{"vulnerability": "CVE-2020-1464", "sightings": [{"uuid": "e672c3e1-742c-41a1-96a6-89c7f6964755", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1464", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:18.000000Z"}, {"uuid": "1609bef1-51bc-44a0-ae84-84f017532dc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1464", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "ded4efbd-8458-4984-afd2-a33edfb873bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14644", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-09-20T18:10:03.000000Z"}, {"uuid": "48aea432-242d-444a-abbb-ff960e6336c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1464", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971018", "content": "", "creation_timestamp": "2024-12-24T20:23:06.981140Z"}, {"uuid": "e492f80c-52d8-4e08-b96f-51ad767513cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1464", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:46.000000Z"}, {"uuid": "f058622a-4a99-46d5-9b65-ca210bb0ac65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14644", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:46.000000Z"}, {"uuid": "1f1af90e-4588-4b26-9381-e95ad37c0bfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14644", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:58.000000Z"}, {"uuid": "5f6fa89b-5af1-4d77-bee6-73b3ae288836", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14644", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}, {"uuid": "54f971db-c9c8-457e-8c81-8b58ce0af331", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14645", "type": "published-proof-of-concept", "source": "https://t.me/cKure/1374", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()\n\nhttps://github.com/Y4er/CVE-2020-14645", "creation_timestamp": "2020-07-20T09:17:31.000000Z"}, {"uuid": "8afd8b3e-92b3-4783-b43e-c1f27cc5e4f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-1464", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=499", "content": "", "creation_timestamp": "2020-08-12T04:00:00.000000Z"}, {"uuid": "9bd8c2a6-9b3c-4918-ae9f-6d6570238f48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-1464", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/7aea06c5-6670-41af-911d-2ea361eb58c6", "content": "", "creation_timestamp": "2026-02-02T12:28:51.753356Z"}, {"uuid": "f90490c7-5b38-4908-a50a-9171c06b345b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-14644", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/a87d0113-9c53-48cd-9e90-4373c1364376", "content": "", "creation_timestamp": "2026-02-02T12:26:28.092094Z"}, {"uuid": "f76f883c-1c12-4d98-9919-1d27298f2494", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14644", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m4yhkxy6yh2w", "content": "", "creation_timestamp": "2025-11-06T21:02:27.668939Z"}, {"uuid": "00afddf3-5b45-4ad4-9bca-d6894532371c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14645", "type": "seen", "source": "https://t.me/arpsyndicate/265", "content": "#ExploitObserverAlert\n\nCVE-2020-14645\n\nDESCRIPTION: Exploit Observer has 34 entries related to CVE-2020-14645. Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\n\nFIRST-EPSS: 0.040850000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-19T14:34:54.000000Z"}, {"uuid": "9cf35f6e-461b-4fdf-9b0f-7bb9e8dc72ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1464", "type": "seen", "source": "https://t.me/arpsyndicate/938", "content": "#ExploitObserverAlert\n\nCVE-2020-1464\n\nDESCRIPTION: Exploit Observer has 6 entries related to CVE-2020-1464. A spoofing vulnerability exists when Windows incorrectly validates file signatures, aka 'Windows Spoofing Vulnerability'.\n\nFIRST-EPSS: 0.033460000\nNVD-IS: 3.6\nNVD-ES: 1.8", "creation_timestamp": "2023-12-03T13:08:13.000000Z"}, {"uuid": "d85acdeb-8b34-441f-beba-671c2c957307", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1464", "type": "exploited", "source": "https://t.me/SecLabNews/8418", "content": "\u041d\u0430 \u043c\u0438\u043d\u0443\u0432\u0448\u0435\u0439 \u043d\u0435\u0434\u0435\u043b\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043f\u0430\u043a\u0435\u0442 \u043f\u043b\u0430\u043d\u043e\u0432\u044b\u0445 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0438\u0445 \u0431\u043e\u043b\u0435\u0435 \u0441\u043e\u0442\u043d\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 13 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0432 \u041e\u0421 Windows (CVE-2020-1464) \u0438 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 Internet Explorer 11 (CVE-2020-1380), \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438. \u0427\u0442\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e, \u043d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0438, \u0442\u0435\u0445\u043d\u043e\u0433\u0438\u0433\u0430\u043d\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b CVE-2020-1464 \u0442\u043e\u043b\u044c\u043a\u043e \u0441\u043f\u0443\u0441\u0442\u044f \u0434\u0432\u0430 \u0433\u043e\u0434\u0430 \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u043e \u043d\u0435\u0439 \u0441\u0442\u0430\u043b\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e.\n\n \nMicrosoft 2 \u0433\u043e\u0434\u0430 \u043e\u0442\u043a\u043b\u0430\u0434\u044b\u0432\u0430\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 0Day-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Windows", "creation_timestamp": "2020-08-18T01:01:58.000000Z"}, {"uuid": "a6192086-10a4-48c5-8c04-14c8ba3d5c7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1464", "type": "exploited", "source": "https://t.me/true_secator/839", "content": "\u0412\u0447\u0435\u0440\u0430 Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0435 \u043c\u0435\u0441\u044f\u0447\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 120 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, 17 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438 \u043d\u0430\u0438\u0432\u044b\u0441\u0448\u0438\u0439 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0441\u0442\u0438, \u0430 \u0434\u0432\u0435 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f.\n\n\u041f\u0435\u0440\u0432\u0430\u044f 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-1464 \u043a\u0430\u0441\u0430\u0435\u0442\u0441\u044f \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043f\u043e\u0434\u043f\u0438\u0441\u0438 \u0444\u0430\u0439\u043b\u043e\u0432 Windows \u0438 \u043f\u0440\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0437\u0430\u0433\u0440\u0443\u0437\u0438\u0442\u044c \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e \u043f\u043e\u0434\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0439 \u0444\u0430\u0439\u043b. \u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043d\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b.\n\n\u0412\u0442\u043e\u0440\u0430\u044f 0-day, CVE-2020-1380, \u0431\u044b\u043b\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0430 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u0438\u043c\u0438 \u0438 \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u0432 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0435 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u0432 Internet Explorer. \u041f\u0440\u0438 \u044d\u0442\u043e\u043c, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u044d\u0442\u043e\u0442 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0438 \u0434\u0440\u0443\u0433\u0438\u043c \u041f\u041e \u043e\u0442 Microsoft, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, Office, \u043e\u0448\u0438\u0431\u043a\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0438 \u044d\u0442\u0438 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0445\u0430\u043a\u0435\u0440\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438 \u0431\u044b\u043b\u0430 \u043d\u0430\u0439\u0434\u0435\u043d\u0430 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 (\u0442\u043e \u0435\u0441\u0442\u044c \u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0435\u0435 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445). \n\n\u041a\u0430\u043a \u0432\u0441\u0435\u0433\u0434\u0430, \u0432\u0441\u0435\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u043c \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b Microsoft \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u0441\u0440\u043e\u0447\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f.", "creation_timestamp": "2020-08-12T11:34:34.000000Z"}, {"uuid": "147e7b76-1eb1-42c9-b988-13542814e985", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1464", "type": "exploited", "source": "https://t.me/xakep_ru/9580", "content": "Microsoft \u0434\u0432\u0430 \u0433\u043e\u0434\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u043b\u0430 \u043d\u0430\u0445\u043e\u0434\u0438\u0432\u0448\u0443\u044e\u0441\u044f \u043f\u043e\u0434 \u0430\u0442\u0430\u043a\u0430\u043c\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\n\n\u041e\u0434\u0438\u043d \u0438\u0437 \u043f\u0430\u0442\u0447\u0435\u0439, \u0432\u043e\u0448\u0435\u0434\u0448\u0438\u0439 \u0432 \u0441\u043e\u0441\u0442\u0430\u0432 \u0430\u0432\u0433\u0443\u0441\u0442\u043e\u0432\u0441\u043a\u043e\u0433\u043e \u00ab\u0432\u0442\u043e\u0440\u043d\u0438\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439\u00bb, \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0432\u0448\u0443\u044e \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u043e\u0432\u044b\u0432\u0430\u0442\u044c \u0444\u0430\u0439\u043b\u044b MSI \u0432\u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u0435 \u0444\u0430\u0439\u043b\u044b Java, \u0441\u043e\u0445\u0440\u0430\u043d\u044f\u044f \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u0443\u044e \u0446\u0438\u0444\u0440\u043e\u0432\u0443\u044e \u043f\u043e\u0434\u043f\u0438\u0441\u044c. \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0436\u0435 \u0434\u0430\u0432\u043d\u043e \u043d\u0430\u0445\u043e\u0434\u0438\u043b\u0430\u0441\u044c \u043f\u043e\u0434 \u0430\u0442\u0430\u043a\u0430\u043c\u0438, \u043d\u043e \u043d\u0430 \u0435\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0443 Microsoft \u043f\u043e\u0447\u0435\u043c\u0443-\u0442\u043e \u0443\u0448\u043b\u043e \u0434\u0432\u0430 \u0433\u043e\u0434\u0430.\n\nhttps://xakep.ru/2020/08/20/cve-2020-1464/", "creation_timestamp": "2020-08-20T10:35:11.000000Z"}, {"uuid": "4c6ebf21-5e29-4fb4-9233-9d3457fe2224", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1464", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/1780", "content": "CVE-2020-1464:\nWindows Spoofing Vulnerability (GlueBall) - \nwild-exploited vulnerability (PoC)\nhttps://medium.com/@TalBeerySec/glueball-the-story-of-cve-2020-1464-50091a1f98bd", "creation_timestamp": "2020-09-20T13:33:13.000000Z"}, {"uuid": "fe725542-b519-4def-9d00-da49dc429004", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14645", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1452", "content": "#exploit\nCVE-2020-14645:\nOracle WebLogic Server / Fusion Middleware (Core) versions 10.3.6, 12.1.3, 12.2.1.3, 12.2.1.4, 14.1.1 - Unauthenticated network access via IIOP, T3 to compromise Oracle WebLogic Server\n]-&gt; PoC (Weblogic UniversalExtractor JNDI injection getDatabaseMetaData() ):\nhttps://github.com/Y4er/CVE-2020-14645", "creation_timestamp": "2022-06-19T21:49:23.000000Z"}]}