Page 4 of 105 results (0.005 seconds)

CVSS: 7.5EPSS: 1%CPEs: 16EXPL: 0

23 Jan 2007 — BEA WebLogic Server 6.1 through 6.1 SP7, and 7.0 through 7.0 SP7 allows remote attackers to cause a denial of service (disk consumption) via requests containing malformed headers, which cause a large amount of data to be written to the server log. BEA WebLogic Server 6.1 hasta 6.1 SP7, y 7.0 hasta 7.0 SP7 permite a atacantes remotos provocar denegación de servicio (consumo de disco) a través de respuestas que contienen cabeceras malformadas, lo cual provoca que una gran cantidad de datos sean escritos en el... • http://dev2dev.bea.com/pub/advisory/215 •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

23 Jan 2007 — Unspecified vulnerability in BEA WebLogic Platform and Server 8.1 through 8.1 SP5, and JRockit 1.4.2 R4.5 and earlier, allows attackers to gain privileges via unspecified vectors, related to an "overflow condition," probably a buffer overflow. Vulnerabilidad no especificada en BEA WebLogic Platform and Server 8.1 hasta 8.1 SP5, y JRockit 1.4.2 R4.5 y anteriores, permite a los atacantes obtener privilegios a través de vectores no especificados, relacionados con una "condición de desbordamiento", probablement... • http://dev2dev.bea.com/pub/advisory/222 •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

19 May 2006 — BEA WebLogic Server 8.1 before Service Pack 4 and 7.0 before Service Pack 6, may send sensitive data over non-secure channels when using JTA transactions, which allows remote attackers to read potentially sensitive network traffic. • http://dev2dev.bea.com/pub/advisory/195 •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

19 May 2006 — stopWebLogic.sh in BEA WebLogic Server 8.1 before Service Pack 4 and 7.0 before Service Pack 6 displays the administrator password to stdout when executed, which allows local users to obtain the password by viewing a local display. • http://dev2dev.bea.com/pub/advisory/181 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

19 May 2006 — BEA WebLogic Server 8.1 up to SP4 and 7.0 up to SP6 allows remote attackers to obtain the source code of JSP pages during certain circumstances related to a "timing window" when a compilation error occurs, aka the "JSP showcode vulnerability." • http://dev2dev.bea.com/pub/advisory/192 •

CVSS: 4.0EPSS: 0%CPEs: 17EXPL: 0

19 May 2006 — BEA WebLogic Server 8.1 up to SP4, 7.0 up to SP6, and 6.1 up to SP7 displays the internal IP address of the WebLogic server in the WebLogic Server Administration Console, which allows remote authenticated administrators to determine the address. • http://dev2dev.bea.com/pub/advisory/191 •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

19 May 2006 — The WebLogic Server Administration Console in BEA WebLogic Server 8.1 up to SP4 and 7.0 up to SP6 displays the domain name in the Console login form, which allows remote attackers to obtain sensitive information. • http://dev2dev.bea.com/pub/advisory/190 •

CVSS: 9.8EPSS: 0%CPEs: 19EXPL: 0

19 May 2006 — The HTTP handlers in BEA WebLogic Server 9.0, 8.1 up to SP5, 7.0 up to SP6, and 6.1 up to SP7 stores the username and password in cleartext in the WebLogic Server log when access to a web application or protected JWS fails, which allows attackers to gain privileges. • http://dev2dev.bea.com/pub/advisory/189 •

CVSS: 7.5EPSS: 0%CPEs: 40EXPL: 0

19 May 2006 — Multiple vulnerabilities in BEA WebLogic Server 8.1 through SP4, 7.0 through SP6, and 6.1 through SP7 leak sensitive information to remote attackers, including (1) DNS and IP addresses to address to T3 clients, (2) internal sensitive information using GetIORServlet, (3) certain "server details" in exceptions when invalid XML is provided, and (4) a stack trace in a SOAP fault. • http://dev2dev.bea.com/pub/advisory/187 •

CVSS: 7.5EPSS: 0%CPEs: 44EXPL: 0

19 May 2006 — Unspecified vulnerability in BEA WebLogic Server 9.1 and 9.0, 8.1 through SP5, 7.0 through SP6, and 6.1 through SP7 allows untrusted applications to obtain private server keys. • http://dev2dev.bea.com/pub/advisory/186 •