CVE-2004-0204 (GCVE-0-2004-0204)

Vulnerability from cvelistv5 – Published: 2004-06-11 04:00 – Updated: 2024-08-08 00:10
VLAI?
Summary
Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&m=108360413811017&w=2 mailing-listx_refsource_BUGTRAQ
http://support.businessobjects.com/fix/hot/critic… x_refsource_CONFIRM
http://secunia.com/advisories/11800 third-party-advisoryx_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=108671836127360&w=2 mailing-listx_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.osvdb.org/6748 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/bid/10260 vdb-entryx_refsource_BID
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
https://docs.microsoft.com/en-us/security-updates… vendor-advisoryx_refsource_MS
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:10:03.760Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20040502 Crystal Reports Vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=108360413811017\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.businessobjects.com/fix/hot/critical/bulletins/security_bulletin_june04.asp"
          },
          {
            "name": "11800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/11800"
          },
          {
            "name": "20040608 Vulnerability: Arbitrary File Access \u0026 DoS in Crystal Reports",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=108671836127360\u0026w=2"
          },
          {
            "name": "crystalreports-file-deletion(16044)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16044"
          },
          {
            "name": "6748",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/6748"
          },
          {
            "name": "10260",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/10260"
          },
          {
            "name": "oval:org.mitre.oval:def:1157",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1157"
          },
          {
            "name": "MS04-017",
            "tags": [
              "vendor-advisory",
              "x_refsource_MS",
              "x_transferred"
            ],
            "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-017"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-06-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via \"..\" sequences in the dynamicimag argument to crystalimagehandler.aspx."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-12T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20040502 Crystal Reports Vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=108360413811017\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.businessobjects.com/fix/hot/critical/bulletins/security_bulletin_june04.asp"
        },
        {
          "name": "11800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/11800"
        },
        {
          "name": "20040608 Vulnerability: Arbitrary File Access \u0026 DoS in Crystal Reports",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=108671836127360\u0026w=2"
        },
        {
          "name": "crystalreports-file-deletion(16044)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16044"
        },
        {
          "name": "6748",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/6748"
        },
        {
          "name": "10260",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/10260"
        },
        {
          "name": "oval:org.mitre.oval:def:1157",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1157"
        },
        {
          "name": "MS04-017",
          "tags": [
            "vendor-advisory",
            "x_refsource_MS"
          ],
          "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-017"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0204",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via \"..\" sequences in the dynamicimag argument to crystalimagehandler.aspx."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20040502 Crystal Reports Vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=108360413811017\u0026w=2"
            },
            {
              "name": "http://support.businessobjects.com/fix/hot/critical/bulletins/security_bulletin_june04.asp",
              "refsource": "CONFIRM",
              "url": "http://support.businessobjects.com/fix/hot/critical/bulletins/security_bulletin_june04.asp"
            },
            {
              "name": "11800",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/11800"
            },
            {
              "name": "20040608 Vulnerability: Arbitrary File Access \u0026 DoS in Crystal Reports",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=108671836127360\u0026w=2"
            },
            {
              "name": "crystalreports-file-deletion(16044)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16044"
            },
            {
              "name": "6748",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/6748"
            },
            {
              "name": "10260",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/10260"
            },
            {
              "name": "oval:org.mitre.oval:def:1157",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1157"
            },
            {
              "name": "MS04-017",
              "refsource": "MS",
              "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-017"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0204",
    "datePublished": "2004-06-11T04:00:00",
    "dateReserved": "2004-03-11T00:00:00",
    "dateUpdated": "2024-08-08T00:10:03.760Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E08D4CEA-9ACC-4869-BC87-3524A059914F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*\", \"matchCriteriaId\": \"ADED8968-EA9C-4F0E-AD2F-BC834F4D8A58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:8.1:*:win32:*:*:*:*:*\", \"matchCriteriaId\": \"A3DFE048-905E-4890-809D-F6BCEF7F83C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F5B2A06-CE19-4A57-9566-09FC1E259CDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*\", \"matchCriteriaId\": \"F7560131-A6AC-4BBB-AA2D-C7C63AB51226\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:8.1:sp1:win32:*:*:*:*:*\", \"matchCriteriaId\": \"349036A0-B5E2-4656-8D2D-26BEE9EF9DFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D18E22CC-A0FC-4BC7-AD39-2645F57486C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*\", \"matchCriteriaId\": \"893C2387-03E3-4F8E-9029-BC64C64239EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:bea:weblogic_server:8.1:sp2:win32:*:*:*:*:*\", \"matchCriteriaId\": \"D00633D1-4B38-48D9-B5CD-E8D66EA90599\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:borland_software:j_builder:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A50A593-04D3-4FDA-8015-901750AEE4C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:businessobjects:crystal_enterprise:9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53235D62-18AA-4482-B9AE-9E1AE87BDB3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:businessobjects:crystal_enterprise:10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38F02473-3701-413D-B2F2-B400958F22F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:businessobjects:crystal_enterprise_java_sdk:8.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F1A5E6C-F762-4FD1-A105-EFC4E3746B6E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:businessobjects:crystal_enterprise_ras:8.5:*:unix:*:*:*:*:*\", \"matchCriteriaId\": \"CD34959D-8A0C-48B4-8132-865406EABB4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:businessobjects:crystal_reports:9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"716121F8-EE8D-4A4C-BAB6-943BE3ADDC1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:businessobjects:crystal_reports:10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4D5162B-391B-4B36-A688-8D903218B3B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:business_solutions_crm:1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FFC5454-8557-4886-AEB4-3E04EC6FC477\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:outlook:2003:*:business_contact_manager:*:*:*:*:*\", \"matchCriteriaId\": \"F148421C-7BF5-4A58-83DF-4879B27C912A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:visual_studio_.net:2003:gold:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9E6C132-4F4B-4FB0-9DDC-DD9750D8552D\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via \\\"..\\\" sequences in the dynamicimag argument to crystalimagehandler.aspx.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de atravesamiento de directorios en los visores web de Business Objects Crystal Reports 9 and 10, y Crystal Enterprise 9 o 10, usados en Visual Studio .NET 2003 y Outlook 2003 con Business Contact Manager, Microsoft Business Solutions CRM 1.2, y otros productos, permiten a atacantes remotos leer y borrar ficheros de su elecci\\u00f3n mediante secuencias \\\"..\\\" en el argumento dynamicimag de crystalimagehandler.aspx.\"}]",
      "id": "CVE-2004-0204",
      "lastModified": "2024-11-20T23:47:59.720",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": true, \"userInteractionRequired\": false}]}",
      "published": "2004-08-06T04:00:00.000",
      "references": "[{\"url\": \"http://marc.info/?l=bugtraq\u0026m=108360413811017\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=108671836127360\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/11800\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.businessobjects.com/fix/hot/critical/bulletins/security_bulletin_june04.asp\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/6748\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/10260\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-017\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/16044\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1157\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=108360413811017\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=108671836127360\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/11800\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.businessobjects.com/fix/hot/critical/bulletins/security_bulletin_june04.asp\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/6748\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/10260\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-017\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/16044\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1157\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2004-0204\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2004-08-06T04:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via \\\"..\\\" sequences in the dynamicimag argument to crystalimagehandler.aspx.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de atravesamiento de directorios en los visores web de Business Objects Crystal Reports 9 and 10, y Crystal Enterprise 9 o 10, usados en Visual Studio .NET 2003 y Outlook 2003 con Business Contact Manager, Microsoft Business Solutions CRM 1.2, y otros productos, permiten a atacantes remotos leer y borrar ficheros de su elecci\u00f3n mediante secuencias \\\"..\\\" en el argumento dynamicimag de crystalimagehandler.aspx.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E08D4CEA-9ACC-4869-BC87-3524A059914F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*\",\"matchCriteriaId\":\"ADED8968-EA9C-4F0E-AD2F-BC834F4D8A58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:*:win32:*:*:*:*:*\",\"matchCriteriaId\":\"A3DFE048-905E-4890-809D-F6BCEF7F83C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F5B2A06-CE19-4A57-9566-09FC1E259CDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*\",\"matchCriteriaId\":\"F7560131-A6AC-4BBB-AA2D-C7C63AB51226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp1:win32:*:*:*:*:*\",\"matchCriteriaId\":\"349036A0-B5E2-4656-8D2D-26BEE9EF9DFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D18E22CC-A0FC-4BC7-AD39-2645F57486C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*\",\"matchCriteriaId\":\"893C2387-03E3-4F8E-9029-BC64C64239EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp2:win32:*:*:*:*:*\",\"matchCriteriaId\":\"D00633D1-4B38-48D9-B5CD-E8D66EA90599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:borland_software:j_builder:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A50A593-04D3-4FDA-8015-901750AEE4C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:businessobjects:crystal_enterprise:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53235D62-18AA-4482-B9AE-9E1AE87BDB3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:businessobjects:crystal_enterprise:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38F02473-3701-413D-B2F2-B400958F22F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:businessobjects:crystal_enterprise_java_sdk:8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F1A5E6C-F762-4FD1-A105-EFC4E3746B6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:businessobjects:crystal_enterprise_ras:8.5:*:unix:*:*:*:*:*\",\"matchCriteriaId\":\"CD34959D-8A0C-48B4-8132-865406EABB4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:businessobjects:crystal_reports:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"716121F8-EE8D-4A4C-BAB6-943BE3ADDC1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:businessobjects:crystal_reports:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4D5162B-391B-4B36-A688-8D903218B3B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:business_solutions_crm:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FFC5454-8557-4886-AEB4-3E04EC6FC477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:outlook:2003:*:business_contact_manager:*:*:*:*:*\",\"matchCriteriaId\":\"F148421C-7BF5-4A58-83DF-4879B27C912A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_.net:2003:gold:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9E6C132-4F4B-4FB0-9DDC-DD9750D8552D\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=bugtraq\u0026m=108360413811017\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=108671836127360\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/11800\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.businessobjects.com/fix/hot/critical/bulletins/security_bulletin_june04.asp\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/6748\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/10260\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-017\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/16044\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1157\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=108360413811017\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=108671836127360\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/11800\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.businessobjects.com/fix/hot/critical/bulletins/security_bulletin_june04.asp\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/6748\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/10260\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-017\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/16044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1157\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…