Page 19 of 97 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 44EXPL: 0

The Node Manager for BEA WebLogic Express and Server 6.1 through 8.1 SP 1 allows remote attackers to cause a denial of service (Node Manager crash) via malformed data to the Node Manager's port, as demonstrated by nmap. • http://dev2dev.bea.com/pub/advisory/48 http://www.securityfocus.com/bid/9034 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 2

Cross-site scripting (XSS) vulnerability in InteractiveQuery.jsp for BEA WebLogic 8.1 and earlier allows remote attackers to inject malicious web script via the person parameter. Vulnerabilidad de scripts en sitios cruzados en Interactive.jsp de BEA WebLogic 8.1 y anteriores permite a atacantes remotos inyectar script web malicioso mediante el parámetro person. • https://www.exploit-db.com/exploits/23315 http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/SA_BEA03_36.00.jsp http://marc.info/?l=bugtraq&m=106761926906781&w=2 http://www.securityfocus.com/bid/8938 https://exchange.xforce.ibmcloud.com/vulnerabilities/13568 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 8%CPEs: 28EXPL: 0

BEA WebLogic Server and Express 6.0 through 7.0 does not properly restrict access to certain internal servlets that perform administrative functions, which allows remote attackers to read arbitrary files or execute arbitrary code. BEA Weblogic Server y Express 6.0 a 7.0 no restringe adecuadamente el acceso a ciertos servlets internos que llevan a cabo funciones administrativas, lo que permite a atacantes remotos leer ficheros arbitrarios o ejecutar código arbitrario. • http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.jsp http://marc.info/?l=bugtraq&m=104792477914620&w=2 http://marc.info/?l=bugtraq&m=104792544515384&w=2 http://www.s21sec.com/en/avisos/s21sec-011-en.txt http://www.securityfocus.com/bid/7122 http://www.securityfocus.com/bid/7124 •

CVSS: 4.6EPSS: 0%CPEs: 8EXPL: 0

BEA WebLogic Server and Express 7.0 and 7.0.0.1, when using "memory" session persistence for web applications, does not clear authentication information when a web application is redeployed, which could allow users of that application to gain access without having to re-authenticate. • http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-27.jsp http://www.kb.cert.org/vuls/id/691153 http://www.securityfocus.com/bid/7130 https://exchange.xforce.ibmcloud.com/vulnerabilities/11555 •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 0

BEA WebLogic Server and Express 7.0 and 7.0.0.1, when running Servlets and Enterprise JavaBeans (EJB) on more than one server, will remove the security constraints and roles on all servers for any Servlets or EJB that are used by an application that is undeployed on one server, which could allow remote attackers to conduct unauthorized activities in violation of the intended restrictions. • http://dev2dev.bea.com/pub/advisory/39 http://www.iss.net/security_center/static/10291.php http://www.securityfocus.com/bid/5846 •