Show filters
17 Total Results
Displaying 11-17 of 17
Sort by:
Attacker Value
Unknown
CVE-2003-0621
Disclosure Date: December 01, 2003 (last updated February 22, 2025)
The Administration Console for BEA Tuxedo 8.1 and earlier allows remote attackers to determine the existence of files outside the web root via modified paths in the INIFILE argument.
0
Attacker Value
Unknown
CVE-2003-0733
Disclosure Date: October 20, 2003 (last updated February 22, 2025)
Multiple cross-site scripting (XSS) vulnerabilities in WebLogic Integration 7.0 and 2.0, Liquid Data 1.1, and WebLogic Server and Express 5.1 through 7.0, allow remote attackers to execute arbitrary web script and steal authentication credentials via (1) a forward instruction to the Servlet container or (2) other vulnerabilities in the WebLogic Server console application.
0
Attacker Value
Unknown
CVE-2002-1030
Disclosure Date: October 04, 2002 (last updated February 22, 2025)
Race condition in Performance Pack in BEA WebLogic Server and Express 5.1.x, 6.0.x, 6.1.x and 7.0 allows remote attackers to cause a denial of service (crash) via a flood of data and connections.
0
Attacker Value
Unknown
CVE-2000-1238
Disclosure Date: December 31, 2000 (last updated February 22, 2025)
BEA Systems WebLogic Express and WebLogic Server 5.1 SP1-SP6 allows remote attackers to bypass access controls for restricted JSP or servlet pages via a URL with multiple / (forward slash) characters before the restricted pages.
0
Attacker Value
Unknown
CVE-2000-0682
Disclosure Date: October 20, 2000 (last updated February 22, 2025)
BEA WebLogic 5.1.x allows remote attackers to read source code for parsed pages by inserting /ConsoleHelp/ into the URL, which invokes the FileServlet.
0
Attacker Value
Unknown
CVE-2000-0683
Disclosure Date: October 20, 2000 (last updated February 22, 2025)
BEA WebLogic 5.1.x allows remote attackers to read source code for parsed pages by inserting /*.shtml/ into the URL, which invokes the SSIServlet.
0
Attacker Value
Unknown
CVE-2000-0500
Disclosure Date: June 21, 2000 (last updated February 22, 2025)
The default configuration of BEA WebLogic 5.1.0 allows a remote attacker to view source code of programs by requesting a URL beginning with /file/, which causes the default servlet to display the file without further processing.
0