BEA WebLogic Server and Express, when using NodeManager to start servers, provides Operator users with privileges to overwrite usernames and passwords, which may allow Operators to gain Admin privileges.
Max CVSS
10.0
EPSS Score
0.22%
Published
2003-08-27
Updated
2008-09-05
BEA WebLogic Server and Express 6.0 through 7.0 does not properly restrict access to certain internal servlets that perform administrative functions, which allows remote attackers to read arbitrary files or execute arbitrary code.
Max CVSS
7.5
EPSS Score
8.26%
Published
2003-03-24
Updated
2016-10-18
BEA WebLogic Server and Express version 7.0 SP3 may follow certain code execution paths that result in an incorrect current user, such as in the frequent use of JNDI initial contexts, which could allow remote authenticated users to gain privileges.
Max CVSS
7.2
EPSS Score
0.43%
Published
2003-12-31
Updated
2017-07-11
Multiple cross-site scripting (XSS) vulnerabilities in WebLogic Integration 7.0 and 2.0, Liquid Data 1.1, and WebLogic Server and Express 5.1 through 7.0, allow remote attackers to execute arbitrary web script and steal authentication credentials via (1) a forward instruction to the Servlet container or (2) other vulnerabilities in the WebLogic Server console application.
Max CVSS
6.8
EPSS Score
0.19%
Published
2003-10-20
Updated
2008-09-05
The Administration Console for BEA Tuxedo 8.1 and earlier allows remote attackers to determine the existence of files outside the web root via modified paths in the INIFILE argument.
Max CVSS
5.0
EPSS Score
1.00%
Published
2003-12-01
Updated
2017-07-11
The Administration Console for BEA Tuxedo 8.1 and earlier allows remote attackers to cause a denial of service (hang) via pathname arguments that contain MS-DOS device names such as CON and AUX.
Max CVSS
5.0
EPSS Score
1.26%
Published
2003-12-01
Updated
2017-07-11
BEA WebLogic Server proxy plugin for BEA Weblogic Express and Server 6.1 through 8.1 SP 1 allows remote attackers to cause a denial of service (proxy plugin crash) via a malformed URL.
Max CVSS
5.0
EPSS Score
0.35%
Published
2003-12-31
Updated
2008-09-10
BEA WebLogic Express and Server 7.0 through 8.1 SP 1, under certain circumstances when a request to use T3 over SSL (t3s) is made to the insecure T3 port, may use a non-SSL connection for the communication, which could allow attackers to sniff sessions.
Max CVSS
5.0
EPSS Score
0.16%
Published
2003-12-31
Updated
2008-09-10
BEA Weblogic Express and Server 8.0 through 8.1 SP 1, when using a foreign Java Message Service (JMS) provider, echoes the password for the foreign provider to the console and stores it in cleartext in config.xml, which could allow attackers to obtain the password.
Max CVSS
5.0
EPSS Score
0.23%
Published
2003-12-31
Updated
2008-09-10
The Node Manager for BEA WebLogic Express and Server 6.1 through 8.1 SP 1 allows remote attackers to cause a denial of service (Node Manager crash) via malformed data to the Node Manager's port, as demonstrated by nmap.
Max CVSS
5.0
EPSS Score
0.35%
Published
2003-12-31
Updated
2008-09-10
BEA WebLogic Server and WebLogic Express 6.1, 7.0, and 8.1, with RMI and anonymous admin lookup enabled, allows remote attackers to obtain configuration information by accessing MBeanHome via the Java Naming and Directory Interface (JNDI).
Max CVSS
5.0
EPSS Score
1.15%
Published
2003-12-31
Updated
2017-07-20
BEA WebLogic Server 6.1, 7.0 and 7.0.0.1, when routing messages to a JMS target domain that is inaccessible, may leak the user's password when it throws a ResourceAllocationException.
Max CVSS
4.6
EPSS Score
0.06%
Published
2003-12-31
Updated
2017-07-11
BEA WebLogic Server and Express 7.0 and 7.0.0.1, when using "memory" session persistence for web applications, does not clear authentication information when a web application is redeployed, which could allow users of that application to gain access without having to re-authenticate.
Max CVSS
4.6
EPSS Score
0.06%
Published
2003-03-18
Updated
2017-07-11
Cross-site scripting (XSS) vulnerability in the Administration Console for BEA Tuxedo 8.1 and earlier allows remote attackers to inject arbitrary web script via the INIFILE argument.
Max CVSS
4.3
EPSS Score
0.31%
Published
2003-12-01
Updated
2017-07-11
Cross-site scripting (XSS) vulnerability in InteractiveQuery.jsp for BEA WebLogic 8.1 and earlier allows remote attackers to inject malicious web script via the person parameter.
Max CVSS
4.3
EPSS Score
0.21%
Published
2003-12-01
Updated
2017-07-11
Race condition in BEA WebLogic Server and Express 5.1 through 7.0.0.1, when using in-memory session replication or replicated stateful session beans, causes the same buffer to be provided to two users, which could allow one user to see session data that was intended for another user.
Max CVSS
4.3
EPSS Score
0.20%
Published
2003-12-31
Updated
2017-07-29
Weblogic.admin for BEA WebLogic Server and Express 7.0 and 7.0.0.1 displays the JDBCConnectionPoolRuntimeMBean password to the screen in cleartext, which allows attackers to read a user's password by physically observing ("shoulder surfing") the screen.
Max CVSS
2.1
EPSS Score
0.04%
Published
2003-12-31
Updated
2008-09-10
The default CredentialMapper for BEA WebLogic Server and Express 7.0 and 7.0.0.1 stores passwords in cleartext on disk, which allows local users to extract passwords.
Max CVSS
2.1
EPSS Score
0.04%
Published
2003-12-31
Updated
2008-09-10
BEA WebLogic Server and Express 7.0 and 7.0.0.1 stores certain secrets concerning password encryption insecurely in config.xml, filerealm.properties, and weblogic-rar.xml, which allows local users to learn those secrets and decrypt passwords.
Max CVSS
2.1
EPSS Score
0.04%
Published
2003-12-31
Updated
2008-09-10
BEA WebLogic Express and WebLogic Server 7.0 and 7.0.0.1, stores passwords in plaintext when a keystore is used to store a private key or trust certificate authorities, which allows local users to gain access.
Max CVSS
2.1
EPSS Score
0.04%
Published
2003-12-31
Updated
2018-10-30
20 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!