Page 10 of 97 results (0.011 seconds)

CVSS: 5.0EPSS: 0%CPEs: 40EXPL: 0

HTTP request smuggling vulnerability in BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP6 and earlier, and 6.1 SP7 and earlier allows remote attackers to inject arbitrary HTTP headers via unspecified attack vectors. • http://dev2dev.bea.com/pub/advisory/159 http://dev2dev.bea.com/pub/advisory/177 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 http://www.securityfocus.com/bid/17163 •

CVSS: 5.0EPSS: 0%CPEs: 24EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, and 7.0 SP6 and earlier, in certain "heavy usage" scenarios, report incorrect severity levels for an audit event, which might allow attackers to perform unauthorized actions and avoid detection. • http://dev2dev.bea.com/pub/advisory/143 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •

CVSS: 5.1EPSS: 0%CPEs: 20EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 SP3 and earlier, and 7.0 SP5 and earlier, when fullyDelegatedAuthorization is enabled for a servlet, does not cause servlet deployment to fail when failures occur in authorization or role providers, which might prevent the servlet from being "fully protected." • http://dev2dev.bea.com/pub/advisory/151 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •

CVSS: 5.1EPSS: 1%CPEs: 39EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 SP5 and earlier, and 7.0 SP6 and earlier, when using username/password authentication, does not lock out a username after the maximum number of invalid login attempts, which makes it easier for remote attackers to guess the password. • http://dev2dev.bea.com/pub/advisory/161 http://dev2dev.bea.com/pub/advisory/178 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 http://www.securityfocus.com/bid/17168 •

CVSS: 1.2EPSS: 0%CPEs: 57EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP5 and earlier, and 6.1 SP7 and earlier log the Java command line at server startup, which might include sensitive information (passwords or keyphrases) in the server log file when the -D option is used. • http://dev2dev.bea.com/pub/advisory/152 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •