CVE-2008-0901
22.02.2008, 21:44
BEA WebLogic Server and Express 7.0 through 10.0 allows remote attackers to conduct brute force password guessing attacks, even when account lockout has been activated, via crafted URLs that indicate whether a guessed password is successful or not.Enginsight
Vendor | Product | Version |
---|---|---|
bea | weblogic_server | 7.0 |
bea | weblogic_server | 7.0:sp1 |
bea | weblogic_server | 7.0:sp2 |
bea | weblogic_server | 7.0:sp3 |
bea | weblogic_server | 7.0:sp4 |
bea | weblogic_server | 7.0:sp5 |
bea | weblogic_server | 7.0:sp6 |
bea | weblogic_server | 7.0:sp7 |
bea | weblogic_server | 8.1 |
bea | weblogic_server | 8.1:sp1 |
bea | weblogic_server | 8.1:sp2 |
bea | weblogic_server | 8.1:sp3 |
bea | weblogic_server | 8.1:sp4 |
bea | weblogic_server | 8.1:sp5 |
bea | weblogic_server | 8.1:sp6 |
bea | weblogic_server | 9.0 |
bea | weblogic_server | 9.1 |
bea | weblogic_server | 9.2 |
bea | weblogic_server | 9.2:mp1 |
bea | weblogic_server | 9.2:mp2 |
bea | weblogic_server | 10.0 |
bea_systems | weblogic_server | 10.0_mp1:_mp1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References