Bea

Weblogic Server

149 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

BEA WebLogic Server and Express 8.1, SP1 and earlier, stores the administrator password in cleartext in config.xml, which allows local users to gain privileges.

  • EPSS 6.94%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

The default configuration of BEA WebLogic Server and Express 8.1 SP2 and earlier, 7.0 SP4 and earlier, 6.1 through SP6, and 5.1 through SP13 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tr...

  • EPSS 0.03%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

BEA WebLogic Server and Express 8.1 SP1 and earlier allows local users in the Operator role to obtain administrator passwords via MBean attributes, including (1) ServerStartMBean.Password and (2) NodeManagerMBean.CertificatePassword.

  • EPSS 1.12%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

BEA WebLogic Server and WebLogic Express 8.1 through 8.1 SP2 allow remote attackers to cause a denial of service (network port consumption) via unknown actions in HTTPS sessions, which prevents the server from releasing the network port when the sess...

  • EPSS 0.55%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

BEA WebLogic Server and WebLogic Express 6.1, 7.0, and 8.1, when using Remote Method Invocation (RMI) over Internet Inter-ORB Protocol (IIOP), does not properly handle when multiple logins for different users coming from the same client, which could ...

Exploit
  • EPSS 77.62%
  • Published 06.08.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1....

  • EPSS 0.1%
  • Published 06.08.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

BEA WebLogic Server and WebLogic Express 7.0 through 7.0 Service Pack 4, and 8.1 through 8.1 Service Pack 2, allows attackers to obtain the username and password for booting the server by directly accessing certain internal methods.

  • EPSS 0.91%
  • Published 27.07.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

The URL pattern matching feature in BEA WebLogic Server 6.x matches illegal patterns ending in "*" as wildcards as if they were the legal "/*" pattern, which could cause WebLogic 7.x to allow remote attackers to bypass intended access restrictions be...

  • EPSS 0.11%
  • Published 27.07.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

The configuration tools (1) config.sh in Unix or (2) config.cmd in Windows for BEA WebLogic Server 8.1 through SP2 create a log file that contains the administrative username and password in cleartext, which could allow local users to gain privileges...

  • EPSS 0.62%
  • Published 27.07.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

The remove method in a stateful Enterprise JavaBean (EJB) in BEA WebLogic Server and WebLogic Express version 8.1 through SP2, 7.0 through SP4, and 6.1 through SP6, does not properly check EJB permissions before unexporting a bean, which allows remot...