Page 18 of 132 results (0.004 seconds)

CVSS: 5.1EPSS: 0%CPEs: 20EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 SP3 and earlier, and 7.0 SP5 and earlier, when fullyDelegatedAuthorization is enabled for a servlet, does not cause servlet deployment to fail when failures occur in authorization or role providers, which might prevent the servlet from being "fully protected." • http://dev2dev.bea.com/pub/advisory/151 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •

CVSS: 1.2EPSS: 0%CPEs: 57EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP5 and earlier, and 6.1 SP7 and earlier log the Java command line at server startup, which might include sensitive information (passwords or keyphrases) in the server log file when the -D option is used. • http://dev2dev.bea.com/pub/advisory/152 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •

CVSS: 7.5EPSS: 2%CPEs: 43EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP6 and earlier, and 6.1 SP7 and earlier, when Internet Inter-ORB Protocol (IIOP) is used, sometimes include a password in an exception message that is sent to a client or stored in a log file, which might allow remote attackers to perform unauthorized actions. • http://dev2dev.bea.com/pub/advisory/154 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •

CVSS: 7.8EPSS: 0%CPEs: 68EXPL: 0

BEA WebLogic Server and WebLogic Express 9.0, 8.1, and 7.0 lock out the admin user account after multiple incorrect password guesses, which allows remote attackers who know or guess the admin account name to cause a denial of service (blocked admin logins). • http://dev2dev.bea.com/pub/advisory/155 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •

CVSS: 7.6EPSS: 0%CPEs: 36EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier and 7.0 SP6 and earlier, when using the weblogic.Deployer command with the t3 protocol, does not use the secure t3s protocol even when an Administration port is enabled on the Administration server, which might allow remote attackers to sniff the connection. • http://dev2dev.bea.com/pub/advisory/156 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •