January 31st, 2021 📆 | 4928 Views ⚑
# Exploit Title: Oracle WebLogic Server 12.2.1.0 - RCE (Unauthenticated) # Google Dork: inurl:"/console/login/LoginForm.jsp" # Date: 01/26/2021 # Exploit Author:
January 27th, 2021 📆 | 5006 Views ⚑
# Exploit Title: Oracle WebLogic Server 12.2.1.0 – RCE (Unauthenticated)# Google Dork: inurl:\”/console/login/LoginForm.jsp\”# Date: 25/1/2021# Exploit Author: CHackA0101# Vendor Homepage:
January 23rd, 2021 📆 | 3044 Views ⚑
# Exploit Title: Oracle WebLogic Server 14.1.1.0 - RCE (Authenticated) # Date: 2021-01-21 # Exploit Author: Photubias # Vendor Advisory:
January 23rd, 2021 📆 | 4862 Views ⚑
# Exploit Title: Oracle WebLogic Server 14.1.1.0 – RCE (Authenticated)# Date: 2021-01-21# Exploit Author: Photubias # Vendor Advisory: 1] https://www.oracle.com/security-alerts/cpujan2021.html#
November 19th, 2020 📆 | 3625 Views ⚑
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStagerinclude
November 3rd, 2020 📆 | 6269 Views ⚑
Oracle has released an emergency patch after a security vulnerability was revealed in its WebLogic middleware last week. The security
November 3rd, 2020 📆 | 6652 Views ⚑
Oracle Rushes Emergency Fix for Critical WebLogic Server Flaw Threatpost Source link
November 1st, 2020 📆 | 5204 Views ⚑
Here’s an overview of some of last week’s most interesting news and articles: Easily exploitable RCE in Oracle WebLogic Server
October 30th, 2020 📆 | 6370 Views ⚑
#!/usr/bin/python3 # Exploit Title: Oracle WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 - Unauthenticated RCE via
October 29th, 2020 📆 | 5105 Views ⚑
#!/usr/bin/python3 # Exploit Title: Oracle WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 – Unauthenticated RCE via
May 23rd, 2020 📆 | 3943 Views ⚑
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include
May 21st, 2020 📆 | 3991 Views ⚑
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = NormalRanking include Msf::Exploit::Remote::Tcpinclude Msf::Exploit::CmdStagerinclude Msf::Exploit::Powershellinclude Msf::Exploit::Remote::AutoCheck
May 18th, 2020 📆 | 7745 Views ⚑
WebLogic Arbitrary File Read(CVE-2019-2615) & WebLogic File Upload(CVE-2019-2618) with Pocsuite3 by Knownsec 404 team source
May 1st, 2020 📆 | 6097 Views ⚑
Enterprise software giant Oracle published an urgent security alert last night, urging companies that run WebLogic servers to install the
April 15th, 2020 📆 | 3137 Views ⚑
# Exploit Title: Oracle WebLogic Server 12.2.1.4.0 - Remote Code Execution # Author: nu11secur1ty # Date: 2020-03-31 # Vendor: Oracle
April 15th, 2020 📆 | 4680 Views ⚑
# Exploit Title: Oracle WebLogic Server 12.2.1.4.0 – Remote Code Execution# Author: nu11secur1ty# Date: 2020-03-31# Vendor: Oracle# Software Link: https://download.oracle.com/otn/nt/middleware/12c/122140/fmw_12.2.1.4.0_wls_Disk1_1of1.zip
April 4th, 2020 📆 | 7362 Views ⚑
c0d#: https://github.com/nu11secur1ty/ORACLE/tree/master/CVE-2020-2555 c0d#: https://github.com/nu11secur1ty/Windows10Exploits/tree/master/Undefined/CVE-2020-2555 1nf0: Successful attacks of this vulnerability can result in a takeover of Oracle Coherence. CVSS 3.0
January 9th, 2020 📆 | 8320 Views ⚑
# Exploit Title: Oracle Weblogic 10.3.6.0.0 - Remote Command Execution # Date: 2020-01-08 # Exploit Author: Waffles & Paveway3 #
November 1st, 2019 📆 | 8139 Views ⚑
Exploit Windows Oracle WebLogic Server RCE ] | Weblogic Deserialize Remote Code Execution Vulnerability | Oracle Weblogic Server |
August 20th, 2019 📆 | 5344 Views ⚑
Oracle on Tuesday announced a patch for a remote code execution vulnerability affecting specific versions of the WebLogic Server. The
Comments