A recommended admin password reset mechanism for BEA WebLogic Server 8.1, when followed before October 10, 2005, causes the administrator password to be stored in cleartext in the domain directory, which could allow attackers to gain privileges.
References
Configurations
History
21 Nov 2024, 00:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://dev2dev.bea.com/pub/advisory/193 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/20130 - Vendor Advisory | |
References | () http://securitytracker.com/id?1016101 - | |
References | () http://www.vupen.com/english/advisories/2006/1828 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26460 - |
Information
Published : 2006-05-23 10:06
Updated : 2024-11-21 00:11
NVD link : CVE-2006-2546
Mitre link : CVE-2006-2546
CVE.ORG link : CVE-2006-2546
JSON object : View
Products Affected
bea
- weblogic_server
CWE