Known Vulnerabilities for Weblogic Server by Bea

Listed below are 10 of the newest known vulnerabilities associated with "Weblogic Server" by "Bea".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2010-2375 Package/Privilege: Plugins for Apache, Sun and IIS web servers Unspecified vulnerability in the WebLogic Server component in ... 6.4 - MEDIUM 2010-07-13 2018-10-30
CVE-2008-0902 Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Server and Express 6.1 through 10.0 MP1 allow remote atta... 4.3 - MEDIUM 2008-02-22 2011-03-08
CVE-2008-0901 BEA WebLogic Server and Express 7.0 through 10.0 allows remote attackers to conduct brute force password guessing attacks, ev... 7.1 - HIGH 2008-02-22 2018-10-15
CVE-2008-0900 Session fixation vulnerability in BEA WebLogic Server and Express 8.1 SP4 through SP6, 9.2 through MP1, and 10.0 allows remot... 6 - MEDIUM 2008-02-22 2011-03-08
CVE-2008-0899 Cross-site scripting (XSS) vulnerability in the Administration Console in BEA WebLogic Server and Express 9.0 through 10.0 al... 4.3 - MEDIUM 2008-02-22 2011-03-08
CVE-2008-0898 The distributed queue feature in JMS in BEA WebLogic Server 9.0 through 10.0, in certain configurations, does not properly ha... 5.8 - MEDIUM 2008-02-22 2011-03-08
CVE-2008-0897 Unspecified vulnerability in BEA WebLogic Server 9.0 through 10.0 allows remote authenticated users without "receive" permiss... 7.9 - HIGH 2008-02-22 2011-03-08
CVE-2008-0895 BEA WebLogic Server and WebLogic Express 6.1 through 10.0 allows remote attackers to bypass authentication for application se... 6.4 - MEDIUM 2008-02-22 2011-03-08
CVE-2008-0869 Cross-site scripting (XSS) vulnerability in BEA WebLogic Workshop 8.1 through SP6 and Workshop for WebLogic 9.0 through 10.0 ... 4.3 - MEDIUM 2008-02-21 2011-03-08
CVE-2008-0863 BEA WebLogic Server and WebLogic Express 9.0 and 9.1 exposes the web service's WSDL and security policies, which allows remot... 5 - MEDIUM 2008-02-21 2011-03-08

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationBeaWeblogic Server9.2AllAllAll
ApplicationBeaWeblogic Server9.2gaAllAll
ApplicationBeaWeblogic Server9.2mp1AllAll
ApplicationBeaWeblogic Server9.2mp2AllAll
ApplicationBeaWeblogic Server9.1AllAllAll
ApplicationBeaWeblogic Server9.1gaAllAll
ApplicationBeaWeblogic Server9.1gaexpressAll
ApplicationBeaWeblogic Server9.0AllAllAll
ApplicationBeaWeblogic Server9.0AllAllAll
ApplicationBeaWeblogic Server8.1AllAllAll
ApplicationBeaWeblogic Server8.1sp1AllAll
ApplicationBeaWeblogic Server8.1sp1expressAll
ApplicationBeaWeblogic Server8.1sp1win32All
ApplicationBeaWeblogic Server8.1sp2AllAll
ApplicationBeaWeblogic Server8.1sp2expressAll
ApplicationBeaWeblogic Server8.1sp2win32All
ApplicationBeaWeblogic Server8.1sp3AllAll
ApplicationBeaWeblogic Server8.1sp3expressAll
ApplicationBeaWeblogic Server8.1sp3win32All
ApplicationBeaWeblogic Server8.1sp4AllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report