Логотип exploitDog
bind:CVE-2007-2701
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2007-2701

Количество 2

Количество 2

nvd логотип

CVE-2007-2701

больше 18 лет назад

The JMS Message Bridge in BEA WebLogic Server 7.0 through SP7 and 8.1 through Service Pack 6, when configured without a username and password, or when the connection URL is not defined, allows remote attackers to bypass the security access policy and "send unauthorized messages to a protected queue."

CVSS2: 4.6
EPSS: Низкий
github логотип

GHSA-8f4j-6g66-v4jj

почти 4 года назад

The JMS Message Bridge in BEA WebLogic Server 7.0 through SP7 and 8.1 through Service Pack 6, when configured without a username and password, or when the connection URL is not defined, allows remote attackers to bypass the security access policy and "send unauthorized messages to a protected queue."

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2007-2701

The JMS Message Bridge in BEA WebLogic Server 7.0 through SP7 and 8.1 through Service Pack 6, when configured without a username and password, or when the connection URL is not defined, allows remote attackers to bypass the security access policy and "send unauthorized messages to a protected queue."

CVSS2: 4.6
1%
Низкий
больше 18 лет назад
github логотип
GHSA-8f4j-6g66-v4jj

The JMS Message Bridge in BEA WebLogic Server 7.0 through SP7 and 8.1 through Service Pack 6, when configured without a username and password, or when the connection URL is not defined, allows remote attackers to bypass the security access policy and "send unauthorized messages to a protected queue."

1%
Низкий
почти 4 года назад

Уязвимостей на страницу