Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
bea weblogic server 8.1 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2004-2424
BEA WebLogic Server and WebLogic Express 8.1 up to and including 8.1 SP2 allow remote malicious users to cause a denial of service (network port consumption) via unknown actions in HTTPS sessions, which prevents the server from releasing the network port when the session ends.
Bea Weblogic Server 8.1
7.5
CVSSv2
CVE-2006-0426
BEA WebLogic Server and WebLogic Express 8.1 through SP4, when configuration auditing is enabled and a password change occurs, stores the old and new passwords in cleartext in the DefaultAuditRecorder.log file, which could allow malicious users to gain privileges.
Bea Weblogic Server 8.1
2.1
CVSSv2
CVE-2006-0431
Unspecified vulnerability in BEA WebLogic Server and WebLogic Express 8.1 SP5 allows untrusted applications to obtain the server's SSL identity via unknown attack vectors.
Bea Weblogic Server 8.1
4.6
CVSSv2
CVE-2004-0712
The configuration tools (1) config.sh in Unix or (2) config.cmd in Windows for BEA WebLogic Server 8.1 through SP2 create a log file that contains the administrative username and password in cleartext, which could allow local users to gain privileges.
Bea Weblogic Server 8.1
2.1
CVSSv2
CVE-2004-2321
BEA WebLogic Server and Express 8.1 SP1 and previous versions allows local users in the Operator role to obtain administrator passwords via MBean attributes, including (1) ServerStartMBean.Password and (2) NodeManagerMBean.CertificatePassword.
Bea Weblogic Server 8.1
4
CVSSv2
CVE-2005-4758
Unspecified vulnerability in the Administration server in BEA WebLogic Server and WebLogic Express 8.1 SP3 and previous versions allows remote authenticated Admin users to read arbitrary files via unknown attack vectors related to an "internal servlet" accessed through ...
Bea Weblogic Server 8.1
4.3
CVSSv2
CVE-2005-2092
BEA Systems WebLogic 8.1 SP1 allows remote malicious users to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes WebLogic...
Bea Weblogic Server 8.1
5
CVSSv2
CVE-2006-2461
BEA WebLogic Server prior to 8.1 Service Pack 4 does not properly set the Quality of Service in certain circumstances, which prevents some transmissions from being encrypted via SSL, and allows remote malicious users to more easily read potentially sensitive network traffic.
Bea Weblogic Server 8.1
5
CVSSv2
CVE-2006-2546
A recommended admin password reset mechanism for BEA WebLogic Server 8.1, when followed before October 10, 2005, causes the administrator password to be stored in cleartext in the domain directory, which could allow malicious users to gain privileges.
Bea Weblogic Server 8.1
5
CVSSv2
CVE-2005-4754
BEA WebLogic Server and WebLogic Express 8.1 SP3 and previous versions allow remote malicious users to obtain sensitive information (intranet IP addresses) via unknown attack vectors involving "network address translation."
Bea Weblogic Server 8.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »