Page 48 of 324 results (0.016 seconds)

CVSS: 2.1EPSS: 0%CPEs: 20EXPL: 0

Unspecified vulnerability in BEA WebLogic Server and WebLogic Express 9.0 and 8.1 through SP5 allows malicious EJBs or servlet applications to decrypt system passwords, possibly by accessing functionality that should have been restricted. • http://dev2dev.bea.com/pub/advisory/171 http://secunia.com/advisories/18592 http://securitytracker.com/id?1015528 http://www.osvdb.org/22774 http://www.securityfocus.com/bid/16358 http://www.vupen.com/english/advisories/2006/0313 https://exchange.xforce.ibmcloud.com/vulnerabilities/24291 •

CVSS: 6.4EPSS: 2%CPEs: 33EXPL: 0

Multiple unspecified vulnerabilities in BEA WebLogic Server and WebLogic Express 8.1 through SP4, 7.0 through SP6, and 6.1 through SP7 allow remote attackers to access MBean attributes or cause an unspecified denial of service via unknown attack vectors. • http://dev2dev.bea.com/pub/advisory/166 http://secunia.com/advisories/18592 http://securitytracker.com/id?1015528 http://www.securityfocus.com/bid/16358 http://www.vupen.com/english/advisories/2006/0313 https://exchange.xforce.ibmcloud.com/vulnerabilities/24294 •

CVSS: 5.0EPSS: 1%CPEs: 30EXPL: 0

Certain configurations of BEA WebLogic Server and WebLogic Express 9.0, 8.1 through SP5, and 7.0 through SP6, when connection filters are enabled, cause the server to run more slowly, which makes it easier for remote attackers to cause a denial of service (server slowdown). • http://dev2dev.bea.com/pub/advisory/174 http://secunia.com/advisories/18592 http://securitytracker.com/id?1015528 http://www.securityfocus.com/bid/16358 http://www.vupen.com/english/advisories/2006/0313 https://exchange.xforce.ibmcloud.com/vulnerabilities/24301 •

CVSS: 4.0EPSS: 0%CPEs: 33EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 through SP4, 7.0 through SP6, and 6.1 through SP7 allows remote authenticated guest users to read the server log and obtain sensitive configuration information. • http://dev2dev.bea.com/pub/advisory/168 http://secunia.com/advisories/18592 http://securitytracker.com/id?1015528 http://www.osvdb.org/22776 http://www.securityfocus.com/bid/16358 http://www.vupen.com/english/advisories/2006/0313 https://exchange.xforce.ibmcloud.com/vulnerabilities/24295 •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

BEA WebLogic Server and WebLogic Express 8.1 through SP4, when configuration auditing is enabled and a password change occurs, stores the old and new passwords in cleartext in the DefaultAuditRecorder.log file, which could allow attackers to gain privileges. • http://dev2dev.bea.com/pub/advisory/170 http://secunia.com/advisories/18592 http://securitytracker.com/id?1015528 http://www.osvdb.org/22775 http://www.securityfocus.com/bid/16358 http://www.vupen.com/english/advisories/2006/0313 https://exchange.xforce.ibmcloud.com/vulnerabilities/24290 •