Page 47 of 324 results (0.011 seconds)

CVSS: 5.0EPSS: 1%CPEs: 8EXPL: 0

BEA WebLogic Server 6.1 SP7 and earlier allows remote attackers to read arbitrary files via unknown attack vectors related to a "default internal servlet" accessed through HTTP. • http://dev2dev.bea.com/pub/advisory/180 http://secunia.com/advisories/19310 http://securitytracker.com/id?1015792 http://www.securityfocus.com/bid/17166 http://www.vupen.com/english/advisories/2006/1021 https://exchange.xforce.ibmcloud.com/vulnerabilities/25347 •

CVSS: 5.0EPSS: 2%CPEs: 36EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP6 and earlier, and WebLogic Server 6.1 SP7 and earlier allow remote attackers to cause a denial of service (memory exhaustion) via crafted non-canonicalized XML documents. • http://dev2dev.bea.com/pub/advisory/183 http://secunia.com/advisories/19310 http://securitytracker.com/id?1015790 http://www.securityfocus.com/bid/17167 http://www.vupen.com/english/advisories/2006/1021 https://exchange.xforce.ibmcloud.com/vulnerabilities/25348 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in BEA WebLogic Server and WebLogic Express 8.1 SP5 allows untrusted applications to obtain the server's SSL identity via unknown attack vectors. • http://dev2dev.bea.com/pub/advisory/175 http://secunia.com/advisories/18592 http://securitytracker.com/id?1015528 http://www.securityfocus.com/bid/16358 http://www.vupen.com/english/advisories/2006/0313 https://exchange.xforce.ibmcloud.com/vulnerabilities/24302 •

CVSS: 5.0EPSS: 0%CPEs: 20EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 through SP4 and 7.0 through SP6 does not properly handle when servlets use relative forwarding, which allows remote attackers to cause a denial of service (slowdown) via unknown attack vectors that cause "looping stack overflow errors." • http://dev2dev.bea.com/pub/advisory/164 http://securitytracker.com/id?1015528 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

BEA WebLogic Server and WebLogic Express 9.0 causes new security providers to appear active even if they have not been activated by a server reboot, which could cause an administrator to perform inappropriate, security-relevant actions. • http://dev2dev.bea.com/pub/advisory/173 http://secunia.com/advisories/18592 http://securitytracker.com/id?1015528 http://www.osvdb.org/22773 http://www.securityfocus.com/bid/16358 http://www.vupen.com/english/advisories/2006/0313 https://exchange.xforce.ibmcloud.com/vulnerabilities/24298 •