BEA WebLogic Server 8.1 through 8.1 SP5 does not properly enforce access control after a dynamic update and dynamic redeployment of an application that is implemented through exploded jars, which allows attackers to bypass intended access restrictions.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 00:25
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://dev2dev.bea.com/pub/advisory/209 - Patch, Vendor Advisory | |
| References | () http://osvdb.org/38509 - | |
| References | () http://secunia.com/advisories/23750 - | |
| References | () http://securitytracker.com/id?1017525 - | |
| References | () http://www.securityfocus.com/bid/22082 - | |
| References | () http://www.vupen.com/english/advisories/2007/0213 - | 
Information
                Published : 2007-01-23 00:28
Updated : 2025-04-09 00:30
NVD link : CVE-2007-0415
Mitre link : CVE-2007-0415
CVE.ORG link : CVE-2007-0415
JSON object : View
Products Affected
                bea
- weblogic_server
CWE
                