Page 21 of 137 results (0.009 seconds)

CVSS: 9.0EPSS: 97%CPEs: 5EXPL: 4

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). • https://github.com/B1anda0/CVE-2020-14883 https://github.com/murataydemir/CVE-2020-14883 https://github.com/amacloudobia/CVE-2020-14883 https://github.com/Osyanina/westone-CVE-2020-14883-scanner http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html https://www.oracle.com/security-alerts/cpuoct2020.html https://testbnull.medium.com/weblogic-rce-by-only-one-get-request-cve-2020-14882-analysis-6e4b09981dbf •

CVSS: 10.0EPSS: 97%CPEs: 5EXPL: 25

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). • https://www.exploit-db.com/exploits/49479 https://github.com/jas502n/CVE-2020-14882 https://github.com/s1kr10s/CVE-2020-14882 https://github.com/NS-Sp4ce/CVE-2020-14882 https://github.com/milo2012/CVE-2020-14882 https://github.com/XTeam-Wing/CVE-2020-14882 https://github.com/QmF0c3UK/CVE-2020-14882 https://github.com/corelight/CVE-2020-14882-weblogicRCE https://github.com/exploitblizzard/CVE-2020-14882-WebLogic https://github.com/kk98kk0/CVE-2020-14882 https://githu •

CVSS: 10.0EPSS: 2%CPEs: 5EXPL: 0

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). • https://www.oracle.com/security-alerts/cpuoct2020.html https://www.zerodayinitiative.com/advisories/ZDI-20-1275 •

CVSS: 9.8EPSS: 68%CPEs: 5EXPL: 0

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). • https://www.oracle.com/security-alerts/cpuoct2020.html https://www.zerodayinitiative.com/advisories/ZDI-20-1274 https://www.zerodayinitiative.com/advisories/ZDI-20-1276 •

CVSS: 9.8EPSS: 94%CPEs: 3EXPL: 0

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). • https://www.oracle.com/security-alerts/cpuoct2020.html https://www.zerodayinitiative.com/advisories/ZDI-20-1273 https://www.zerodayinitiative.com/advisories/ZDI-20-1277 https://www.zerodayinitiative.com/advisories/ZDI-20-1282 •