CVE-2018-3191
https://notcve.org/view.php?id=CVE-2018-3191
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). • https://github.com/Libraggbond/CVE-2018-3191 https://github.com/jas502n/CVE-2018-3191 https://github.com/m00zh33/CVE-2018-3191 https://github.com/arongmh/CVE-2018-3191 https://github.com/mackleadmire/CVE-2018-3191-Rce-Exploit http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105613 http://www.securitytracker.com/id/1041896 •
CVE-2018-3245 – Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass)
https://notcve.org/view.php?id=CVE-2018-3245
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). • https://www.exploit-db.com/exploits/46513 https://github.com/pyn3rd/CVE-2018-3245 https://github.com/jas502n/CVE-2018-3245 https://github.com/ianxtianxt/CVE-2018-3245 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105613 http://www.securitytracker.com/id/1041896 • CWE-502: Deserialization of Untrusted Data •
CVE-2018-3252
https://notcve.org/view.php?id=CVE-2018-3252
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). • https://github.com/pyn3rd/CVE-2018-3252 https://github.com/go-spider/CVE-2018-3252 https://github.com/jas502n/CVE-2018-3252 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105613 http://www.securitytracker.com/id/1041896 https://security.gentoo.org/glsa/201908-24 •
CVE-2018-3201
https://notcve.org/view.php?id=CVE-2018-3201
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). The supported version that is affected is 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). • http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105611 http://www.securitytracker.com/id/1041896 •
CVE-2018-3246
https://notcve.org/view.php?id=CVE-2018-3246
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). Supported versions that are affected are 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). • http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105628 http://www.securitytracker.com/id/1041896 https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html •