The default configuration of BEA WebLogic 5.1.0 allows a remote attacker to view source code of programs by requesting a URL beginning with /file/, which causes the default servlet to display the file without further processing.
Max CVSS
5.0
EPSS Score
1.52%
Published
2000-06-21
Updated
2017-10-10
BEA WebLogic 5.1.x allows remote attackers to read source code for parsed pages by inserting /ConsoleHelp/ into the URL, which invokes the FileServlet.
Max CVSS
5.0
EPSS Score
0.49%
Published
2000-10-20
Updated
2008-09-05
BEA WebLogic 5.1.x allows remote attackers to read source code for parsed pages by inserting /*.shtml/ into the URL, which invokes the SSIServlet.
Max CVSS
5.0
EPSS Score
0.49%
Published
2000-10-20
Updated
2008-09-05
BEA Systems Weblogic Server 6.1 allows remote attackers to cause a denial of service via a series of requests to .JSP files that contain an MS-DOS device name.
Max CVSS
5.0
EPSS Score
1.03%
Published
2002-03-25
Updated
2016-10-18
The Administration Console for BEA Tuxedo 8.1 and earlier allows remote attackers to determine the existence of files outside the web root via modified paths in the INIFILE argument.
Max CVSS
5.0
EPSS Score
0.81%
Published
2003-12-01
Updated
2017-07-11
The Administration Console for BEA Tuxedo 8.1 and earlier allows remote attackers to cause a denial of service (hang) via pathname arguments that contain MS-DOS device names such as CON and AUX.
Max CVSS
5.0
EPSS Score
1.05%
Published
2003-12-01
Updated
2017-07-11
BEA WebLogic Server proxy plugin for BEA Weblogic Express and Server 6.1 through 8.1 SP 1 allows remote attackers to cause a denial of service (proxy plugin crash) via a malformed URL.
Max CVSS
5.0
EPSS Score
0.35%
Published
2003-12-31
Updated
2008-09-10
BEA WebLogic Express and Server 7.0 through 8.1 SP 1, under certain circumstances when a request to use T3 over SSL (t3s) is made to the insecure T3 port, may use a non-SSL connection for the communication, which could allow attackers to sniff sessions.
Max CVSS
5.0
EPSS Score
0.16%
Published
2003-12-31
Updated
2008-09-10
BEA Weblogic Express and Server 8.0 through 8.1 SP 1, when using a foreign Java Message Service (JMS) provider, echoes the password for the foreign provider to the console and stores it in cleartext in config.xml, which could allow attackers to obtain the password.
Max CVSS
5.0
EPSS Score
0.23%
Published
2003-12-31
Updated
2008-09-10
The Node Manager for BEA WebLogic Express and Server 6.1 through 8.1 SP 1 allows remote attackers to cause a denial of service (Node Manager crash) via malformed data to the Node Manager's port, as demonstrated by nmap.
Max CVSS
5.0
EPSS Score
0.35%
Published
2003-12-31
Updated
2008-09-10
BEA WebLogic Server and WebLogic Express 6.1, 7.0, and 8.1, with RMI and anonymous admin lookup enabled, allows remote attackers to obtain configuration information by accessing MBeanHome via the Java Naming and Directory Interface (JNDI).
Max CVSS
5.0
EPSS Score
1.15%
Published
2003-12-31
Updated
2017-07-20
The WebLogic Authentication provider for BEA WebLogic Server and WebLogic Express 8.1 through SP2 and 7.0 through SP4 does not properly clear member relationships when a group is deleted, which can cause a new group with the same name to have the members of the old group, which allows group members to gain privileges.
Max CVSS
5.1
EPSS Score
0.39%
Published
2004-07-27
Updated
2017-07-11
BEA WebLogic Server and WebLogic Express 8.1 SP2 and earlier, and 7.0 SP4 and earlier, when using 2-way SSL with a custom trust manager, may accept a certificate chain even if the trust manager rejects it, which allows remote attackers to spoof other users or servers.
Max CVSS
5.0
EPSS Score
1.50%
Published
2004-04-13
Updated
2017-07-11
The default configuration of BEA WebLogic Server and Express 8.1 SP2 and earlier, 7.0 SP4 and earlier, 6.1 through SP6, and 5.1 through SP13 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.
Max CVSS
5.8
EPSS Score
0.56%
Published
2004-12-31
Updated
2017-07-11
BEA WebLogic Server and WebLogic Express 8.1 through 8.1 SP2 allow remote attackers to cause a denial of service (network port consumption) via unknown actions in HTTPS sessions, which prevents the server from releasing the network port when the session ends.
Max CVSS
5.0
EPSS Score
2.21%
Published
2004-12-31
Updated
2017-07-12
BEA WebLogic Server and WebLogic Express 6.1, 7.0, and 8.1, when using Remote Method Invocation (RMI) over Internet Inter-ORB Protocol (IIOP), does not properly handle when multiple logins for different users coming from the same client, which could cause an "unexpected user identity" to be used in an RMI call.
Max CVSS
5.5
EPSS Score
0.19%
Published
2004-12-31
Updated
2017-07-29
BEA WebLogic Server 7.0 Service Pack 5 and earlier, and 8.1 Service Pack 3 and earlier, generates different login exceptions that suggest why an authentication attempt fails, which makes it easier for remote attackers to guess passwords via brute force attacks.
Max CVSS
5.0
EPSS Score
0.28%
Published
2005-05-02
Updated
2008-09-05
BEA WebLogic Server and WebLogic Express 8.1 SP2 and SP3 allows users with the Monitor security role to "shrink or reset JDBC connection pools."
Max CVSS
5.0
EPSS Score
0.35%
Published
2005-05-24
Updated
2018-10-30
The cluster cookie parsing code in BEA WebLogic Server 7.0 through Service Pack 5 attempts to contact any host or port specified in a cookie, even when it is not in the cluster, which allows remote attackers to cause a denial of service (cluster slowdown) via modified cookies.
Max CVSS
5.0
EPSS Score
0.58%
Published
2005-05-24
Updated
2018-10-30
The embedded LDAP server in BEA WebLogic Server and Express 8.1 through Service Pack 4, and 7.0 through Service Pack 5, allows remote anonymous binds, which may allow remote attackers to view user entries or cause a denial of service.
Max CVSS
5.0
EPSS Score
0.58%
Published
2005-05-24
Updated
2018-10-30
Buffer overflow in BEA WebLogic Server and WebLogic Express 6.1 Service Pack 4 allows remote attackers to cause a denial of service (CPU consumption from thread looping).
Max CVSS
5.0
EPSS Score
2.21%
Published
2005-05-24
Updated
2018-10-30
Unspecified vulnerability in BEA WebLogic Server and WebLogic Express 8.1 through SP3, 7.0 through SP6, and 6.1 through SP7, when SSL is intended to be used, causes an unencrypted protocol to be used in certain unspecified circumstances, which causes user credentials to be sent across the network in cleartext and allows remote attackers to gain privileges.
Max CVSS
5.0
EPSS Score
0.47%
Published
2005-12-31
Updated
2008-09-05
BEA WebLogic Server and WebLogic Express 8.1 through SP4, 7.0 through SP6, and 6.1 through SP7, when a Java client application creates an SSL connection to the server after it has already created an insecure connection, will use the insecure connection, which allows remote attackers to sniff the connection.
Max CVSS
5.0
EPSS Score
0.47%
Published
2005-12-31
Updated
2008-09-05
HTTP request smuggling vulnerability in BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP6 and earlier, and 6.1 SP7 and earlier allows remote attackers to inject arbitrary HTTP headers via unspecified attack vectors.
Max CVSS
5.0
EPSS Score
0.33%
Published
2005-12-31
Updated
2018-09-27
BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, and 7.0 SP6 and earlier, in certain "heavy usage" scenarios, report incorrect severity levels for an audit event, which might allow attackers to perform unauthorized actions and avoid detection.
Max CVSS
5.0
EPSS Score
0.23%
Published
2005-12-31
Updated
2018-09-27
54 vulnerabilities found
1 2 3
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!