matchCriteriaId": "2DE7CBE2-37F1-4250-8ACF-6E7A1E29D2A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp4:*:*:*:apache:*:*",
              "matchCriteriaId": "2A3E3090-12B7-49F1-B33E-18F1CA875DDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp4:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "1F430843-4C31-4CF9-B5F8-C4D2B61B2981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp4:*:*:*:sun:*:*",
              "matchCriteriaId": "5DFC1E55-880C-481D-A4E0-24CFB6E7CC1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp5:*:*:*:apache:*:*",
              "matchCriteriaId": "87FAECDC-4B58-405D-AEF3-F7CD6706D07A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp5:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "366A3C71-505F-49E3-8B06-D2E3DC8ED458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp5:*:*:*:sun:*:*",
              "matchCriteriaId": "87646B76-6B7B-410E-8049-3492111CB52F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp6:*:*:*:apache:*:*",
              "matchCriteriaId": "00946481-536A-4202-8CAA-C36A234F1BC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp6:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "AD51247A-3D9C-41F0-A339-BAFA12A6D9D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp6:*:*:*:sun:*:*",
              "matchCriteriaId": "1239B3C8-657D-4E53-810E-69CCC42D3A22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp7:*:*:*:apache:*:*",
              "matchCriteriaId": "8E20FCB4-CFCD-4323-9455-B3EB781FEF42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp7:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "8776D7B7-64C7-46AC-B966-30468DA2501A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:7.0:sp7:*:*:*:sun:*:*",
              "matchCriteriaId": "F4B3C431-7242-4F5E-969D-F5F0DA0A8F14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:-:*:*:*:apache:*:*",
              "matchCriteriaId": "71F17F89-E92B-4D9C-B716-7763BDB212C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:-:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "DEE183EF-7FDA-4A6C-9383-B146367B667F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:-:*:*:*:sun:*:*",
              "matchCriteriaId": "AAFB9DFF-D096-4627-9DCA-1A5F67D44BA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp1:*:*:*:apache:*:*",
              "matchCriteriaId": "238D1D0F-E1F0-49DA-9109-98DAEF9B7BBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp1:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "2E8DAAE1-DEB0-4121-BE3C-A1AE6CC05915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp1:*:*:*:sun:*:*",
              "matchCriteriaId": "3D369B05-EB1C-45F7-BB27-B7FEE20E62A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp2:*:*:*:apache:*:*",
              "matchCriteriaId": "0F79DAE8-413F-4287-BF51-680CB47F5E13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp2:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "C2ABE1D8-7BAE-4B30-9B51-AEF2878F09C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp2:*:*:*:sun:*:*",
              "matchCriteriaId": "1BF0B362-C5A6-41A6-B333-7835DEBD71A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp3:*:*:*:apache:*:*",
              "matchCriteriaId": "39F54918-9C4D-40EF-A23E-47761DA374A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp3:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "175DD532-2221-4FF7-8B87-89F01B5D91E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp3:*:*:*:sun:*:*",
              "matchCriteriaId": "2DB01146-81F5-45D1-9590-E37C4216618F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp4:*:*:*:apache:*:*",
              "matchCriteriaId": "065415C0-1C0E-49D3-8F00-0BC703BE2F62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp4:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "62E605DA-64A4-43B3-A9CC-8AB60636AFF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp4:*:*:*:sun:*:*",
              "matchCriteriaId": "D38D058D-0BBF-41FC-8BA7-6B318E0D9FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp5:*:*:*:apache:*:*",
              "matchCriteriaId": "F658C32E-C751-4D6E-ACB0-015B65B31BDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp5:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "F72742DD-2682-4E7F-9A01-E93EF2C70F6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp5:*:*:*:sun:*:*",
              "matchCriteriaId": "E57BC804-B660-4165-8CD8-727254869133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp6:*:*:*:apache:*:*",
              "matchCriteriaId": "6513014C-7DE6-4D28-852C-787A8E9CF970",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp6:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "D8892EFD-2EB8-4FA5-84E1-447D47D608FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:8.1:sp6:*:*:*:sun:*:*",
              "matchCriteriaId": "92808D75-AE0B-44A2-BC26-17B7BCBBA06D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.0:-:*:*:*:apache:*:*",
              "matchCriteriaId": "675BDBAC-1956-493E-B493-BB6C098DA65E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.0:-:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "875D5372-2807-42B2-8688-9160794E897E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.0:-:*:*:*:sun:*:*",
              "matchCriteriaId": "1328142F-E9B8-4D44-B4F1-4CBC2FCB5504",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.0:maintenance_pack3:*:*:*:apache:*:*",
              "matchCriteriaId": "AA0C1AEE-124D-41C9-815B-BCE5FA0B146C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.0:maintenance_pack3:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "307716C2-D09B-4B43-9435-A62106909ACD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.0:maintenance_pack3:*:*:*:sun:*:*",
              "matchCriteriaId": "D4106FD7-CEB0-41E2-9A32-850C11F3A39C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.1:-:*:*:*:apache:*:*",
              "matchCriteriaId": "CF3915B8-1D82-4306-A7D4-0C72D04C653B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.1:-:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "D9F541C4-3A4B-4647-81A1-9BD6E106A0EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.1:-:*:*:*:sun:*:*",
              "matchCriteriaId": "9137FA52-1E72-495A-9440-05F4BA71CB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.1:maintenance_pack3:*:*:*:apache:*:*",
              "matchCriteriaId": "E3A83D20-89F3-4D9C-9D21-E5A2FDBA248D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.1:maintenance_pack3:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "D6B43644-C1D5-44AC-B6BF-9935EBC604C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.1:maintenance_pack3:*:*:*:sun:*:*",
              "matchCriteriaId": "247B2940-F6BC-417C-9D5A-46E0202900AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:-:*:*:*:apache:*:*",
              "matchCriteriaId": "12D35456-F34C-49C3-86BB-C58D5F7C0616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:-:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "64A48C05-80EC-4103-8904-855A8EA3FE46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:-:*:*:*:sun:*:*",
              "matchCriteriaId": "7F19C69B-64D3-4BF1-A5B0-4C42E00369FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack1:*:*:*:apache:*:*",
              "matchCriteriaId": "C3E8FEAE-8F5D-417E-87CA-A56D05C08846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack1:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "07CB3132-5711-48C5-9528-FE020F2C4E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack1:*:*:*:sun:*:*",
              "matchCriteriaId": "C2282A0E-2083-4676-8394-918011E047B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack2:*:*:*:apache:*:*",
              "matchCriteriaId": "E40165F2-3278-4943-AE51-5699653BFDD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack2:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "D022F5CD-9942-41AF-98A6-1EACFB83B760",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack2:*:*:*:sun:*:*",
              "matchCriteriaId": "22C9B7EA-1EA6-4FC9-82B1-75C03579001E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack3:*:*:*:apache:*:*",
              "matchCriteriaId": "D008650F-05BF-435E-AC81-E42D38AD442E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack3:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "6EA45D27-74DD-49BC-B574-B77F3186713B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack3:*:*:*:sun:*:*",
              "matchCriteriaId": "1512C1C3-17BF-4BA5-A8FD-A3E469FB1A06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:10.0:-:*:*:*:apache:*:*",
              "matchCriteriaId": "D20F2359-2408-4517-AE0E-2CC9604C8F86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:10.0:-:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "35E44B52-683E-4242-8FFC-C28448CE8ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:10.0:-:*:*:*:sun:*:*",
              "matchCriteriaId": "C4419213-8283-4C97-BEA5-793475FD03BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:10.0:maintenance_pack1:*:*:*:apache:*:*",
              "matchCriteriaId": "A33CB38D-6A2B-477A-B22B-6DE2BE96FB75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:10.0:maintenance_pack1:*:*:*:internet_information_services:*:*",
              "matchCriteriaId": "A843E056-9160-4834-A5C5-A812EF0CB628",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:weblogic_server:10.0:maintenance_pack1:*:*:*:sun:*:*",
              "matchCriteriaId": "19C2ED85-0A82-41B2-A9B5-BCD35DD5EE97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en el componente WebLogic Server Plugins para Apache, servidores web Sun e IIS en BEA Product Suite de Oracle versiones 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7 y 6.1 SP7, presenta un impacto desconocido y vectores de ataque remotos."
    }
  ],
  "id": "CVE-2008-2579",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-07-15T23:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN81667751/index.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000040.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31087"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31113"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1020498"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2109/references"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2115"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43823"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN81667751/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000040.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31087"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1020498"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2109/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2115"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43823"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…