The SSL client implementation in BEA WebLogic Server 7.0 SP7, 8.1 SP2 through SP6, 9.0, 9.1, 9.2 Gold through MP2, and 10.0 sometimes selects the null cipher when others are available, which might allow remote attackers to intercept communications.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 00:36
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://dev2dev.bea.com/pub/advisory/244 - | |
| References | () http://secunia.com/advisories/26539 - Patch, Vendor Advisory | |
| References | () http://securitytracker.com/id?1018619 - | |
| References | () http://www.securityfocus.com/bid/25472 - | |
| References | () http://www.vupen.com/english/advisories/2007/3008 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/36322 - | 
Information
                Published : 2007-08-31 00:17
Updated : 2025-04-09 00:30
NVD link : CVE-2007-4615
Mitre link : CVE-2007-4615
CVE.ORG link : CVE-2007-4615
JSON object : View
Products Affected
                bea
- weblogic_server
CWE
                