Page 16 of 124 results (0.005 seconds)

CVSS: 9.8EPSS: 23%CPEs: 3EXPL: 5

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). • https://github.com/Libraggbond/CVE-2018-3191 https://github.com/jas502n/CVE-2018-3191 https://github.com/m00zh33/CVE-2018-3191 https://github.com/arongmh/CVE-2018-3191 https://github.com/mackleadmire/CVE-2018-3191-Rce-Exploit http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105613 http://www.securitytracker.com/id/1041896 •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 4

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). • https://www.exploit-db.com/exploits/46513 https://github.com/pyn3rd/CVE-2018-3245 https://github.com/jas502n/CVE-2018-3245 https://github.com/ianxtianxt/CVE-2018-3245 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105613 http://www.securitytracker.com/id/1041896 • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.8EPSS: 9%CPEs: 3EXPL: 3

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). • https://github.com/pyn3rd/CVE-2018-3252 https://github.com/go-spider/CVE-2018-3252 https://github.com/jas502n/CVE-2018-3252 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105613 http://www.securitytracker.com/id/1041896 https://security.gentoo.org/glsa/201908-24 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Console). Supported versions that are affected are 10.3.6.0 and 12.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). • http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105654 http://www.securitytracker.com/id/1041896 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Docker Images). The supported version that is affected is prior to Docker 12.2.1.3.20180913. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). • http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105633 http://www.securitytracker.com/id/1041896 https://www.tenable.com/security/research/tra-2018-32 •