{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T20:29:16.403","vulnerabilities":[{"cve":{"id":"CVE-2005-4704","sourceIdentifier":"cve@mitre.org","published":"2005-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in BEA WebLogic Server and WebLogic Express 8.1 through SP3, 7.0 through SP6, and 6.1 through SP7, when SSL is intended to be used, causes an unencrypted protocol to be used in certain unspecified circumstances, which causes user credentials to be sent across the network in cleartext and allows remote attackers to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*","matchCriteriaId":"1FDCF6AE-43DC-4AE5-9260-CA657F40BE77"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*","matchCriteriaId":"5DFE26B3-31F2-4FC0-854D-56EA4D08C28A"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*","matchCriteriaId":"63017BF8-D681-45EC-9C31-09D029F1126D"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*","matchCriteriaId":"8E0B1791-974A-4967-8CF9-33BE8183200B"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*","matchCriteriaId":"7B12A8B1-F78E-46B3-8872-4C6484345477"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*","matchCriteriaId":"CB2FB0E9-3812-49C5-94F4-3B39D5BE2EED"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*","matchCriteriaId":"6B091903-943F-4822-9F24-9D109B2D76A4"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*","matchCriteriaId":"F9C5AFCF-79D8-4005-B800-B0C6BD461276"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*","matchCriteriaId":"6828CE4B-91E8-4688-977F-DC7BC21131C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*","matchCriteriaId":"E141AA86-C6D0-4FA8-9268-0FB0635DF9CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*","matchCriteriaId":"893D9D88-43C4-4F9F-A364-0585DE6FA9E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*","matchCriteriaId":"D34E2925-DE2A-437F-B349-BD7103F4C37E"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*","matchCriteriaId":"16E3F943-D920-4C0A-8545-5CF7D792011F"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*","matchCriteriaId":"B46A3EBE-B268-427E-AAB5-62DDF255F1D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*","matchCriteriaId":"E08D4CEA-9ACC-4869-BC87-3524A059914F"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*","matchCriteriaId":"6F5B2A06-CE19-4A57-9566-09FC1E259CDB"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*","matchCriteriaId":"D18E22CC-A0FC-4BC7-AD39-2645F57486C1"},{"vulnerable":true,"criteria":"cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*","matchCriteriaId":"9429D939-FCC4-4BA7-90C4-BBEECE7309D0"}]}]}],"references":[{"url":"http://dev2dev.bea.com/pub/advisory/140","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/20094","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://dev2dev.bea.com/pub/advisory/140","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/20094","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}