Page 10 of 137 results (0.008 seconds)

CVSS: 5.0EPSS: 1%CPEs: 8EXPL: 0

BEA WebLogic Server 6.1 SP7 and earlier allows remote attackers to read arbitrary files via unknown attack vectors related to a "default internal servlet" accessed through HTTP. • http://dev2dev.bea.com/pub/advisory/180 http://secunia.com/advisories/19310 http://securitytracker.com/id?1015792 http://www.securityfocus.com/bid/17166 http://www.vupen.com/english/advisories/2006/1021 https://exchange.xforce.ibmcloud.com/vulnerabilities/25347 •

CVSS: 5.0EPSS: 2%CPEs: 36EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP6 and earlier, and WebLogic Server 6.1 SP7 and earlier allow remote attackers to cause a denial of service (memory exhaustion) via crafted non-canonicalized XML documents. • http://dev2dev.bea.com/pub/advisory/183 http://secunia.com/advisories/19310 http://securitytracker.com/id?1015790 http://www.securityfocus.com/bid/17167 http://www.vupen.com/english/advisories/2006/1021 https://exchange.xforce.ibmcloud.com/vulnerabilities/25348 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in BEA WebLogic Server and WebLogic Express 8.1 SP5 allows untrusted applications to obtain the server's SSL identity via unknown attack vectors. • http://dev2dev.bea.com/pub/advisory/175 http://secunia.com/advisories/18592 http://securitytracker.com/id?1015528 http://www.securityfocus.com/bid/16358 http://www.vupen.com/english/advisories/2006/0313 https://exchange.xforce.ibmcloud.com/vulnerabilities/24302 •

CVSS: 5.0EPSS: 0%CPEs: 20EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 through SP4 and 7.0 through SP6 does not properly handle when servlets use relative forwarding, which allows remote attackers to cause a denial of service (slowdown) via unknown attack vectors that cause "looping stack overflow errors." • http://dev2dev.bea.com/pub/advisory/164 http://securitytracker.com/id?1015528 •

CVSS: 2.1EPSS: 0%CPEs: 20EXPL: 0

Unspecified vulnerability in BEA WebLogic Server and WebLogic Express 9.0 and 8.1 through SP5 allows malicious EJBs or servlet applications to decrypt system passwords, possibly by accessing functionality that should have been restricted. • http://dev2dev.bea.com/pub/advisory/171 http://secunia.com/advisories/18592 http://securitytracker.com/id?1015528 http://www.osvdb.org/22774 http://www.securityfocus.com/bid/16358 http://www.vupen.com/english/advisories/2006/0313 https://exchange.xforce.ibmcloud.com/vulnerabilities/24291 •