CVE-2005-4805
Published Dec 31, 2005
Last updated 16 years ago
Overview
- Description
- Unspecified vulnerability in Sun Java System Application Server 7 Standard and Platform Edition 6 and earlier, and 2004Q2 Standard and Platform Edition Update 2 and earlier, allows remote attackers to obtain the source code for Java Server pages (JSP) via unknown vectors.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_system_application_server:6.0:*:platform:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A75F7843-0C80-4235-8F71-7073494A75C2" }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAB26B3D-4DF0-45C2-9ECA-202C829392D4" }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE5A4BC2-ED34-4968-881E-ED6AD300AC42" }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:*:platform:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D00790CE-CD77-4C39-80AC-5FBD298DD63A" }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC5F2280-EC46-4D2F-8402-FE91ECEE6A1A" }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur1:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F076EB9-CE31-456E-B7E9-B9F4C26CB0DC" }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur2:platform:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FAF567AF-95D6-4634-90BB-E34801F44459" }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur2:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "951B75FF-9190-4AF7-BE9D-23C2114F71DC" }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60EBC552-FAC2-4833-B1A6-696DC06301A7" }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur5:platform:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6F3E897-8253-4D9B-9FA7-83727F508789" }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur5:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18ECFDD3-6D45-44F1-BA98-426D86084BA5" }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur6:platform:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C28CDD2-F08A-438D-B4E2-093994BE50C3" }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur6:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A84AFF0-8598-48C7-90BE-DB2700F55430" } ], "operator": "OR" } ] } ]