Show plain JSON{"id": "CVE-2007-0417", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": true, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2007-01-23T00:28:00.000", "references": [{"url": "http://dev2dev.bea.com/pub/advisory/211", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://osvdb.org/38511", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/23750", "source": "cve@mitre.org"}, {"url": "http://securitytracker.com/id?1017525", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/22082", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2007/0213", "source": "cve@mitre.org"}, {"url": "http://dev2dev.bea.com/pub/advisory/211", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/38511", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/23750", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securitytracker.com/id?1017525", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/22082", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2007/0213", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "BEA WebLogic Server 7.0 through 7.0 SP7, 8.1 through 8.1 SP5, 9.0, and 9.1, when using the WebLogic Server 6.1 compatibility realm, allows attackers to execute certain EJB container persistence operations with an administrative identity."}, {"lang": "es", "value": "BEA WebLogic Server 7.0 hasta 7.0 SP7, 8.1 hasta 8.1 SP5, 9.0, y 9.1, cuando se usa el dominio de compatibilidad con WebLogic Server 6.1, permite a los atacantes ejecutar determinadas operaciones de persistencia de contenedores EJB con una identidad administrativa."}], "lastModified": "2024-11-21T00:25:48.780", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bea:weblogic_server:*:sp7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69F01ECA-151B-4C6E-A202-6EE6DF9B609B", "versionEndIncluding": "7.0"}, {"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9C5AFCF-79D8-4005-B800-B0C6BD461276"}, {"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E08D4CEA-9ACC-4869-BC87-3524A059914F"}, {"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A489A8E-D3AE-42DF-8DCF-5A9EF10778FA"}, {"criteria": "cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CA97F1A-49F7-4511-8959-D62155491DF5"}, {"criteria": "cpe:2.3:a:bea:weblogic_server:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCAAE8F1-CB25-4871-BE48-ABF7DFAD8AD6"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}