Page 7 of 97 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 33EXPL: 0

31 Dec 2005 — BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, and 7.0 SP5 and earlier, do not encrypt multicast traffic, which might allow remote attackers to read sensitive cluster synchronization messages by sniffing the multicast traffic. • http://dev2dev.bea.com/pub/advisory/157 •

CVSS: 9.8EPSS: 1%CPEs: 39EXPL: 0

31 Dec 2005 — BEA WebLogic Server and WebLogic Express 8.1 SP5 and earlier, and 7.0 SP6 and earlier, when using username/password authentication, does not lock out a username after the maximum number of invalid login attempts, which makes it easier for remote attackers to guess the password. • http://dev2dev.bea.com/pub/advisory/161 •

CVSS: 7.5EPSS: 0%CPEs: 76EXPL: 0

24 May 2005 — BEA WebLogic Server and WebLogic Express 8.1 SP2 and SP3 allows users with the Monitor security role to "shrink or reset JDBC connection pools." • http://dev2dev.bea.com/pub/advisory/125 •

CVSS: 7.5EPSS: 0%CPEs: 76EXPL: 0

24 May 2005 — BEA WebLogic Server and WebLogic Express 8.1 through Service Pack 3 and 7.0 through Service Pack 5 does not properly handle when a security provider throws an exception, which may cause WebLogic to use incorrect identity for the thread, or to fail to audit security exceptions. • http://dev2dev.bea.com/pub/advisory/126 •

CVSS: 9.8EPSS: 0%CPEs: 76EXPL: 0

24 May 2005 — The UserLogin control in BEA WebLogic Portal 8.1 through Service Pack 3 prints the password to standard output when an incorrect login attempt is made, which could make it easier for attackers to guess the correct password. • http://dev2dev.bea.com/pub/advisory/128 •

CVSS: 7.5EPSS: 0%CPEs: 76EXPL: 0

24 May 2005 — The cluster cookie parsing code in BEA WebLogic Server 7.0 through Service Pack 5 attempts to contact any host or port specified in a cookie, even when it is not in the cluster, which allows remote attackers to cause a denial of service (cluster slowdown) via modified cookies. • http://dev2dev.bea.com/pub/advisory/129 •

CVSS: 6.8EPSS: 3%CPEs: 76EXPL: 0

24 May 2005 — Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Server and Express 8.1 through Service Pack 4, and 7.0 through Service Pack 6, allow remote attackers to inject arbitrary web script or HTML, and possibly gain administrative privileges, via the (1) j_username or (2) j_password parameters in the login page (LoginForm.jsp), (3) parameters to the error page in the Administration Console, (4) unknown vectors in the Server Console while the administrator has an active session to obtain the ADMI... • http://dev2dev.bea.com/pub/advisory/130 •

CVSS: 7.5EPSS: 0%CPEs: 76EXPL: 0

24 May 2005 — The embedded LDAP server in BEA WebLogic Server and Express 8.1 through Service Pack 4, and 7.0 through Service Pack 5, allows remote anonymous binds, which may allow remote attackers to view user entries or cause a denial of service. • http://dev2dev.bea.com/pub/advisory/131 •

CVSS: 7.5EPSS: 0%CPEs: 76EXPL: 0

24 May 2005 — Buffer overflow in BEA WebLogic Server and WebLogic Express 6.1 Service Pack 4 allows remote attackers to cause a denial of service (CPU consumption from thread looping). • http://dev2dev.bea.com/pub/advisory/132 •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

15 Feb 2005 — BEA WebLogic Server 7.0 Service Pack 5 and earlier, and 8.1 Service Pack 3 and earlier, generates different login exceptions that suggest why an authentication attempt fails, which makes it easier for remote attackers to guess passwords via brute force attacks. • http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA05-74.00.jsp •