The JMS Server in BEA WebLogic Server 6.1 through SP7, 7.0 through SP6, and 8.1 through SP5 enforces security access policies on the front end, which allows remote attackers to access protected queues via direct requests to the JMS back-end server.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 00:31
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://dev2dev.bea.com/pub/advisory/228 - Patch, Vendor Advisory | |
| References | () http://osvdb.org/36073 - | |
| References | () http://secunia.com/advisories/25284 - Vendor Advisory | |
| References | () http://securitytracker.com/id?1018057 - | |
| References | () http://www.vupen.com/english/advisories/2007/1815 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/34284 - | 
Information
                Published : 2007-05-16 01:19
Updated : 2025-04-09 00:30
NVD link : CVE-2007-2696
Mitre link : CVE-2007-2696
CVE.ORG link : CVE-2007-2696
JSON object : View
Products Affected
                bea
- weblogic_server
CWE
                