Description
BEA WebLogic Server and Express 7.0 through 10.0 allows remote attackers to conduct brute force password guessing attacks, even when account lockout has been activated, via crafted URLs that indicate whether a guessed password is successful or not.
CVSS Metrics
- Vector
- AV:N/AC:M/Au:N/C:C/I:N/A:N
- Access Vector
- network
- Access Cmplx
- medium
- Auth
- none
- Confidentiality
- complete
- Integrity
- none
- Availability
- none
- Weaknesses
- CWE-200CWE-255
Metadata
- Primary Vendor
- BEA
- Published
- 2/22/2008
- Last Modified
- 4/9/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
bea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea : weblogic_serverbea_systems : weblogic_server
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.