BEA WebLogic Server and Express 7.0 through 10.0 allows remote attackers to conduct brute force password guessing attacks, even when account lockout has been activated, via crafted URLs that indicate whether a guessed password is successful or not.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://dev2dev.bea.com/pub/advisory/271 - Patch | |
References | () http://secunia.com/advisories/29041 - | |
References | () http://www.s21sec.com/avisos/s21sec-040-en.txt - | |
References | () http://www.securityfocus.com/archive/1/488686/100/0/threaded - | |
References | () http://www.securitytracker.com/id?1019449 - | |
References | () http://www.vupen.com/english/advisories/2008/0612/references - |
Information
Published : 2008-02-22 21:44
Updated : 2024-11-21 00:43
NVD link : CVE-2008-0901
Mitre link : CVE-2008-0901
CVE.ORG link : CVE-2008-0901
JSON object : View
Products Affected
bea
- weblogic_server
bea_systems
- weblogic_server