Total vulnerabilities in the database
BEA WebLogic Server 6.1 through 6.1 SP7, 7.0 through 7.0 SP7, and 8.1 through 8.1 SP5 allows remote attackers to read arbitrary files inside the class-path property via .ear or exploded .ear files that use the manifest class-path property to point to utility jar files.
Software | From | Fixed in |
---|---|---|
bea / weblogic_server | 6.1-sp4 | 6.1-sp4.x |
bea / weblogic_server | 7.0-sp7 | 7.0-sp7.x |
bea / weblogic_server | 8.1 | 8.1.x |
bea / weblogic_server | 6.1-sp5 | 6.1-sp5.x |
bea / weblogic_server | 6.1-sp6 | 6.1-sp6.x |
bea / weblogic_server | 7.0-sp4 | 7.0-sp4.x |
bea / weblogic_server | 7.0 | 7.0.x |
bea / weblogic_server | 6.1-sp3 | 6.1-sp3.x |
bea / weblogic_server | 7.0-sp6 | 7.0-sp6.x |
bea / weblogic_server | 7.0-sp3 | 7.0-sp3.x |
bea / weblogic_server | 8.1-sp5 | 8.1-sp5.x |
bea / weblogic_server | 8.1-sp3 | 8.1-sp3.x |
bea / weblogic_server | 7.0-sp2 | 7.0-sp2.x |
bea / weblogic_server | 7.0-sp5 | 7.0-sp5.x |
bea / weblogic_server | 6.1-sp1 | 6.1-sp1.x |
bea / weblogic_server | 8.1-sp2 | 8.1-sp2.x |
bea / weblogic_server | 6.1 | 6.1.x |
bea / weblogic_server | 7.0-sp1 | 7.0-sp1.x |
bea / weblogic_server | 8.1-sp1 | 8.1-sp1.x |
bea / weblogic_server | 8.1-sp4 | 8.1-sp4.x |
bea / weblogic_server | 6.1-sp2 | 6.1-sp2.x |
bea / weblogic_server | 6.1-sp7 | 6.1-sp7.x |