Vulnerabilities > BEA > Weblogic Server > High

DATE CVE VULNERABILITY TITLE RISK
2005-05-24 CVE-2005-1743 Remote vulnerability in BEA WebLogic Server and WebLogic Express
BEA WebLogic Server and WebLogic Express 8.1 through Service Pack 3 and 7.0 through Service Pack 5 does not properly handle when a security provider throws an exception, which may cause WebLogic to use incorrect identity for the thread, or to fail to audit security exceptions.
network
low complexity
bea oracle
7.5
2004-12-31 CVE-2004-1755 Privilege Escalation vulnerability in BEA WebLogic Server and Express SSL Client
The Web Services fat client for BEA WebLogic Server and Express 7.0 SP4 and earlier, when using 2-way SSL and multiple certificates to connect to the same URL, may use the incorrect identity after the first connection, which could allow users to gain privileges.
network
low complexity
bea
7.5
2004-08-06 CVE-2004-0652 Local Password Disclosure vulnerability in BEA Weblogic Server 7.0/7.0.0.1/8.1
BEA WebLogic Server and WebLogic Express 7.0 through 7.0 Service Pack 4, and 8.1 through 8.1 Service Pack 2, allows attackers to obtain the username and password for booting the server by directly accessing certain internal methods.
local
low complexity
bea
7.2
2004-08-06 CVE-2004-0204 Directory Traversal vulnerability in Business Objects Crystal Reports Web Form Viewer
Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.
7.5
2004-07-27 CVE-2004-0711 Unspecified vulnerability in BEA Weblogic Server 7.0/8.1
The URL pattern matching feature in BEA WebLogic Server 6.x matches illegal patterns ending in "*" as wildcards as if they were the legal "/*" pattern, which could cause WebLogic 7.x to allow remote attackers to bypass intended access restrictions because the illegal patterns are properly rejected.
network
low complexity
bea
7.5
2004-07-07 CVE-2004-0470 Unspecified vulnerability in BEA Weblogic Server 7.0/8.1
BEA WebLogic Server and WebLogic Express 7.0 through SP5 and 8.1 through SP2, when editing weblogic.xml using WebLogic Builder or the SecurityRoleAssignmentMBean.toXML method, inadvertently removes security-role-assignment tags when weblogic.xml does not have a principal-name tag, which can remove intended access restrictions for the associated web application.
network
low complexity
bea
7.5
2003-12-31 CVE-2003-1094 Unspecified vulnerability in BEA Weblogic Server 7.0
BEA WebLogic Server and Express version 7.0 SP3 may follow certain code execution paths that result in an incorrect current user, such as in the frequent use of JNDI initial contexts, which could allow remote authenticated users to gain privileges.
local
low complexity
bea
7.2
2003-03-24 CVE-2003-0151 Unspecified vulnerability in BEA Weblogic Server
BEA WebLogic Server and Express 6.0 through 7.0 does not properly restrict access to certain internal servlets that perform administrative functions, which allows remote attackers to read arbitrary files or execute arbitrary code.
network
low complexity
bea
7.5
2002-12-31 CVE-2002-2142 Unspecified vulnerability in BEA Weblogic Integration and Weblogic Server
An undocumented extension for the Servlet mappings in the Servlet 2.3 specification, when upgrading to WebLogic Server and Express 7.0 Service Pack 1 from BEA WebLogic Server and Express 6.0 through 7.0.0.1, does not prepend a "/" character in certain URL patterns, which prevents the proper enforcement of role mappings and policies in applications that use the extension.
network
low complexity
bea
7.5
2002-12-31 CVE-2002-2141 Unspecified vulnerability in BEA Weblogic Server 7.0/7.0.0.1
BEA WebLogic Server and Express 7.0 and 7.0.0.1, when running Servlets and Enterprise JavaBeans (EJB) on more than one server, will remove the security constraints and roles on all servers for any Servlets or EJB that are used by an application that is undeployed on one server, which could allow remote attackers to conduct unauthorized activities in violation of the intended restrictions.
network
low complexity
bea
7.5