Page 13 of 137 results (0.007 seconds)

CVSS: 5.1EPSS: 1%CPEs: 39EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 SP5 and earlier, and 7.0 SP6 and earlier, when using username/password authentication, does not lock out a username after the maximum number of invalid login attempts, which makes it easier for remote attackers to guess the password. • http://dev2dev.bea.com/pub/advisory/161 http://dev2dev.bea.com/pub/advisory/178 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 http://www.securityfocus.com/bid/17168 •

CVSS: 4.0EPSS: 0%CPEs: 8EXPL: 0

Unspecified vulnerability in the Administration server in BEA WebLogic Server and WebLogic Express 8.1 SP3 and earlier allows remote authenticated Admin users to read arbitrary files via unknown attack vectors related to an "internal servlet" accessed through HTTP. • http://dev2dev.bea.com/pub/advisory/148 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •

CVSS: 1.2EPSS: 0%CPEs: 57EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP5 and earlier, and 6.1 SP7 and earlier log the Java command line at server startup, which might include sensitive information (passwords or keyphrases) in the server log file when the -D option is used. • http://dev2dev.bea.com/pub/advisory/152 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •

CVSS: 7.5EPSS: 0%CPEs: 22EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, and 7.0 SP5 and earlier, do not properly validate derived Principals with multiple PrincipalValidators, which might allow attackers to gain privileges. • http://dev2dev.bea.com/pub/advisory/146 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •

CVSS: 7.2EPSS: 0%CPEs: 58EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP6 and earlier, and 6.1 SP7 and earlier sometimes stores the boot password in the registry in cleartext, which might allow local users to gain administrative privileges. • http://dev2dev.bea.com/pub/advisory/153 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •