Page 14 of 137 results (0.012 seconds)

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 SP3 and earlier allow remote attackers to obtain sensitive information (intranet IP addresses) via unknown attack vectors involving "network address translation." • http://dev2dev.bea.com/pub/advisory/144 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •

CVSS: 7.5EPSS: 2%CPEs: 43EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP6 and earlier, and 6.1 SP7 and earlier, when Internet Inter-ORB Protocol (IIOP) is used, sometimes include a password in an exception message that is sent to a client or stored in a log file, which might allow remote attackers to perform unauthorized actions. • http://dev2dev.bea.com/pub/advisory/154 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 and 7.0, during a migration across operating system platforms, do not warn the administrative user about platform differences in URLResource case sensitivity, which might cause local users to inadvertently lose protection of Web Application pages. • http://dev2dev.bea.com/pub/advisory/149 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •

CVSS: 5.0EPSS: 0%CPEs: 18EXPL: 0

Unspecified vulnerability in BEA WebLogic Server and WebLogic Express 8.1 through SP3, 7.0 through SP6, and 6.1 through SP7, when SSL is intended to be used, causes an unencrypted protocol to be used in certain unspecified circumstances, which causes user credentials to be sent across the network in cleartext and allows remote attackers to gain privileges. • http://dev2dev.bea.com/pub/advisory/140 http://www.osvdb.org/20094 •

CVSS: 7.8EPSS: 0%CPEs: 68EXPL: 0

BEA WebLogic Server and WebLogic Express 9.0, 8.1, and 7.0 lock out the admin user account after multiple incorrect password guesses, which allows remote attackers who know or guess the admin account name to cause a denial of service (blocked admin logins). • http://dev2dev.bea.com/pub/advisory/155 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •