Filtered by vendor Bea
Subscriptions
Filtered by product Weblogic Server
Subscriptions
Total
151 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2010-2375 | 3 Bea, Bea Systems, Oracle | 3 Weblogic Server, Weblogic Server, Weblogic Server | 2025-04-11 | N/A |
Package/Privilege: Plugins for Apache, Sun and IIS web servers Unspecified vulnerability in the WebLogic Server component in Oracle Fusion Middleware 7.0 SP7, 8.1 SP6, 9.0, 9.1, 9.2 MP3, 10.0 MP2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality and integrity, related to IIS. | ||||
CVE-2007-0422 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
BEA WebLogic Server 9.0, 9.1, and 9.2 Gold, when running on Solaris 9, allows remote attackers to cause a denial of service (server inaccessibility) via manipulated socket connections. | ||||
CVE-2007-0409 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
BEA WebLogic 7.0 through 7.0 SP6, 8.1 through 8.1 SP4, and 9.0 initial release does not encrypt passwords stored in the JDBCDataSourceFactory MBean Properties, which allows local administrative users to read the cleartext password. | ||||
CVE-2007-0414 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
BEA WebLogic Server 6.1 through 6.1 SP7, 7.0 through 7.0 SP6, 8.1 through 8.1 SP5, and 9.0 allows remote attackers to cause a denial of service (server hang) via certain requests that cause muxer threads to block when processing error pages. | ||||
CVE-2007-0419 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
The BEA WebLogic Server proxy plug-in before June 2006 for the Apache HTTP Server does not properly handle protocol errors, which allows remote attackers to cause a denial of service (server outage). | ||||
CVE-2007-0421 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
BEA WebLogic Server 6.1 through 6.1 SP7, and 7.0 through 7.0 SP7 allows remote attackers to cause a denial of service (disk consumption) via requests containing malformed headers, which cause a large amount of data to be written to the server log. | ||||
CVE-2007-0418 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
BEA WebLogic Server 7.0 through 7.0 SP6, 8.1 through 8.1 SP5, 9.0, and 9.1 does not enforce a security policy that declares permissions for EJB methods that have array parameters, which allows remote attackers to obtain unauthorized access to these methods. | ||||
CVE-2008-3257 | 3 Bea, Bea Systems, Oracle | 4 Weblogic Server, Apache Connector In Weblogic Server, Weblogic Server and 1 more | 2025-04-09 | N/A |
Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /.jsp" in an HTTP request. | ||||
CVE-2007-0412 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
BEA WebLogic Server 6.1 through 6.1 SP7, 7.0 through 7.0 SP7, and 8.1 through 8.1 SP5 allows remote attackers to read arbitrary files inside the class-path property via .ear or exploded .ear files that use the manifest class-path property to point to utility jar files. | ||||
CVE-2007-0413 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
BEA WebLogic Server 8.1 through 8.1 SP5 stores cleartext data in a backup of config.xml after offline editing, which allows local users to obtain sensitive information by reading this backup file. | ||||
CVE-2007-0416 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
The WSEE runtime (WS-Security runtime) in BEA WebLogic Server 9.0 and 9.1 does not verify credentials when decrypting client messages, which allows remote attackers to bypass application security. | ||||
CVE-2007-0417 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
BEA WebLogic Server 7.0 through 7.0 SP7, 8.1 through 8.1 SP5, 9.0, and 9.1, when using the WebLogic Server 6.1 compatibility realm, allows attackers to execute certain EJB container persistence operations with an administrative identity. | ||||
CVE-2008-0895 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
BEA WebLogic Server and WebLogic Express 6.1 through 10.0 allows remote attackers to bypass authentication for application servlets via crafted request headers. | ||||
CVE-2007-0420 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
BEA WebLogic Server 9.0, 9.1, and 9.2 Gold allows remote attackers to obtain sensitive information via malformed HTTP requests, which reveal data from previous requests. | ||||
CVE-2007-0408 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
BEA Weblogic Server 8.1 through 8.1 SP4 does not properly validate client certificates when reusing cached connections, which allows remote attackers to obtain access via an untrusted X.509 certificate. | ||||
CVE-2007-0410 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
Unspecified vulnerability in the thread management in BEA WebLogic 7.0 through 7.0 SP6, 8.1 through 8.1 SP5, 9.0, and 9.1, when T3 authentication is used, allows remote attackers to cause a denial of service (thread and system hang) via unspecified "sequences of events." | ||||
CVE-2007-2695 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
The HttpClusterServlet and HttpProxyServlet in BEA WebLogic Express and WebLogic Server 6.1 through SP7, 7.0 through SP7, 8.1 through SP5, 9.0, and 9.1, when SecureProxy is enabled, may process "external requests on behalf of a system identity," which allows remote attackers to access administrative data or functionality. | ||||
CVE-2007-2704 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
BEA WebLogic Server 9.0 through 9.2 allows remote attackers to cause a denial of service (SSL port unavailability) by accessing a half-closed SSL socket. | ||||
CVE-2007-0411 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
BEA WebLogic Server 8.1 through 8.1 SP5, 9.0, 9.1, and 9.2 Gold, when WS-Security is used, does not properly validate certificates, which allows remote attackers to conduct a man-in-the-middle (MITM) attack. | ||||
CVE-2007-0415 | 1 Bea | 1 Weblogic Server | 2025-04-09 | N/A |
BEA WebLogic Server 8.1 through 8.1 SP5 does not properly enforce access control after a dynamic update and dynamic redeployment of an application that is implemented through exploded jars, which allows attackers to bypass intended access restrictions. |