First published: Fri Dec 31 2004(Updated: )
The default configuration of BEA WebLogic Server and Express 8.1 SP2 and earlier, 7.0 SP4 and earlier, 6.1 through SP6, and 5.1 through SP13 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BEA Weblogic Server | =5.1-sp8 | |
BEA Weblogic Server | =8.1 | |
BEA Weblogic Server | =5.1-sp11 | |
BEA Weblogic Server | =7.0-sp2 | |
BEA Weblogic Server | =6.1-sp4 | |
BEA Weblogic Server | =5.1-sp7 | |
BEA Weblogic Server | =6.1 | |
BEA Weblogic Server | =5.1-sp8 | |
BEA Weblogic Server | =8.1 | |
BEA Weblogic Server | =5.1-sp3 | |
BEA Weblogic Server | =5.1-sp2 | |
BEA Weblogic Server | =6.1-sp5 | |
BEA Weblogic Server | =5.1-sp2 | |
BEA Weblogic Server | =6.1-sp6 | |
BEA Weblogic Server | =7.0-sp4 | |
BEA Weblogic Server | =5.1-sp5 | |
BEA Weblogic Server | =6.1-sp1 | |
BEA Weblogic Server | =7.0 | |
BEA Weblogic Server | =5.1-sp5 | |
BEA Weblogic Server | =6.1-sp4 | |
BEA Weblogic Server | =6.1-sp4 | |
BEA Weblogic Server | =6.1-sp6 | |
BEA Weblogic Server | =5.1-sp12 | |
BEA Weblogic Server | =5.1-sp11 | |
BEA Weblogic Server | =6.1-sp3 | |
BEA Weblogic Server | =5.1-sp1 | |
BEA Weblogic Server | =7.0-sp3 | |
BEA Weblogic Server | =8.1-sp1 | |
BEA Weblogic Server | =6.1-sp2 | |
BEA Weblogic Server | =7.0-sp2 | |
BEA Weblogic Server | =6.1-sp1 | |
BEA Weblogic Server | =5.1-sp6 | |
BEA Weblogic Server | =7.0-sp3 | |
BEA Weblogic Server | =5.1-sp12 | |
BEA Weblogic Server | =5.1-sp6 | |
BEA Weblogic Server | =8.1 | |
BEA Weblogic Server | =5.1-sp9 | |
BEA Weblogic Server | =5.1-sp1 | |
BEA Weblogic Server | =6.1-sp1 | |
BEA Weblogic Server | =6.1 | |
BEA Weblogic Server | =8.1-sp1 | |
BEA Weblogic Server | =5.1-sp4 | |
BEA Weblogic Server | =7.0-sp2 | |
BEA Weblogic Server | =5.1-sp11 | |
BEA Weblogic Server | =5.1-sp7 | |
BEA Weblogic Server | =5.1-sp3 | |
BEA Weblogic Server | =5.1-sp8 | |
BEA Weblogic Server | =5.1-sp9 | |
BEA Weblogic Server | =8.1-sp2 | |
BEA Weblogic Server | =5.1-sp13 | |
BEA Weblogic Server | =5.1-sp10 | |
BEA Weblogic Server | =6.1 | |
BEA Weblogic Server | =5.1-sp3 | |
BEA Weblogic Server | =6.1-sp2 | |
BEA Weblogic Server | =5.1-sp5 | |
BEA Weblogic Server | =5.1-sp9 | |
BEA Weblogic Server | =5.1 | |
BEA Weblogic Server | =7.0-sp3 | |
BEA Weblogic Server | =7.0-sp1 | |
BEA Weblogic Server | =5.1-sp12 | |
BEA Weblogic Server | =6.1-sp5 | |
BEA Weblogic Server | =7.0-sp1 | |
BEA Weblogic Server | =7.0-sp4 | |
BEA Weblogic Server | =8.1-sp1 | |
BEA Weblogic Server | =6.1-sp3 | |
BEA Weblogic Server | =6.1-sp5 | |
BEA Weblogic Server | =5.1-sp1 | |
BEA Weblogic Server | =5.1-sp13 | |
BEA Weblogic Server | =5.1 | |
BEA Weblogic Server | =5.1-sp6 | |
BEA Weblogic Server | =7.0-sp1 | |
BEA Weblogic Server | =8.1-sp2 | |
BEA Weblogic Server | =5.1-sp4 | |
BEA Weblogic Server | =5.1-sp13 | |
BEA Weblogic Server | =6.1-sp2 | |
BEA Weblogic Server | =7.0 | |
BEA Weblogic Server | =8.1-sp2 | |
BEA Weblogic Server | =7.0 | |
BEA Weblogic Server | =6.1-sp3 | |
BEA Weblogic Server | =5.1-sp10 | |
BEA Weblogic Server | =5.1-sp10 | |
BEA Weblogic Server | =5.1-sp7 | |
BEA Weblogic Server | =5.1-sp4 | |
BEA Weblogic Server | =5.1-sp2 | |
BEA Weblogic Server | =7.0-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.