ID CVE-2006-0419
Type cve
Reporter cve@mitre.org
Modified 2008-09-05T20:59:00
Description
BEA WebLogic Server and WebLogic Express 9.0, 8.1 through SP5, and 7.0 through SP6 allows anonymous binds to the embedded LDAP server, which allows remote attackers to read user entries or cause a denial of service (unspecified) via a large number of connections.
{"id": "CVE-2006-0419", "bulletinFamily": "NVD", "title": "CVE-2006-0419", "description": "BEA WebLogic Server and WebLogic Express 9.0, 8.1 through SP5, and 7.0 through SP6 allows anonymous binds to the embedded LDAP server, which allows remote attackers to read user entries or cause a denial of service (unspecified) via a large number of connections.", "published": "2006-01-25T23:07:00", "modified": "2008-09-05T20:59:00", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0419", "reporter": "cve@mitre.org", "references": ["http://dev2dev.bea.com/pub/advisory/163", "http://securitytracker.com/id?1015528"], "cvelist": ["CVE-2006-0419"], "type": "cve", "lastseen": "2019-05-29T18:08:30", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "24eacad5c276c5080d5e5c5c1cd93aa3"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "a853921f75f24c4db72e818e8f0f326f"}, {"key": "cpe23", "hash": "aa9e23ac0f8720587e61cfa005dcf42b"}, {"key": "cvelist", "hash": "7e4a059c2c7862e7a85a26e4af15cb99"}, {"key": "cvss", "hash": "9b257ef804cfe63c30c04ab15f4e91cd"}, {"key": "cvss2", "hash": "315d7a7b15cda393ce9fffb73645c6c3"}, {"key": "cvss3", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cwe", "hash": "78a7a5cbaf09985c14389298e454e7db"}, {"key": "description", "hash": "f0d12068e6121f67b263834abdd1d52d"}, {"key": "href", "hash": "11767656e35470b316be4c9fa93653c6"}, {"key": "modified", "hash": "09d027d45aa72668972cccb06d05dda5"}, {"key": "published", "hash": "c2b4877864430089d23a6852e731b577"}, {"key": "references", "hash": "9ee6888853686d75b6e3649da2772d9b"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "cdab77ef6081945606e0c34778fdffa5"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "c308bdea88b95554e5392f475c7a0a6b7cda68ba73b2fb707e6320be88de482f", "viewCount": 0, "enchantments": {"dependencies": {"references": [], "modified": "2019-05-29T18:08:30"}, "score": {"value": 5.3, "vector": "NONE", "modified": "2019-05-29T18:08:30"}, "vulnersScore": 5.3}, "objectVersion": "1.3", "cpe": ["cpe:/a:bea:weblogic_server:9.0", "cpe:/a:bea:weblogic_server:8.1", "cpe:/a:bea:weblogic_server:7.0"], "affectedSoftware": [{"name": "bea weblogic_server", "operator": "eq", "version": "7.0"}, {"name": "bea weblogic_server", "operator": "eq", "version": "9.0"}, {"name": "bea weblogic_server", "operator": "eq", "version": "8.1"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp4:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp5:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp5:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:9.0:*:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp6:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp3:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp5:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*"], "cwe": ["NVD-CWE-Other"]}
{}