Page 15 of 155 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

18 Mar 2003 — BEA WebLogic Server and Express 7.0 and 7.0.0.1, when using "memory" session persistence for web applications, does not clear authentication information when a web application is redeployed, which could allow users of that application to gain access without having to re-authenticate. • http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-27.jsp •

CVSS: 9.1EPSS: 1%CPEs: 4EXPL: 0

31 Dec 2002 — BEA WebLogic Server and Express 7.0 and 7.0.0.1, when running Servlets and Enterprise JavaBeans (EJB) on more than one server, will remove the security constraints and roles on all servers for any Servlets or EJB that are used by an application that is undeployed on one server, which could allow remote attackers to conduct unauthorized activities in violation of the intended restrictions. • http://dev2dev.bea.com/pub/advisory/39 •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

31 Dec 2002 — An undocumented extension for the Servlet mappings in the Servlet 2.3 specification, when upgrading to WebLogic Server and Express 7.0 Service Pack 1 from BEA WebLogic Server and Express 6.0 through 7.0.0.1, does not prepend a "/" character in certain URL patterns, which prevents the proper enforcement of role mappings and policies in applications that use the extension. • http://dev2dev.bea.com/pub/advisory/3 •

CVSS: 5.3EPSS: 0%CPEs: 8EXPL: 0

31 Dec 2002 — BEA WebLogic Server and Express 6.1 through 7.0.0.1 buffers HTTP requests in a way that can cause BEA to send the same response for two different HTTP requests, which could allow remote attackers to obtain sensitive information that was intended for other users. • http://dev2dev.bea.com/pub/advisory/38 •

CVSS: 5.9EPSS: 0%CPEs: 40EXPL: 0

04 Oct 2002 — Race condition in Performance Pack in BEA WebLogic Server and Express 5.1.x, 6.0.x, 6.1.x and 7.0 allows remote attackers to cause a denial of service (crash) via a flood of data and connections. • http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0008.html •

CVSS: 7.5EPSS: 6%CPEs: 2EXPL: 1

15 Mar 2002 — BEA Systems Weblogic Server 6.1 allows remote attackers to cause a denial of service via a series of requests to .JSP files that contain an MS-DOS device name. El Servidor 6.1 Weblogic de BEA Sistemas, permite a atacantes que remotos causar una negación de servicio vía una serie de peticiones a archivos .JSP que contengan un nombre de dispositivo de MS-DOS. • https://www.exploit-db.com/exploits/21432 •

CVSS: 10.0EPSS: 31%CPEs: 1EXPL: 3

02 Feb 2001 — Buffer overflow in Bea WebLogic Server before 5.1.0 allows remote attackers to execute arbitrary commands via a long URL that begins with a ".." string. • https://www.exploit-db.com/exploits/20516 •

CVSS: 8.2EPSS: 0%CPEs: 14EXPL: 0

31 Dec 2000 — BEA Systems WebLogic Express and WebLogic Server 5.1 SP1-SP6 allows remote attackers to bypass access controls for restricted JSP or servlet pages via a URL with multiple / (forward slash) characters before the restricted pages. • ftp://ftpna.bea.com/pub/releases/patches/SecurityBEA00-0600.zip •

CVSS: 10.0EPSS: 20%CPEs: 1EXPL: 0

13 Oct 2000 — Buffer overflow in BEA WebLogic server proxy plugin allows remote attackers to execute arbitrary commands via a long URL with a .JSP extension. • http://archives.neohapsis.com/archives/bugtraq/2000-08/0186.html •

CVSS: 7.5EPSS: 0%CPEs: 15EXPL: 0

13 Oct 2000 — BEA WebLogic 5.1.x allows remote attackers to read source code for parsed pages by inserting /ConsoleHelp/ into the URL, which invokes the FileServlet. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0410.html •