First published: Fri Mar 21 2003(Updated: )
BEA WebLogic Server and Express 6.0 through 7.0 does not properly restrict access to certain internal servlets that perform administrative functions, which allows remote attackers to read arbitrary files or execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BEA Weblogic Server | =7.0-sp2 | |
BEA Weblogic Server | =6.1-sp4 | |
BEA Weblogic Server | =6.1 | |
BEA Weblogic Server | =6.0-sp1 | |
BEA Weblogic Server | =6.1-sp1 | |
BEA Weblogic Server | =7.0 | |
BEA Weblogic Server | =6.0 | |
BEA Weblogic Server | =6.1-sp4 | |
BEA Weblogic Server | =7.0.0.1-sp1 | |
BEA Weblogic Server | =6.0-sp2 | |
BEA Weblogic Server | =6.0-sp2 | |
BEA Weblogic Server | =6.1-sp3 | |
BEA Weblogic Server | =6.1-sp3 | |
BEA Weblogic Server | =7.0.0.1-sp1 | |
BEA Weblogic Server | =7.0.0.1-sp2 | |
BEA Weblogic Server | =7.0.0.1-sp2 | |
BEA Weblogic Server | =6.0 | |
BEA Weblogic Server | =6.1-sp1 | |
BEA Weblogic Server | =7.0.0.1 | |
BEA Weblogic Server | =7.0-sp1 | |
BEA Weblogic Server | =7.0-sp2 | |
BEA Weblogic Server | =6.1 | |
BEA Weblogic Server | =7.0-sp1 | |
BEA Weblogic Server | =6.0-sp1 | |
BEA Weblogic Server | =6.1-sp2 | |
BEA Weblogic Server | =6.1-sp2 | |
BEA Weblogic Server | =7.0.0.1 | |
BEA Weblogic Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.