Page 7 of 167 results (0.003 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

23 May 2006 — A recommended admin password reset mechanism for BEA WebLogic Server 8.1, when followed before October 10, 2005, causes the administrator password to be stored in cleartext in the domain directory, which could allow attackers to gain privileges. • http://dev2dev.bea.com/pub/advisory/193 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

19 May 2006 — BEA WebLogic Server before 8.1 Service Pack 4 does not properly set the Quality of Service in certain circumstances, which prevents some transmissions from being encrypted via SSL, and allows remote attackers to more easily read potentially sensitive network traffic. • http://dev2dev.bea.com/pub/advisory/194 •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

19 May 2006 — BEA WebLogic Server 8.1 before Service Pack 4 and 7.0 before Service Pack 6, may send sensitive data over non-secure channels when using JTA transactions, which allows remote attackers to read potentially sensitive network traffic. • http://dev2dev.bea.com/pub/advisory/195 •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

19 May 2006 — stopWebLogic.sh in BEA WebLogic Server 8.1 before Service Pack 4 and 7.0 before Service Pack 6 displays the administrator password to stdout when executed, which allows local users to obtain the password by viewing a local display. • http://dev2dev.bea.com/pub/advisory/181 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

19 May 2006 — BEA WebLogic Server 8.1 up to SP4 and 7.0 up to SP6 allows remote attackers to obtain the source code of JSP pages during certain circumstances related to a "timing window" when a compilation error occurs, aka the "JSP showcode vulnerability." • http://dev2dev.bea.com/pub/advisory/192 •

CVSS: 4.0EPSS: 0%CPEs: 17EXPL: 0

19 May 2006 — BEA WebLogic Server 8.1 up to SP4, 7.0 up to SP6, and 6.1 up to SP7 displays the internal IP address of the WebLogic server in the WebLogic Server Administration Console, which allows remote authenticated administrators to determine the address. • http://dev2dev.bea.com/pub/advisory/191 •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

19 May 2006 — The WebLogic Server Administration Console in BEA WebLogic Server 8.1 up to SP4 and 7.0 up to SP6 displays the domain name in the Console login form, which allows remote attackers to obtain sensitive information. • http://dev2dev.bea.com/pub/advisory/190 •

CVSS: 9.8EPSS: 0%CPEs: 19EXPL: 0

19 May 2006 — The HTTP handlers in BEA WebLogic Server 9.0, 8.1 up to SP5, 7.0 up to SP6, and 6.1 up to SP7 stores the username and password in cleartext in the WebLogic Server log when access to a web application or protected JWS fails, which allows attackers to gain privileges. • http://dev2dev.bea.com/pub/advisory/189 •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

19 May 2006 — Unspecified vulnerability in the WebLogic Server Administration Console for BEA WebLogic Server 9.0 prevents the console from setting custom JDBC security policies correctly, which could allow attackers to bypass intended policies. • http://dev2dev.bea.com/pub/advisory/188 •

CVSS: 7.5EPSS: 0%CPEs: 40EXPL: 0

19 May 2006 — Multiple vulnerabilities in BEA WebLogic Server 8.1 through SP4, 7.0 through SP6, and 6.1 through SP7 leak sensitive information to remote attackers, including (1) DNS and IP addresses to address to T3 clients, (2) internal sensitive information using GetIORServlet, (3) certain "server details" in exceptions when invalid XML is provided, and (4) a stack trace in a SOAP fault. • http://dev2dev.bea.com/pub/advisory/187 •