Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
bea jrockit vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2007-0425
Unspecified vulnerability in BEA WebLogic Platform and Server 8.1 up to and including 8.1 SP5, and JRockit 1.4.2 R4.5 and previous versions, allows malicious users to gain privileges via unspecified vectors, related to an "overflow condition," probably a buffer overflow...
Bea Weblogic Server
Bea Weblogic Server 8.1
Bea Jrockit
10
CVSSv2
CVE-2009-1006
Unspecified vulnerability in the JRockit component in BEA Product Suite R27.6.2 and previous versions, with SDK/JRE 1.4.2, JRE/JDK 5, and JRE/JDK 6, allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors.
Oracle Jrockit
Oracle Jrockit R26.0
Oracle Jrockit R26.1
Oracle Jrockit R26.2
Oracle Jrockit R26.3
Oracle Jrockit R26.4
Oracle Jrockit R27.1
Oracle Jrockit R27.2
Oracle Jrockit R27.3
Oracle Jrockit R27.3.1
Oracle Jrockit R27.4
Oracle Jrockit R27.5
Oracle Jrockit R27.6
Oracle Jrockit R27.6.0
Oracle Jrockit R27.6.1
10
CVSSv2
CVE-2009-3403
Unspecified vulnerability in the JRockit component in BEA Product Suite R27.6.4: JRE/JDK, 1.4.2, 5, and, and 6 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors. NOTE: this issue subsumes CVE-2009-2670, CVE-2009-2671, CVE-200...
Oracle Bea Product Suite R27.6.4
10
CVSSv2
CVE-2010-0079
Multiple vulnerabilities in the JRockit component in BEA Product Suite R27.6.5 using JRE/JDK 1.4.2, 5, and 6 allow remote malicious users to affect confidentiality, integrity, and availability via unknown vectors. NOTE: this CVE identifier overlaps CVE-2009-3867, CVE-2009-3868, C...
Oracle Bea Product Suite R27.6.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-28995
CVE-2024-36680
CVE-2024-35537
unauthorized
CVE-2024-21518
CVE-2024-37673
cross-site scripting
SSRF
CVE-2024-6241
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started