Page 13 of 132 results (0.006 seconds)

CVSS: 2.6EPSS: 0%CPEs: 9EXPL: 0

BEA WebLogic Server 8.1 up to SP4 and 7.0 up to SP6 allows remote attackers to obtain the source code of JSP pages during certain circumstances related to a "timing window" when a compilation error occurs, aka the "JSP showcode vulnerability." • http://dev2dev.bea.com/pub/advisory/192 http://secunia.com/advisories/20130 http://securitytracker.com/id?1016100 http://www.vupen.com/english/advisories/2006/1828 https://exchange.xforce.ibmcloud.com/vulnerabilities/26461 •

CVSS: 7.5EPSS: 0%CPEs: 19EXPL: 0

The HTTP handlers in BEA WebLogic Server 9.0, 8.1 up to SP5, 7.0 up to SP6, and 6.1 up to SP7 stores the username and password in cleartext in the WebLogic Server log when access to a web application or protected JWS fails, which allows attackers to gain privileges. • http://dev2dev.bea.com/pub/advisory/189 http://secunia.com/advisories/20130 http://securitytracker.com/id?1016098 http://www.vupen.com/english/advisories/2006/1828 https://exchange.xforce.ibmcloud.com/vulnerabilities/26463 •

CVSS: 4.9EPSS: 0%CPEs: 44EXPL: 0

Unspecified vulnerability in BEA WebLogic Server 9.1 and 9.0, 8.1 through SP5, 7.0 through SP6, and 6.1 through SP7 allows untrusted applications to obtain private server keys. • http://dev2dev.bea.com/pub/advisory/186 http://secunia.com/advisories/20130 http://securitytracker.com/id?1016095 http://www.vupen.com/english/advisories/2006/1828 https://exchange.xforce.ibmcloud.com/vulnerabilities/26466 •

CVSS: 4.6EPSS: 0%CPEs: 10EXPL: 0

stopWebLogic.sh in BEA WebLogic Server 8.1 before Service Pack 4 and 7.0 before Service Pack 6 displays the administrator password to stdout when executed, which allows local users to obtain the password by viewing a local display. • http://dev2dev.bea.com/pub/advisory/181 http://secunia.com/advisories/20130 http://securitytracker.com/id?1016094 http://www.vupen.com/english/advisories/2006/1828 https://exchange.xforce.ibmcloud.com/vulnerabilities/26467 •

CVSS: 5.0EPSS: 1%CPEs: 10EXPL: 0

BEA WebLogic Server 8.1 before Service Pack 4 and 7.0 before Service Pack 6, may send sensitive data over non-secure channels when using JTA transactions, which allows remote attackers to read potentially sensitive network traffic. • http://dev2dev.bea.com/pub/advisory/195 http://secunia.com/advisories/20130 http://securitytracker.com/id?1016103 http://www.vupen.com/english/advisories/2006/1828 https://exchange.xforce.ibmcloud.com/vulnerabilities/26458 •