• Skip to main content
  • Skip to footer

Audit My PC - Free Internet Security Audit

Firewall Test and web tools to check your security and privacy

  • Firewall Test
  • Anti Spam
  • Internet Speed Test
  • Sitemap Generator
  • Whats My IP

BEA WebLogic WSRP Crafted Request Restriction Bypass

Network Security News – Tuesday, January 31, 2006 Events

BEA WebLogic WSRP Crafted Request Restriction Bypass

A remote unauthorized access flaw exists in BEA WebLogic Portal Web Services Remote Portlets (WSRP). Certain carefully crafted URLs' might allow a remote user to access unintended web resources even if those resources are located behind a firewall. Any site using Web Services Remote Portlets (WSRP) of WebLogic Portal are susceptible to this vulnerability.. Read more at osvdb.org/22767

Cisco VPN 3000 Concentrator Crafted HTTP Packet DoS

Cisco VPN Conentrator 3000 contains a flaw that may allow a remote denial of service. The issue is triggered when a specially crafted HTTP packet is sent to the service, which will lead to the device being rebooted. This will result in loss of availability for the platform.. Read more at osvdb.org/22754

BEA WebLogic Application Code Password Decryption

BEA WebLogic Server contains a flaw that may allow a malicious user to create an application that can decrypt system passwords. It is possible that the flaw may allow access to decrypted system passwords, resulting in a loss of confidentiality.. Read more at osvdb.org/22774

BEA WebLogic Configuration Auditing Log Cleartext Credential Disclosure

BEA WebLogic contains a flaw that may lead to an unauthorized information disclosure. With configuration auditing enabled, password changes will cause an auditing event that logs the password to the 'DefaultAuditRecorder.log' file in cleartext, resulting in a loss of confidentiality.. Read more at osvdb.org/22775

BEA WebLogic Server Log Remote Disclosure

BEA WebLogic Server contains a flaw that may allow an authenticated user to access the server's log files. No further details have been provided.. Read more at osvdb.org/22776

Lucid CMS Login Form login: Field SQL Injection

Lucid CMS contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the login form script not properly sanitizing user-supplied input to the 'login' field. This may allow an attacker to inject or manipulate SQL queries in the backend database.. Read more at osvdb.org/19885

jPortal download.php Search Field SQL Injection

jPortal contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the download.php script not properly sanitizing user-supplied input to the 'word' variable in the search field. This may allow an attacker to inject or manipulate SQL queries in the backend database.. Read more at osvdb.org/19694

Interchange submit.html SQL Injection

Interchange contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the pages/forum/submit.html script not properly sanitizing user-supplied input to unspecified variable(s). This may allow an attacker to inject or manipulate SQL queries in the backend database.. Read more at osvdb.org/19652

Oracle Multiple Product PL/SQL Gateway PLSQLExclusion List Bypass

Oracle PL/SQL Gateway (a component of iAS, OAS and the Oracle HTTP Server) contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is caused by a failure to filter user input when referencing the PLSQLExclusion list. This flaw may lead to a loss of integrity.. Read more at osvdb.org/22719

Reader Interactions

Leave a Reply

Your email address will not be published. Required fields are marked *

Footer

Miscellaneous

  • Free Address Finder
  • HTML Encoder Decoder
  • Website Monitoring
  • Whats My IP Address?
  • Yes or No

Copyright © 2001-2024 Audit My PC .com All Rights Reserved. Our Privacy Policy and TOS

  • About
  • Acronyms
  • DLL Files
  • Ports
  • Computer Security News
  • Email Scams & Spam
  • Internet Safety
  • Free Software