BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, and 7.0 SP6 and earlier, in certain "heavy usage" scenarios, report incorrect severity levels for an audit event, which might allow attackers to perform unauthorized actions and avoid detection.
                
            References
                    | Link | Resource | 
|---|---|
| http://dev2dev.bea.com/pub/advisory/143 | Patch Vendor Advisory | 
| http://secunia.com/advisories/17138 | Third Party Advisory | 
| http://www.securityfocus.com/bid/15052 | Third Party Advisory VDB Entry | 
| http://dev2dev.bea.com/pub/advisory/143 | Patch Vendor Advisory | 
| http://secunia.com/advisories/17138 | Third Party Advisory | 
| http://www.securityfocus.com/bid/15052 | Third Party Advisory VDB Entry | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 00:05
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://dev2dev.bea.com/pub/advisory/143 - Patch, Vendor Advisory | |
| References | () http://secunia.com/advisories/17138 - Third Party Advisory | |
| References | () http://www.securityfocus.com/bid/15052 - Third Party Advisory, VDB Entry | 
Information
                Published : 2005-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2005-4753
Mitre link : CVE-2005-4753
CVE.ORG link : CVE-2005-4753
JSON object : View
Products Affected
                bea
- weblogic_server
CWE
                