Language:
https://www.oracle.com/docs/tech/security-alerts/cpuoct2023cvrf.xml
Severity: Critical
ID: 183311
File Name: oracle_weblogic_server_cpu_oct_2023.nasl
Version: 1.8
Type: local
Agent: windows, macosx, unix
Family: Misc.
Published: 10/18/2023
Updated: 1/4/2024
Configuration: Enable thorough checks
Supported Sensors: Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.2
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2022-29599
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CVSS Score Source: CVE-2023-22089
CPE: cpe:/a:oracle:weblogic_server, cpe:/a:oracle:fusion_middleware
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/17/2023
Vulnerability Publication Date: 10/17/2023
CVE: CVE-2020-13956, CVE-2021-36374, CVE-2022-23491, CVE-2022-29546, CVE-2022-29599, CVE-2022-42920, CVE-2022-44729, CVE-2023-22069, CVE-2023-22072, CVE-2023-22086, CVE-2023-22089, CVE-2023-22101, CVE-2023-22108, CVE-2023-2976, CVE-2023-35116
IAVA: 2023-A-0556