First published: Fri Feb 22 2008(Updated: )
BEA WebLogic Server and Express 7.0 through 10.0 allows remote attackers to conduct brute force password guessing attacks, even when account lockout has been activated, via crafted URLs that indicate whether a guessed password is successful or not.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BEA Weblogic Server | =7.0-sp7 | |
BEA Weblogic Server | =9.2-mp2 | |
BEA Weblogic Server | =8.1 | |
BEA Weblogic Server | =9.0 | |
BEA Weblogic Server | =9.2 | |
BEA Weblogic Server | =7.0-sp4 | |
BEA Weblogic Server | =7.0 | |
BEA Weblogic Server | =7.0-sp6 | |
BEA Weblogic Server | =7.0-sp3 | |
BEA Weblogic Server | =8.1-sp5 | |
BEA Weblogic Server | =8.1-sp3 | |
BEA Weblogic Server | =7.0-sp2 | |
BEA Weblogic Server | =7.0-sp5 | |
BEA Weblogic Server | =9.1 | |
BEA Weblogic Server | =10.0 | |
Bea Systems Weblogic Server | =10.0_mp1 | |
BEA Weblogic Server | =9.2-mp1 | |
BEA Weblogic Server | =8.1-sp2 | |
BEA Weblogic Server | =7.0-sp1 | |
BEA Weblogic Server | =8.1-sp6 | |
BEA Weblogic Server | =8.1-sp1 | |
BEA Weblogic Server | =8.1-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.