Page 14 of 80 results (0.008 seconds)

CVSS: 6.8EPSS: 0%CPEs: 5EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in WebLogic Integration 7.0 and 2.0, Liquid Data 1.1, and WebLogic Server and Express 5.1 through 7.0, allow remote attackers to execute arbitrary web script and steal authentication credentials via (1) a forward instruction to the Servlet container or (2) other vulnerabilities in the WebLogic Server console application. • http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/SA_BEA03_36.00.jsp http://www.securityfocus.com/bid/8357 •

CVSS: 7.5EPSS: 8%CPEs: 28EXPL: 0

BEA WebLogic Server and Express 6.0 through 7.0 does not properly restrict access to certain internal servlets that perform administrative functions, which allows remote attackers to read arbitrary files or execute arbitrary code. BEA Weblogic Server y Express 6.0 a 7.0 no restringe adecuadamente el acceso a ciertos servlets internos que llevan a cabo funciones administrativas, lo que permite a atacantes remotos leer ficheros arbitrarios o ejecutar código arbitrario. • http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.jsp http://marc.info/?l=bugtraq&m=104792477914620&w=2 http://marc.info/?l=bugtraq&m=104792544515384&w=2 http://www.s21sec.com/en/avisos/s21sec-011-en.txt http://www.securityfocus.com/bid/7122 http://www.securityfocus.com/bid/7124 •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

An undocumented extension for the Servlet mappings in the Servlet 2.3 specification, when upgrading to WebLogic Server and Express 7.0 Service Pack 1 from BEA WebLogic Server and Express 6.0 through 7.0.0.1, does not prepend a "/" character in certain URL patterns, which prevents the proper enforcement of role mappings and policies in applications that use the extension. • http://dev2dev.bea.com/pub/advisory/3 http://www.iss.net/security_center/static/10392.php http://www.securityfocus.com/bid/5971 •

CVSS: 2.6EPSS: 0%CPEs: 8EXPL: 0

BEA WebLogic Server and Express 6.1 through 7.0.0.1 buffers HTTP requests in a way that can cause BEA to send the same response for two different HTTP requests, which could allow remote attackers to obtain sensitive information that was intended for other users. • http://dev2dev.bea.com/pub/advisory/38 http://www.iss.net/security_center/static/10221.php http://www.securityfocus.com/bid/5819 •

CVSS: 2.6EPSS: 0%CPEs: 40EXPL: 0

Race condition in Performance Pack in BEA WebLogic Server and Express 5.1.x, 6.0.x, 6.1.x and 7.0 allows remote attackers to cause a denial of service (crash) via a flood of data and connections. • http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0008.html http://dev2dev.bea.com/resourcelibrary/advisoriesdetail.jsp?highlight=advisoriesnotifications&path=components%2Fdev2dev%2Fresourcelibrary%2Fadvisoriesnotifications%2Fadvisory_BEA02-19.htm http://online.securityfocus.com/archive/1/281046 http://www.iss.net/security_center/static/9486.php http://www.securityfocus.com/bid/5159 •