Page 26 of 152 results (0.002 seconds)

CVSS: 2.1EPSS: 0%CPEs: 18EXPL: 0

BEA WebLogic Server and Express 7.0 and 7.0.0.1 stores certain secrets concerning password encryption insecurely in config.xml, filerealm.properties, and weblogic-rar.xml, which allows local users to learn those secrets and decrypt passwords. • http://dev2dev.bea.com/pub/advisory/22 http://www.securityfocus.com/bid/7563 http://www.securityfocus.com/bid/7587 •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 0

BEA WebLogic Express and Server 7.0 through 8.1 SP 1, under certain circumstances when a request to use T3 over SSL (t3s) is made to the insecure T3 port, may use a non-SSL connection for the communication, which could allow attackers to sniff sessions. • http://dev2dev.bea.com/pub/advisory/32 http://www.securityfocus.com/bid/9034 •

CVSS: 2.1EPSS: 0%CPEs: 22EXPL: 0

Weblogic.admin for BEA WebLogic Server and Express 7.0 and 7.0.0.1 displays the JDBCConnectionPoolRuntimeMBean password to the screen in cleartext, which allows attackers to read a user's password by physically observing ("shoulder surfing") the screen. • http://dev2dev.bea.com/pub/advisory/22 http://www.securityfocus.com/bid/7563 •

CVSS: 5.0EPSS: 0%CPEs: 44EXPL: 0

The Node Manager for BEA WebLogic Express and Server 6.1 through 8.1 SP 1 allows remote attackers to cause a denial of service (Node Manager crash) via malformed data to the Node Manager's port, as demonstrated by nmap. • http://dev2dev.bea.com/pub/advisory/48 http://www.securityfocus.com/bid/9034 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

BEA Weblogic Express and Server 8.0 through 8.1 SP 1, when using a foreign Java Message Service (JMS) provider, echoes the password for the foreign provider to the console and stores it in cleartext in config.xml, which could allow attackers to obtain the password. • http://dev2dev.bea.com/pub/advisory/63 http://www.securityfocus.com/bid/9034 •