Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
bea weblogic server 8.1 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2006-2464
stopWebLogic.sh in BEA WebLogic Server 8.1 before Service Pack 4 and 7.0 before Service Pack 6 displays the administrator password to stdout when executed, which allows local users to obtain the password by viewing a local display.
Bea Weblogic Server 8.1
Bea Weblogic Server 7.0
2.6
CVSSv2
CVE-2006-2466
BEA WebLogic Server 8.1 up to SP4 and 7.0 up to SP6 allows remote malicious users to obtain the source code of JSP pages during certain circumstances related to a "timing window" when a compilation error occurs, aka the "JSP showcode vulnerability."
Bea Weblogic Server 8.1
Bea Weblogic Server 7.0
4
CVSSv2
CVE-2006-2468
The WebLogic Server Administration Console in BEA WebLogic Server 8.1 up to SP4 and 7.0 up to SP6 displays the domain name in the Console login form, which allows remote malicious users to obtain sensitive information.
Bea Weblogic Server 8.1
Bea Weblogic Server 7.0
10
CVSSv2
CVE-2008-3257
Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and previous versions allows remote malicious users to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /....
Bea Weblogic Server 7.0.0.1
Bea Weblogic Server 6.1
Bea Weblogic Server 4.5.2
Bea Weblogic Server 4.5.1
Bea Weblogic Server 7.0
Bea Weblogic Server 9.2
Bea Weblogic Server 8.1
Bea Weblogic Server 9.0
Bea Weblogic Server 6.0
Bea Weblogic Server 5.1
Oracle Weblogic Server
Bea Weblogic Server 3.1.8
Bea Weblogic Server 4.5
Bea Weblogic Server 9.1
Bea Weblogic Server 10.0
Bea Systems Weblogic Server 10.0 Mp1
Bea Weblogic Server 4.0.4
Bea Systems Apache Connector In Weblogic Server
Bea Weblogic Server 4.0
2 EDB exploits
1 Github repository
5
CVSSv2
CVE-2003-0621
The Administration Console for BEA Tuxedo 8.1 and previous versions allows remote malicious users to determine the existence of files outside the web root via modified paths in the INIFILE argument.
Bea Tuxedo 8.0
Bea Tuxedo 7.1
Bea Weblogic Server 4.2
Bea Tuxedo 6.5
Bea Weblogic Server 5.1
Bea Tuxedo 6.3
Bea Tuxedo 6.4
Bea Tuxedo 8.1
Bea Weblogic Server 5.0.1
1 EDB exploit
5
CVSSv2
CVE-2003-0622
The Administration Console for BEA Tuxedo 8.1 and previous versions allows remote malicious users to cause a denial of service (hang) via pathname arguments that contain MS-DOS device names such as CON and AUX.
Bea Tuxedo 8.0
Bea Tuxedo 7.1
Bea Weblogic Server 4.2
Bea Tuxedo 6.5
Bea Weblogic Server 5.1
Bea Tuxedo 6.3
Bea Tuxedo 6.4
Bea Tuxedo 8.1
Bea Weblogic Server 5.0.1
4.3
CVSSv2
CVE-2003-0623
Cross-site scripting (XSS) vulnerability in the Administration Console for BEA Tuxedo 8.1 and previous versions allows remote malicious users to inject arbitrary web script via the INIFILE argument.
Bea Tuxedo 8.0
Bea Tuxedo 7.1
Bea Weblogic Server 4.2
Bea Tuxedo 6.5
Bea Weblogic Server 5.1
Bea Tuxedo 6.3
Bea Tuxedo 6.4
Bea Tuxedo 8.1
Bea Weblogic Server 5.0.1
2.1
CVSSv2
CVE-2005-4755
BEA WebLogic Server and WebLogic Express 8.1 SP3 and previous versions (1) stores the private key passphrase (CustomTrustKeyStorePassPhrase) in cleartext in nodemanager.config; or, during domain creation with the Configuration Wizard, renders an SSL private key passphrase in clea...
Bea Weblogic Server 8.1
4.6
CVSSv2
CVE-2004-0712
The configuration tools (1) config.sh in Unix or (2) config.cmd in Windows for BEA WebLogic Server 8.1 through SP2 create a log file that contains the administrative username and password in cleartext, which could allow local users to gain privileges.
Bea Weblogic Server 8.1
5
CVSSv2
CVE-2005-4754
BEA WebLogic Server and WebLogic Express 8.1 SP3 and previous versions allow remote malicious users to obtain sensitive information (intranet IP addresses) via unknown attack vectors involving "network address translation."
Bea Weblogic Server 8.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »