CVE-2005-4749
https://notcve.org/view.php?id=CVE-2005-4749
HTTP request smuggling vulnerability in BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP6 and earlier, and 6.1 SP7 and earlier allows remote attackers to inject arbitrary HTTP headers via unspecified attack vectors. • http://dev2dev.bea.com/pub/advisory/159 http://dev2dev.bea.com/pub/advisory/177 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 http://www.securityfocus.com/bid/17163 •
CVE-2005-4761
https://notcve.org/view.php?id=CVE-2005-4761
BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP5 and earlier, and 6.1 SP7 and earlier log the Java command line at server startup, which might include sensitive information (passwords or keyphrases) in the server log file when the -D option is used. • http://dev2dev.bea.com/pub/advisory/152 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •
CVE-2005-4762
https://notcve.org/view.php?id=CVE-2005-4762
BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP6 and earlier, and 6.1 SP7 and earlier sometimes stores the boot password in the registry in cleartext, which might allow local users to gain administrative privileges. • http://dev2dev.bea.com/pub/advisory/153 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •
CVE-2005-4763
https://notcve.org/view.php?id=CVE-2005-4763
BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP6 and earlier, and 6.1 SP7 and earlier, when Internet Inter-ORB Protocol (IIOP) is used, sometimes include a password in an exception message that is sent to a client or stored in a log file, which might allow remote attackers to perform unauthorized actions. • http://dev2dev.bea.com/pub/advisory/154 http://secunia.com/advisories/17138 http://www.securityfocus.com/bid/15052 •
CVE-2005-4704
https://notcve.org/view.php?id=CVE-2005-4704
Unspecified vulnerability in BEA WebLogic Server and WebLogic Express 8.1 through SP3, 7.0 through SP6, and 6.1 through SP7, when SSL is intended to be used, causes an unencrypted protocol to be used in certain unspecified circumstances, which causes user credentials to be sent across the network in cleartext and allows remote attackers to gain privileges. • http://dev2dev.bea.com/pub/advisory/140 http://www.osvdb.org/20094 •