Page 5 of 152 results (0.005 seconds)

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

23 Jan 2007 — The WSEE runtime (WS-Security runtime) in BEA WebLogic Server 9.0 and 9.1 does not verify credentials when decrypting client messages, which allows remote attackers to bypass application security. El entorno de ejecución WSEE (WS-Security runtime) en BEA WebLogic Server 9.0 y 0.1 no verifican las credenciales cuando descifran mensajes del cliente, lo cual permite a atacantes remotos evitar la seguridad de la aplicación. • http://dev2dev.bea.com/pub/advisory/210 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

23 Jan 2007 — The BEA WebLogic Server proxy plug-in before June 2006 for the Apache HTTP Server does not properly handle protocol errors, which allows remote attackers to cause a denial of service (server outage). El plug-in de proxy de BEA WebLogic Server anterior a Junio de 2006 para el Apache HTTP Server no maneja adecuadamente errores de protocolo, lo cual permite a atacantes remotos provocar una denegación de servicio (apagón del servidor). • http://dev2dev.bea.com/pub/advisory/213 •

CVSS: 7.5EPSS: 1%CPEs: 16EXPL: 0

23 Jan 2007 — BEA WebLogic Server 6.1 through 6.1 SP7, and 7.0 through 7.0 SP7 allows remote attackers to cause a denial of service (disk consumption) via requests containing malformed headers, which cause a large amount of data to be written to the server log. BEA WebLogic Server 6.1 hasta 6.1 SP7, y 7.0 hasta 7.0 SP7 permite a atacantes remotos provocar denegación de servicio (consumo de disco) a través de respuestas que contienen cabeceras malformadas, lo cual provoca que una gran cantidad de datos sean escritos en el... • http://dev2dev.bea.com/pub/advisory/215 •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

23 Jan 2007 — BEA WebLogic Server 7.0 through 7.0 SP6, 8.1 through 8.1 SP5, 9.0, and 9.1 does not enforce a security policy that declares permissions for EJB methods that have array parameters, which allows remote attackers to obtain unauthorized access to these methods. BEA WebLogic Server 7.0 hasta 7.0 SP6, 8.1 hasta 8.1 SP5, 9.0, y 9.1 no hace cmplir las políticas de seguridad que declara los permisos para los métodos EJB que tienen parámetros array, lo cual permite a atacantes remotos obtener acceso no autorizado a e... • http://dev2dev.bea.com/pub/advisory/212 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

23 Jan 2007 — BEA WebLogic Server 8.1 through 8.1 SP5 stores cleartext data in a backup of config.xml after offline editing, which allows local users to obtain sensitive information by reading this backup file. BEA WebLogic Server versiones 8.1 hasta 8.1 SP5, almacena los datos en texto sin cifrar en una copia de seguridad del archivo config.xml después de la edición offline, lo que permite a usuarios locales obtener información confidencial mediante la lectura de este archivo de copia de seguridad. • http://dev2dev.bea.com/pub/advisory/207 •

CVSS: 7.5EPSS: 2%CPEs: 15EXPL: 0

23 Jan 2007 — Unspecified vulnerability in the thread management in BEA WebLogic 7.0 through 7.0 SP6, 8.1 through 8.1 SP5, 9.0, and 9.1, when T3 authentication is used, allows remote attackers to cause a denial of service (thread and system hang) via unspecified "sequences of events." Vulnerabilidad no especificada en la administración de hilos en BEA WebLogic 7.0 hasta 7.0 SP6, 8.1 hasta 8.1 SP5, 9.0, y 9.1, cuando se usa la autenticación T3, permite a atacantes remotos provocar una denegación de servicio (cuelgue de hi... • http://dev2dev.bea.com/pub/advisory/204 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

23 May 2006 — A recommended admin password reset mechanism for BEA WebLogic Server 8.1, when followed before October 10, 2005, causes the administrator password to be stored in cleartext in the domain directory, which could allow attackers to gain privileges. • http://dev2dev.bea.com/pub/advisory/193 •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

19 May 2006 — BEA WebLogic Server 8.1 before Service Pack 4 and 7.0 before Service Pack 6, may send sensitive data over non-secure channels when using JTA transactions, which allows remote attackers to read potentially sensitive network traffic. • http://dev2dev.bea.com/pub/advisory/195 •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

19 May 2006 — stopWebLogic.sh in BEA WebLogic Server 8.1 before Service Pack 4 and 7.0 before Service Pack 6 displays the administrator password to stdout when executed, which allows local users to obtain the password by viewing a local display. • http://dev2dev.bea.com/pub/advisory/181 •

CVSS: 7.5EPSS: 0%CPEs: 40EXPL: 0

19 May 2006 — Multiple vulnerabilities in BEA WebLogic Server 8.1 through SP4, 7.0 through SP6, and 6.1 through SP7 leak sensitive information to remote attackers, including (1) DNS and IP addresses to address to T3 clients, (2) internal sensitive information using GetIORServlet, (3) certain "server details" in exceptions when invalid XML is provided, and (4) a stack trace in a SOAP fault. • http://dev2dev.bea.com/pub/advisory/187 •