{"vulnerability": "CVE-2020-1488", "sightings": [{"uuid": "63f8e0be-41d8-4473-ab38-3ffdc25b6199", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/aeef081a-31b4-4de5-b985-3d516fb9820b", "content": "", "creation_timestamp": "2020-11-23T16:32:52.000000Z"}, {"uuid": "3c31bd5b-ebd8-4f80-9bcd-e059a31fe88a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/882c6b58-b6dc-4e0d-adb0-d79be8878736", "content": "", "creation_timestamp": "2020-11-10T00:52:11.000000Z"}, {"uuid": "10602430-5ed5-4ba5-9e14-8908a17ad6ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:19.000000Z"}, {"uuid": "d03a4637-6b6e-4225-a374-f1293b60d816", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:19.000000Z"}, {"uuid": "e42955ba-1f0a-465b-8a1c-f4f310ffda1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "999fd4a8-0b8f-4c97-9235-7f742b6fe84d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "ae9ec8f9-58fd-48ea-8625-3fdd1ab947f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/933a8ed4-359e-43c9-b17d-2b112172a581", "content": "", "creation_timestamp": "2020-11-12T19:00:08.000000Z"}, {"uuid": "caeede3c-1104-4599-a391-b81c917d60b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/50398c3a-0744-45bd-860b-b682579f0f1d", "content": "", "creation_timestamp": "2020-11-13T23:13:27.000000Z"}, {"uuid": "77c2a516-76d1-4e4a-b849-0a9d926524c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/16b905de-36f5-4003-b965-a6f2fb32a01d", "content": "", "creation_timestamp": "2020-11-12T23:00:05.000000Z"}, {"uuid": "bd04b0f4-7baf-484b-bea3-c725f821fbb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/618f66f3-43f7-4171-a1e8-23c823e87694", "content": "", "creation_timestamp": "2020-11-13T23:00:06.000000Z"}, {"uuid": "e22d7089-d0df-4a56-b11a-4413fb4a7392", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/1b150de0-5e34-404d-adb6-81425e876e20", "content": "", "creation_timestamp": "2020-11-13T23:07:11.000000Z"}, {"uuid": "942bc7a5-f36f-493c-afb7-78911ac8b80f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/48155bf7-590f-4f27-bbd3-a50b89a146e5", "content": "", "creation_timestamp": "2020-11-13T23:01:07.000000Z"}, {"uuid": "a8722aa6-3bdb-4948-bb23-968f6b0bb80d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/92804a20-6d9f-4168-bd3f-64dc54cb5ec4", "content": "", "creation_timestamp": "2020-11-13T23:12:25.000000Z"}, {"uuid": "bc999bab-5c1a-4d0c-ac04-98975d761ac2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/76542698-6ca5-4b11-9b39-29d4edea6a18", "content": "", "creation_timestamp": "2020-11-13T23:10:19.000000Z"}, {"uuid": "745caf59-18ce-4982-9663-b0308403afe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/f3006094-2597-4c6c-8ea4-ea356ff5fe8d", "content": "", "creation_timestamp": "2020-11-13T23:05:08.000000Z"}, {"uuid": "04cbc2df-3b4d-4c4d-97ef-e8456fd9cee3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/8a011035-b27d-43ca-b008-5f895cf4547d", "content": "", "creation_timestamp": "2020-11-13T23:04:08.000000Z"}, {"uuid": "914a552a-e5c0-4f5e-817d-ac38c21e448f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1488", "type": "seen", "source": "MISP/08aa5b12-2e40-4988-a2c3-52124f4edcfb", "content": "", "creation_timestamp": "2021-01-05T11:43:12.000000Z"}, {"uuid": "2c0c6927-f1e6-4af0-92a6-ed2cad0de3ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/8ee71921-aa20-4921-8ac4-db7fbdde4c38", "content": "", "creation_timestamp": "2020-11-23T19:00:13.000000Z"}, {"uuid": "15cdb706-4318-46b0-93e9-0455db77adc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/1a950cd0-9ba2-48fc-a8be-a59520acd0ff", "content": "", "creation_timestamp": "2020-11-13T23:09:16.000000Z"}, {"uuid": "3cf22255-4f80-4c9f-9c76-c5fdfe191b37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/4de36144-65e3-4e39-9cee-73f8f1426fae", "content": "", "creation_timestamp": "2020-11-13T23:03:08.000000Z"}, {"uuid": "a84cdb16-a201-493f-a920-b0311e1c5753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/8fe1b256-caca-4680-88bb-d90868dc4d21", "content": "", "creation_timestamp": "2020-11-13T23:02:07.000000Z"}, {"uuid": "693dc29f-cfb9-4263-85f7-b193081d2365", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/9b87af5a-aa36-48d8-b25f-8917cad5e84c", "content": "", "creation_timestamp": "2020-11-13T23:06:10.000000Z"}, {"uuid": "17fd5e9d-643e-4e29-8844-346cc1f0a85b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-29)", "content": "", "creation_timestamp": "2024-12-29T00:00:00.000000Z"}, {"uuid": "c5e7757d-7dd7-40ff-9db7-c26e0233f5fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2970957", "content": "", "creation_timestamp": "2024-12-24T20:22:17.689221Z"}, {"uuid": "4b817ef9-8a55-453e-b55e-6028220bf620", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2970959", "content": "", "creation_timestamp": "2024-12-24T20:22:19.351059Z"}, {"uuid": "18c300fb-f9f5-462b-a63c-7a9dabbb0780", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2970958", "content": "", "creation_timestamp": "2024-12-24T20:22:18.522170Z"}, {"uuid": "35633f9b-0915-4440-aa33-60f9fdc18b98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/16cc62a2-d1f9-4d2d-a1b9-fa29e623c8c0", "content": "", "creation_timestamp": "2024-11-14T06:10:12.000000Z"}, {"uuid": "202782a9-187a-4262-9972-cefa175e3fbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "12ad2127-e0d3-44f8-a128-2fa9508394fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "https://bsky.app/profile/zxqa.bsky.social/post/3lgmbkwo53s2o", "content": "", "creation_timestamp": "2025-01-26T01:28:52.413635Z"}, {"uuid": "891c7340-b783-4006-936b-2c2311239485", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "https://bsky.app/profile/zxqa.bsky.social/post/3lgmbkwokrc2o", "content": "", "creation_timestamp": "2025-01-26T01:28:52.915196Z"}, {"uuid": "7bd376eb-a176-4536-bd01-75342bb10fd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "https://bsky.app/profile/zxqa.bsky.social/post/3lgmbkwonp22o", "content": "", "creation_timestamp": "2025-01-26T01:28:53.406618Z"}, {"uuid": "61954c5a-c218-4431-8f42-0ecb40b68f22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "https://bsky.app/profile/zxqa.bsky.social/post/3lgmbkwopnk2o", "content": "", "creation_timestamp": "2025-01-26T01:28:53.910901Z"}, {"uuid": "7dba3737-3090-4e01-b790-7aba5d15c181", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-18)", "content": "", "creation_timestamp": "2024-12-18T00:00:00.000000Z"}, {"uuid": "93e1ae1a-e2e9-43ed-8135-73f5f4d92389", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-02)", "content": "", "creation_timestamp": "2025-02-02T00:00:00.000000Z"}, {"uuid": "97cf2578-dd51-42fa-9e26-2953f2cafe37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "7cfb4378-a477-425f-9616-f76124b74f65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:46.000000Z"}, {"uuid": "7893999d-2fab-4356-8e49-4c1b2a5feded", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-26)", "content": "", "creation_timestamp": "2025-01-26T00:00:00.000000Z"}, {"uuid": "411f43c7-93dd-46fd-b48e-feb6e509ed26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:24.000000Z"}, {"uuid": "1f1c90cf-ae40-4b36-8c60-65cb5326bb0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-27)", "content": "", "creation_timestamp": "2025-02-27T00:00:00.000000Z"}, {"uuid": "46fe25ba-81f2-4d3b-a083-385b1279f3fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-07)", "content": "", "creation_timestamp": "2025-01-07T00:00:00.000000Z"}, {"uuid": "62104e9f-9311-48af-a4a6-0fb5b670385a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:24.000000Z"}, {"uuid": "7fad6eb2-66cb-4092-8ff5-9de3313b7246", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-12)", "content": "", "creation_timestamp": "2025-02-12T00:00:00.000000Z"}, {"uuid": "e756fccd-e850-42ed-a73d-31127ba2b1db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-15)", "content": "", "creation_timestamp": "2025-02-15T00:00:00.000000Z"}, {"uuid": "52a7f533-a9b7-4d73-8d77-0bf3a717f609", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-10)", "content": "", "creation_timestamp": "2025-03-10T00:00:00.000000Z"}, {"uuid": "79693144-b91a-45ab-bf0b-5d529c813486", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:46.000000Z"}, {"uuid": "00fae01e-2429-4a1e-93fc-32c6897d91ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-25)", "content": "", "creation_timestamp": "2025-06-25T00:00:00.000000Z"}, {"uuid": "2fa26f9f-9359-4dac-a691-f23afa1d546b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-28)", "content": "", "creation_timestamp": "2025-05-28T00:00:00.000000Z"}, {"uuid": "b694af1c-635f-4156-8886-ac714427daa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-15)", "content": "", "creation_timestamp": "2025-06-15T00:00:00.000000Z"}, {"uuid": "3731fe28-4f5a-4acd-bff9-126aee57e72f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-08)", "content": "", "creation_timestamp": "2025-07-08T00:00:00.000000Z"}, {"uuid": "60b4ca2f-e12b-4343-90c0-6e0a065df9b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-20)", "content": "", "creation_timestamp": "2025-07-20T00:00:00.000000Z"}, {"uuid": "f3fffa17-0d36-40fe-b3fb-6836011f7d81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-05)", "content": "", "creation_timestamp": "2025-09-05T00:00:00.000000Z"}, {"uuid": "cb1d36a8-b260-4244-98c4-e847a66547f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-26)", "content": "", "creation_timestamp": "2025-07-26T00:00:00.000000Z"}, {"uuid": "9e734124-5a75-4d31-947a-9895edb1d156", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-27)", "content": "", "creation_timestamp": "2025-07-27T00:00:00.000000Z"}, {"uuid": "bd343fda-0d49-4c89-b4f1-89c384494f89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-07)", "content": "", "creation_timestamp": "2025-09-07T00:00:00.000000Z"}, {"uuid": "9279d0b2-4250-4840-8779-4ec9cd24d3bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-05)", "content": "", "creation_timestamp": "2025-08-05T00:00:00.000000Z"}, {"uuid": "45cd5f23-be50-4116-bc06-e0d8ba349d16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-28)", "content": "", "creation_timestamp": "2025-07-28T00:00:00.000000Z"}, {"uuid": "5e1472d9-e020-49fa-8462-35efbfaa5e7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-28)", "content": "", "creation_timestamp": "2025-11-28T00:00:00.000000Z"}, {"uuid": "0a6934aa-7d2b-4499-a431-4d88aeb71ab3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-07)", "content": "", "creation_timestamp": "2025-09-07T00:00:00.000000Z"}, {"uuid": "aa0d0f4d-8db6-4792-b20f-f24371e63668", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "https://sploitus.com/exploit?id=D7E0435A-B0DC-5738-9678-CCB2A1877CED", "content": "", "creation_timestamp": "2025-11-04T19:18:46.000000Z"}, {"uuid": "590d8cf1-6969-4a39-9e08-02c61de8cf5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-21)", "content": "", "creation_timestamp": "2025-08-21T00:00:00.000000Z"}, {"uuid": "d2b7178c-9f41-4883-a37a-d80fa17e8374", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-24)", "content": "", "creation_timestamp": "2025-11-24T00:00:00.000000Z"}, {"uuid": "1c07afed-137a-4de4-9104-687bde30069c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "https://sploitus.com/exploit?id=F60F47DE-0A09-59E0-B958-8DA532E06CA9", "content": "", "creation_timestamp": "2025-10-29T08:56:59.000000Z"}, {"uuid": "105692c0-0ed9-483f-94fe-864301d2f7b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:40.000000Z"}, {"uuid": "d68daaf4-8bc6-44fb-ae83-870b5696c983", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-26)", "content": "", "creation_timestamp": "2025-11-26T00:00:00.000000Z"}, {"uuid": "e7c605dd-4009-4972-9253-5de096e8769a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-26)", "content": "", "creation_timestamp": "2025-08-26T00:00:00.000000Z"}, {"uuid": "e6768fe6-d845-4106-9682-b6ef20b0274f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:00:51.000000Z"}, {"uuid": "824a2132-1e0c-4e99-95c3-c498621c2392", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-30)", "content": "", "creation_timestamp": "2025-11-30T00:00:00.000000Z"}, {"uuid": "b35faee1-79c4-4f08-97f3-e717f6fb5a17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-29)", "content": "", "creation_timestamp": "2025-11-29T00:00:00.000000Z"}, {"uuid": "c399d667-141a-43ce-82d0-3aa0a79745d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-30)", "content": "", "creation_timestamp": "2025-08-30T00:00:00.000000Z"}, {"uuid": "4fc76492-53af-4e6b-b2bd-e95415a130c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-01)", "content": "", "creation_timestamp": "2025-09-01T00:00:00.000000Z"}, {"uuid": "1eac3721-8ed6-43b0-9807-7dd32ffcc830", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/weblogic_admin_handle_rce.rb", "content": "", "creation_timestamp": "2020-11-18T21:46:12.000000Z"}, {"uuid": "f8613a15-2290-4c8e-b43a-3208fd9a1fb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/weblogic_admin_handle_rce.rb", "content": "", "creation_timestamp": "2020-11-18T21:46:12.000000Z"}, {"uuid": "022045d9-9a2c-47b6-a85d-9dfd993a58d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-02)", "content": "", "creation_timestamp": "2026-02-02T00:00:00.000000Z"}, {"uuid": "27e99bbf-1c2e-4341-a477-f6b47df7293a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-02)", "content": "", "creation_timestamp": "2025-09-02T00:00:00.000000Z"}, {"uuid": "76950807-2290-498a-a575-678d43613228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-19)", "content": "", "creation_timestamp": "2026-02-19T00:00:00.000000Z"}, {"uuid": "08165108-61a0-4fd8-884f-2ab77daadbec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-07)", "content": "", "creation_timestamp": "2025-12-07T00:00:00.000000Z"}, {"uuid": "0a20e497-2540-41c9-be67-cd1643fcc691", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-18)", "content": "", "creation_timestamp": "2026-02-18T00:00:00.000000Z"}, {"uuid": "ae6ee7c9-b298-4ea5-bf80-e09493cf749b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/7b6fe835-de06-466c-81de-4a2b79b8cb00", "content": "", "creation_timestamp": "2026-02-02T12:28:59.503650Z"}, {"uuid": "c1fcfafb-d64f-47f9-a85d-1c8d5d6b4ed3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-22)", "content": "", "creation_timestamp": "2026-03-22T00:00:00.000000Z"}, {"uuid": "59c5d288-5655-409f-a26e-79b5e0a24d8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=521", "content": "", "creation_timestamp": "2020-10-21T04:00:00.000000Z"}, {"uuid": "3bfabbac-ef08-4fc8-9a4a-78d413a085c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/havaittu-aktiivista-oracle-weblogic-palvelimen-hyvaksikayttoa", "content": "", "creation_timestamp": "2020-10-29T08:58:33.000000Z"}, {"uuid": "ec4f114f-e107-47ac-9ac4-e6a82a6bbdb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-04)", "content": "", "creation_timestamp": "2026-01-04T00:00:00.000000Z"}, {"uuid": "ebad14c1-abe5-41c8-aba9-fe5782361bde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-14883", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/2ff26e73-8fb3-45c9-af05-97e29862cbf0", "content": "", "creation_timestamp": "2026-02-02T12:28:59.630493Z"}, {"uuid": "9ac17dfe-1c44-459f-b5bc-229d18c409a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "Telegram/b0MrL-7YyNVMwlRE8cQmf3aSFWZZuNk0ErN3GEJH-SnDaRk", "content": "", "creation_timestamp": "2025-12-10T09:00:05.000000Z"}, {"uuid": "123538d5-0356-4a67-8c6a-38b325b052ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/62327", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aPoC for testing if a target is vulnerable to RCE\nURL\uff1ahttps://github.com/b1g-b33f/CVE-2020-14882\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-12-10T01:02:52.000000Z"}, {"uuid": "b12d3e76-d614-461f-a35b-1fd47fc64985", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "Telegram/D5Tu51kSkXbo-9bxr-qOR_ZOPzuIV30YFNBGrLAWHGZFmmE", "content": "", "creation_timestamp": "2025-11-05T09:00:05.000000Z"}, {"uuid": "d46eaf9f-89f3-41c2-b0ae-4fb678ea5dc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "https://t.me/cKure/2634", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 Weblogic RCE via GET request \u2014 CVE-2020-14882 Analysis.\n\nhttps://testbnull.medium.com/weblogic-rce-by-only-one-get-request-cve-2020-14882-analysis-6e4b09981dbf", "creation_timestamp": "2020-10-29T03:15:09.000000Z"}, {"uuid": "e7e73e7e-96ed-422a-a3e7-962ae194cf3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-07)", "content": "", "creation_timestamp": "2026-04-07T00:00:00.000000Z"}, {"uuid": "5db8434d-7aab-44fa-abcd-05edc669ff4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-20)", "content": "", "creation_timestamp": "2026-04-20T00:00:00.000000Z"}, {"uuid": "5fed7b39-b31c-4c76-8fd5-7c4d0d5f4c40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "https://t.me/cKure/2742", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 PoC for vulnerabilities CVE-2020-14750 and cve-2020-14882.\n\nhttps://github.com/pprietosanchez/CVE-2020-14750", "creation_timestamp": "2020-11-09T07:18:55.000000Z"}, {"uuid": "9ea541d5-625f-4dd7-81ae-b31dc71ab193", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "https://t.me/cKure/2784", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 CVE-2020\u201314882 Weblogic Unauthorized bypass RCE.\n\nhttps://github.com/jas502n/CVE-2020-14882", "creation_timestamp": "2020-11-12T09:41:33.000000Z"}, {"uuid": "f39be474-362f-4f7b-8e44-0a3ef9b0b49b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "published-proof-of-concept", "source": "https://github.com/google/tsunami-security-scanner-plugins/tree/master/google/detectors/rce/weblogic/cve202014883", "content": "", "creation_timestamp": "2022-05-24T15:38:11.000000Z"}, {"uuid": "fc71338a-d971-4351-a366-0fc6f9457d8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "https://github.com/google/tsunami-security-scanner-plugins/tree/master/community/detectors/weblogic_cve_2020_14882", "content": "", "creation_timestamp": "2021-11-15T02:06:20.000000Z"}, {"uuid": "c012b506-5a2d-497b-947b-bda100b95acb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "Telegram/caij09sOPuuBeC304jRRvBvD9LlQUDPKfbno9eirkYzkJcU", "content": "", "creation_timestamp": "2025-11-04T23:00:11.000000Z"}, {"uuid": "6488050c-e303-4441-b67c-e93c6c3fa2c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "Telegram/QfC4LAdZu33D3A3VK5OiGvSsYspyvT6PX4iARyhNVRZ9-WQ", "content": "", "creation_timestamp": "2025-10-29T11:00:10.000000Z"}, {"uuid": "8a348821-7460-4533-a95f-ba02e9caef1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "published-proof-of-concept", "source": "Telegram/5CPDoGea4VxlGpUWdnippgkEikQaqjZZ0eR1kfQrZYnd55E", "content": "", "creation_timestamp": "2025-11-06T15:00:06.000000Z"}, {"uuid": "94e1efaa-5e23-4f87-8999-f69e3e32fe17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "Telegram/k6hHUJVRmEVte2QfNLuU8-v67rBZSq4t8lJINPEEK3muAg", "content": "", "creation_timestamp": "2023-11-22T10:48:36.000000Z"}, {"uuid": "34f2dfb1-c45d-4285-95c4-f9428365ce70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "exploited", "source": "https://t.me/itsec_news/3872", "content": "\u200b\u26a1\ufe0f\u0413\u0440\u0443\u043f\u043f\u0430 8220 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0442\u0440\u0451\u0445 \u043a\u043e\u043d\u0442\u0438\u043d\u0435\u043d\u0442\u0430\u0445 \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Oracle WebLogic\n\n\ud83d\udcac \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Imperva \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 8220, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0449\u0435\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u043e\u0441\u0442\u0438 \u0432 Oracle WebLogic Server \u0434\u043b\u044f \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0441\u0432\u043e\u0435\u0433\u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f.\n\n\u0420\u0435\u0447\u044c \u0438\u0434\u0451\u0442 \u043e CVE-2020-14883 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS 7.2), \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0439 \u0441\u043e\u0431\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 (RCE), \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0437\u0430\u0445\u0432\u0430\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432.\n\n\u00ab\u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u044b\u043c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u0433\u0430\u0434\u0436\u0435\u0442\u043e\u0432 \u0438 \u0447\u0430\u0441\u0442\u043e \u0441\u0432\u044f\u0437\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0441 CVE-2020-14882 (\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0442\u0430\u043a\u0436\u0435 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0435\u0439 Oracle WebLogic Server) \u0438\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0443\u0442\u0435\u0447\u0435\u043a, \u0443\u043a\u0440\u0430\u0434\u0435\u043d\u043d\u044b\u0445 \u0438\u043b\u0438 \u0441\u043b\u0430\u0431\u044b\u0445 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445\u00bb, \u2014 \u0433\u043e\u0432\u043e\u0440\u0438\u0442\u0441\u044f \u0432 \u043e\u0442\u0447\u0451\u0442\u0435 Imperva.\n\n\u0413\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 8220 \u0443\u0436\u0435 \u0438\u043c\u0435\u0435\u0442 \u043e\u043f\u044b\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u0441 \u0446\u0435\u043b\u044c\u044e \u043a\u0440\u0438\u043f\u0442\u043e\u0434\u0436\u0435\u043a\u0438\u043d\u0433\u0430. \u0412 \u043c\u0430\u0435 \u044d\u0442\u043e\u0433\u043e \u0433\u043e\u0434\u0430 \u043e\u043d\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0434\u0440\u0443\u0433\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Oracle WebLogic ( CVE-2017-3506 , \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 7.4) \u0434\u043b\u044f \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0432 \u0431\u043e\u0442\u043d\u0435\u0442 \u0434\u043b\u044f \u043c\u0430\u0439\u043d\u0438\u043d\u0433\u0430 \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442\u044b.\n\n\u041d\u0435\u0434\u0430\u0432\u043d\u0438\u0435 \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u0430\u0442\u0430\u043a, \u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 Imperva, \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 CVE-2020-14883 \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u0434\u0433\u043e\u0442\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0445 XML-\u0444\u0430\u0439\u043b\u043e\u0432 \u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0433\u043e \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u043a\u043e\u0434\u0430, \u043e\u0442\u0432\u0435\u0447\u0430\u044e\u0449\u0435\u0433\u043e \u0437\u0430 \u0440\u0430\u0437\u0432\u0451\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u0434\u043b\u044f \u043a\u0440\u0430\u0436\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u043c\u0430\u0439\u043d\u0438\u043d\u0433\u0430 \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442\u044b, \u0442\u0430\u043a\u043e\u0433\u043e \u043a\u0430\u043a Agent Tesla, rhajk \u0438 nasqa.\n\n\u00ab\u0421\u043a\u043b\u0430\u0434\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u043e\u0449\u0443\u0449\u0435\u043d\u0438\u0435, \u0447\u0442\u043e \u0433\u0440\u0443\u043f\u043f\u0430 \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u043d\u0435\u0441\u0438\u0441\u0442\u0435\u043c\u043d\u043e, \u0431\u0435\u0437 \u044f\u0432\u043d\u043e\u0439 \u0442\u0435\u043d\u0434\u0435\u043d\u0446\u0438\u0438 \u0432 \u0432\u044b\u0431\u043e\u0440\u0435 \u0441\u0442\u0440\u0430\u043d\u044b \u0438\u043b\u0438 \u043e\u0442\u0440\u0430\u0441\u043b\u0438\u00bb, \u2014 \u043e\u0442\u043c\u0435\u0442\u0438\u043b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u0437 Imperva \u0414\u0430\u043d\u0438\u044d\u043b\u044c \u0414\u0436\u043e\u043d\u0441\u0442\u043e\u043d.\n\n\u0426\u0435\u043b\u044f\u043c\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0439 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 8220 \u0443\u0436\u0435 \u0441\u0442\u0430\u043b\u0438 \u0441\u0435\u043a\u0442\u043e\u0440\u0430 \u0437\u0434\u0440\u0430\u0432\u043e\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f, \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u0439 \u0438 \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u044b\u0445 \u0443\u0441\u043b\u0443\u0433 \u0432 \u0421\u0428\u0410, \u042e\u0436\u043d\u043e\u0439 \u0410\u0444\u0440\u0438\u043a\u0435, \u0418\u0441\u043f\u0430\u043d\u0438\u0438, \u041a\u043e\u043b\u0443\u043c\u0431\u0438\u0438 \u0438 \u041c\u0435\u043a\u0441\u0438\u043a\u0435.\n\n\u00ab\u0413\u0440\u0443\u043f\u043f\u0430 \u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442\u0441\u044f \u043d\u0430 \u043f\u0440\u043e\u0441\u0442\u044b\u0435, \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b \u0434\u043b\u044f \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\u00bb, \u2014 \u0434\u043e\u0431\u0430\u0432\u0438\u043b \u0414\u0436\u043e\u043d\u0441\u0442\u043e\u043d. \u00ab\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0438\u0445 \u043c\u0435\u0442\u043e\u0434\u044b \u0441\u0447\u0438\u0442\u0430\u044e\u0442\u0441\u044f \u043d\u0435\u0441\u043b\u043e\u0436\u043d\u044b\u043c\u0438, \u043e\u043d\u0438 \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e \u044d\u0432\u043e\u043b\u044e\u0446\u0438\u043e\u043d\u0438\u0440\u0443\u044e\u0442 \u0432 \u0441\u0432\u043e\u0438\u0445 \u0442\u0430\u043a\u0442\u0438\u043a\u0430\u0445 \u0438 \u0442\u0435\u0445\u043d\u0438\u043a\u0430\u0445, \u0447\u0442\u043e\u0431\u044b \u0438\u0437\u0431\u0435\u0436\u0430\u0442\u044c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f\u00bb.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2023-12-19T17:39:29.000000Z"}, {"uuid": "6e229c72-c38d-4322-af6c-85ec382efb68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "https://t.me/BleepingComputer/8658", "content": "Critical Oracle WebLogic flaw actively exploited by DarkIRC malware\n\nA botnet known as DarkIRC is actively targeting thousands of\u00a0exposed Oracle WebLogic servers in attacks designed to exploit the CVE-2020-14882 remote code execution (RCE) vulnerability fixed by Oracle two months ago. [...]\n\nhttps://www.bleepingcomputer.com/news/security/critical-oracle-weblogic-flaw-actively-exploited-by-darkirc-malware/", "creation_timestamp": "2020-12-01T17:12:04.000000Z"}, {"uuid": "56c43521-f75e-447e-a2d4-cab814a7578b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "https://t.me/BleepingComputer/8476", "content": "Critical bug actively used to deploy Cobalt Strike on Oracle servers\n\nThreat actors are actively exploiting vulnerable\u00a0Oracle WebLogic\u00a0servers\u00a0unpatched against\u00a0CVE-2020-14882 to deploy Cobalt Strike beacons to gain persistent remote access to compromised devices. [...]\n\nhttps://www.bleepingcomputer.com/news/security/critical-bug-actively-used-to-deploy-cobalt-strike-on-oracle-servers/", "creation_timestamp": "2020-11-05T18:11:43.000000Z"}, {"uuid": "22700c9c-91e9-487c-b153-5f7b0862ab59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "https://t.me/poxek/1418", "content": "CVE-2020\u201314882 Weblogic Unauthorized bypass RCE\n\u043e\u0431\u0445\u043e\u0434 \u043f\u0430\u0442\u0447\u0430 CVE-2020-14882\n\n\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435:\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0435 Oracle WebLogic Server \u0438\u0437 \u0441\u043e\u0441\u0442\u0430\u0432\u0430 Oracle Fusion Middleware (\u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442: Console). \u041b\u0435\u0433\u043a\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441 \u0441\u0435\u0442\u0435\u0432\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u0447\u0435\u0440\u0435\u0437 HTTP \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c Oracle WebLogic Server. \u0423\u0441\u043f\u0435\u0448\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0438 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0437\u0430\u0445\u0432\u0430\u0442\u0443 Oracle WebLogic Server.\n\nhttps://github.com/jas502n/CVE-2020-14882\n\n\u0414\u043d\u0435\u0432\u043d\u0438\u043a \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u0438\u043a\u0430 \ud83d\udee1", "creation_timestamp": "2022-04-28T10:01:16.000000Z"}, {"uuid": "bc68847d-4578-4aed-ba98-382f31aa5796", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/1044", "content": "\ud83d\udd30 \u0623\u0647\u0645 \u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641\u00a0 \u0645\u0639 POC\n\nCVE-2020-17530 |\u00a0 \u0623\u0628\u0627\u062a\u0634\u064a \u0627\u0644\u062f\u0639\u0627\u0645\u0627\u062a RCE\n\nhttps://youtu.be/MUAAwijvAe8\n\n\u0633\u0627\u0644\u062a\u0633\u062a\u0627\u0643 \u0622\u0631 \u0633\u064a \u0625\u064a |\u00a0 CVE-2020-16846\n\nhttps://youtu.be/5cV9wh2w-O8\n\n\u0623\u0628\u0627\u062a\u0634\u064a \u0623\u0648\u0646\u0648\u0645\u064a RCE |\u00a0 CVE-2020-13942\n\nhttps://youtu.be/iz6wjdGnpds\n\n\u0634\u0628\u062d \u0627\u0644\u0642\u0637 |\u00a0 CVE-2020-1938\n\nhttps://youtu.be/3TGIg1x4XwU\n\n\u0623\u0648\u0631\u0627\u0643\u0644 \u0648\u064a\u0628 \u0644\u0648\u062c\u064a\u0643 RCE |\u00a0 CVE-2020-14882\n\nhttps://youtu.be/t-sxvcZNFZo\n\n\u0623\u0628\u0627\u062a\u0634\u064a \u062a\u0648\u0645\u0643\u0627\u062a RCE |\u00a0 CVE-2020-9484\n\nhttps://youtu.be/nF8tfsY74ws\n\n\u0645\u0648\u062f\u0644 \u0622\u0631 \u0633\u064a \u0625\u064a |\u00a0 CVE-2020-14321\n\nhttps://youtu.be/BkEInFI4oIU\n\n\u0633\u064a\u0633\u0643\u0648 CVE-2020-3452 \u0635\n\nhttps://youtu.be/-UldKwwVgHE\n\n\u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u0645\u0633\u0627\u0639\u062f \u0644\u0642\u0627\u0639\u062f\u0629 \u0628\u064a\u0627\u0646\u0627\u062a \u0648\u0648\u0631\u062f\u0628\u0631\u064a\u0633 |\u00a0 CVE-2020-7048\n\nhttps://youtu.be/nj_dqcvrwp4\n\nCVE-2020-5902 F5 \u0639\u0646\u0648\u0627\u0646 IP \u0643\u0628\u064a\u0631\n\nhttps://youtu.be/-ppzdYDk-ZM\n\n\u0645\u0642\u0627\u0637\u0639 \u0641\u064a\u062f\u064a\u0648 \u0623\u062e\u0631\u0649 \u062d\u0648\u0644 CVE PoC\n\nhttps://youtube.com/playlist?list=PLiVfOzljj-46iFcif16qMaPP84ZxCZ4Mb\n\n\u0627\u0644\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 \u0645\u062e\u062a\u0628\u0631 \u0645\u0643\u0627\u0641\u062d\u0629 \u0627\u0644\u062a\u0637\u0631\u0641 \u0627\u0644\u0639\u0646\u064a\u0641: https://www.vulnmachines.com", "creation_timestamp": "2024-03-29T18:27:13.000000Z"}, {"uuid": "76bdd278-50b7-4678-a3d4-344305e69f95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "https://t.me/itsec_news/1435", "content": "\u200b\ud83d\udcbb \u0421\u0442\u0430\u0440\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0442\u0434\u0430\u0435\u0442 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440 \u0432 \u0440\u0443\u043a\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432.\n\n\ud83d\udcac \u0418\u0411-\u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Trend Micro \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430, \u0447\u0442\u043e \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 Kinsing \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Oracle WebLogic Server, \u0447\u0442\u043e\u0431\u044b \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Linux, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Security-Enhanced Linux \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u0441\u043b\u0443\u0436\u0431\u044b.\n\n\u0425\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 RCE - \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-14882, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u0443\u044e \u0432 2020 \u0433\u043e\u0434\u0443, \u0447\u0442\u043e\u0431\u044b \u0437\u0430\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u043d\u0435\u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0435\u043d\u043d\u044b\u043c Linux-\u0441\u0435\u0440\u0432\u0435\u0440\u043e\u043c \u0438 \u0434\u043e\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u043f\u043e\u043b\u0435\u0437\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443.\n\n\u0423\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044e \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u044f \u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f:\n\n\u2014 \u0423\u0434\u0430\u043b\u0435\u043d\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u043e\u0433\u043e \u0436\u0443\u0440\u043d\u0430\u043b\u0430 \u00ab/var/log/syslog\u00bb;\n\u2014 \u041e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0430\u0433\u0435\u043d\u0442\u043e\u0432 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u0441\u043b\u0443\u0436\u0431 \u043e\u0442 Alibaba \u0438 Tencent;\n\u2014 \u0423\u043d\u0438\u0447\u0442\u043e\u0436\u0435\u043d\u0438\u0435 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0432 \u043c\u0430\u0439\u043d\u0438\u043d\u0433\u0430 \u0438 \u0437\u0430\u043f\u0443\u0441\u043a \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0433\u043e \u043a\u0440\u0438\u043f\u0442\u043e\u043c\u0430\u0439\u043d\u0435\u0440\u0430.\n\n\u0417\u0430\u0442\u0435\u043c \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0439 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e Kinsing \u0441 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0438 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u0441\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u0438\u0435 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0437\u0430\u0434\u0430\u043d\u0438\u044f \u00abcron\u00bb.\n\n\u041f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Trend Micro, \u043f\u043e\u0441\u043b\u0435 \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f Kinsing \u043c\u043e\u0436\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u043e\u0442 \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u0434\u043e \u043a\u0440\u0430\u0436\u0438 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u043f\u043e\u043b\u043d\u043e\u0433\u043e \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u043d\u0430\u0434 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u043c\u0430\u0448\u0438\u043d\u043e\u0439.\n\n\u0420\u0430\u043d\u0435\u0435 \u0432 2022 \u0433\u043e\u0434\u0443 Kinsing \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Confluence Server \u0438 Confluence Data Center \u0434\u043b\u044f \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438 \u043f\u043e\u043b\u043d\u043e\u0439 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b.\n\n#\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c #\u0425\u0430\u043a\u0435\u0440\u044b #\u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2022-09-16T15:25:49.000000Z"}, {"uuid": "60e5b9d2-b76b-4aca-9825-605b8af27d07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "https://t.me/itsec_news/3872", "content": "\u200b\u26a1\ufe0f\u0413\u0440\u0443\u043f\u043f\u0430 8220 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0442\u0440\u0451\u0445 \u043a\u043e\u043d\u0442\u0438\u043d\u0435\u043d\u0442\u0430\u0445 \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Oracle WebLogic\n\n\ud83d\udcac \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Imperva \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 8220, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0449\u0435\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u043e\u0441\u0442\u0438 \u0432 Oracle WebLogic Server \u0434\u043b\u044f \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0441\u0432\u043e\u0435\u0433\u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f.\n\n\u0420\u0435\u0447\u044c \u0438\u0434\u0451\u0442 \u043e CVE-2020-14883 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS 7.2), \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0439 \u0441\u043e\u0431\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 (RCE), \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0437\u0430\u0445\u0432\u0430\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432.\n\n\u00ab\u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u044b\u043c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u0433\u0430\u0434\u0436\u0435\u0442\u043e\u0432 \u0438 \u0447\u0430\u0441\u0442\u043e \u0441\u0432\u044f\u0437\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0441 CVE-2020-14882 (\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0442\u0430\u043a\u0436\u0435 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0435\u0439 Oracle WebLogic Server) \u0438\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0443\u0442\u0435\u0447\u0435\u043a, \u0443\u043a\u0440\u0430\u0434\u0435\u043d\u043d\u044b\u0445 \u0438\u043b\u0438 \u0441\u043b\u0430\u0431\u044b\u0445 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445\u00bb, \u2014 \u0433\u043e\u0432\u043e\u0440\u0438\u0442\u0441\u044f \u0432 \u043e\u0442\u0447\u0451\u0442\u0435 Imperva.\n\n\u0413\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 8220 \u0443\u0436\u0435 \u0438\u043c\u0435\u0435\u0442 \u043e\u043f\u044b\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u0441 \u0446\u0435\u043b\u044c\u044e \u043a\u0440\u0438\u043f\u0442\u043e\u0434\u0436\u0435\u043a\u0438\u043d\u0433\u0430. \u0412 \u043c\u0430\u0435 \u044d\u0442\u043e\u0433\u043e \u0433\u043e\u0434\u0430 \u043e\u043d\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0434\u0440\u0443\u0433\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Oracle WebLogic ( CVE-2017-3506 , \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 7.4) \u0434\u043b\u044f \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0432 \u0431\u043e\u0442\u043d\u0435\u0442 \u0434\u043b\u044f \u043c\u0430\u0439\u043d\u0438\u043d\u0433\u0430 \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442\u044b.\n\n\u041d\u0435\u0434\u0430\u0432\u043d\u0438\u0435 \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u0430\u0442\u0430\u043a, \u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 Imperva, \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 CVE-2020-14883 \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u0434\u0433\u043e\u0442\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0445 XML-\u0444\u0430\u0439\u043b\u043e\u0432 \u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0433\u043e \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u043a\u043e\u0434\u0430, \u043e\u0442\u0432\u0435\u0447\u0430\u044e\u0449\u0435\u0433\u043e \u0437\u0430 \u0440\u0430\u0437\u0432\u0451\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u0434\u043b\u044f \u043a\u0440\u0430\u0436\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u043c\u0430\u0439\u043d\u0438\u043d\u0433\u0430 \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442\u044b, \u0442\u0430\u043a\u043e\u0433\u043e \u043a\u0430\u043a Agent Tesla, rhajk \u0438 nasqa.\n\n\u00ab\u0421\u043a\u043b\u0430\u0434\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u043e\u0449\u0443\u0449\u0435\u043d\u0438\u0435, \u0447\u0442\u043e \u0433\u0440\u0443\u043f\u043f\u0430 \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u043d\u0435\u0441\u0438\u0441\u0442\u0435\u043c\u043d\u043e, \u0431\u0435\u0437 \u044f\u0432\u043d\u043e\u0439 \u0442\u0435\u043d\u0434\u0435\u043d\u0446\u0438\u0438 \u0432 \u0432\u044b\u0431\u043e\u0440\u0435 \u0441\u0442\u0440\u0430\u043d\u044b \u0438\u043b\u0438 \u043e\u0442\u0440\u0430\u0441\u043b\u0438\u00bb, \u2014 \u043e\u0442\u043c\u0435\u0442\u0438\u043b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u0437 Imperva \u0414\u0430\u043d\u0438\u044d\u043b\u044c \u0414\u0436\u043e\u043d\u0441\u0442\u043e\u043d.\n\n\u0426\u0435\u043b\u044f\u043c\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0439 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 8220 \u0443\u0436\u0435 \u0441\u0442\u0430\u043b\u0438 \u0441\u0435\u043a\u0442\u043e\u0440\u0430 \u0437\u0434\u0440\u0430\u0432\u043e\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f, \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u0439 \u0438 \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u044b\u0445 \u0443\u0441\u043b\u0443\u0433 \u0432 \u0421\u0428\u0410, \u042e\u0436\u043d\u043e\u0439 \u0410\u0444\u0440\u0438\u043a\u0435, \u0418\u0441\u043f\u0430\u043d\u0438\u0438, \u041a\u043e\u043b\u0443\u043c\u0431\u0438\u0438 \u0438 \u041c\u0435\u043a\u0441\u0438\u043a\u0435.\n\n\u00ab\u0413\u0440\u0443\u043f\u043f\u0430 \u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442\u0441\u044f \u043d\u0430 \u043f\u0440\u043e\u0441\u0442\u044b\u0435, \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b \u0434\u043b\u044f \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\u00bb, \u2014 \u0434\u043e\u0431\u0430\u0432\u0438\u043b \u0414\u0436\u043e\u043d\u0441\u0442\u043e\u043d. \u00ab\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0438\u0445 \u043c\u0435\u0442\u043e\u0434\u044b \u0441\u0447\u0438\u0442\u0430\u044e\u0442\u0441\u044f \u043d\u0435\u0441\u043b\u043e\u0436\u043d\u044b\u043c\u0438, \u043e\u043d\u0438 \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e \u044d\u0432\u043e\u043b\u044e\u0446\u0438\u043e\u043d\u0438\u0440\u0443\u044e\u0442 \u0432 \u0441\u0432\u043e\u0438\u0445 \u0442\u0430\u043a\u0442\u0438\u043a\u0430\u0445 \u0438 \u0442\u0435\u0445\u043d\u0438\u043a\u0430\u0445, \u0447\u0442\u043e\u0431\u044b \u0438\u0437\u0431\u0435\u0436\u0430\u0442\u044c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f\u00bb.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2023-12-19T17:39:29.000000Z"}, {"uuid": "e1dd4ce5-056a-4b76-bdda-d346c68c08a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "Telegram/3SEzWsXdf8TByVUaB-OgVj6bLDcmIrVBMSBDXfTff8j0U4c", "content": "", "creation_timestamp": "2025-10-29T21:00:05.000000Z"}, {"uuid": "7b3f547b-6140-4a78-b261-b8f0159d6050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "https://t.me/tech_b0lt_Genona/2227", "content": "CVE-2020\u201314882 Weblogic Unauthorized bypass RCE \nhttps://github.com/jas502n/CVE-2020-14882", "creation_timestamp": "2020-11-04T11:09:03.000000Z"}, {"uuid": "35ddedcb-7339-4313-a685-ec6516691933", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "https://t.me/tech_b0lt_Genona/2215", "content": "Explore through 3.3k of IP addresses exposed to CVE-2020-14882 (Vulnerability in the Oracle WebLogic Server). \ud83d\udd25\n\nEasy #BugBounty \ud83d\ude09\nhttps://twitter.com/SpyseHQ/status/1321551194549112832", "creation_timestamp": "2020-10-30T04:38:13.000000Z"}, {"uuid": "2a4ba871-bf6e-40d1-883a-dd9a74a3e582", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "https://t.me/CyberGovIL/904", "content": "Com1245 | \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d1\u05e9\u05e8\u05ea\u05d9 Oracle Weblogic\n\n1. \u05d7\u05d1\u05e8\u05ea \u05d0\u05d5\u05e8\u05e7\u05dc \u05e4\u05e8\u05e1\u05de\u05d4 \u05d0\u05ea\u05de\u05d5\u05dc \u05d4\u05ea\u05e8\u05e2\u05ea \u05d0\u05d1\u05d8\u05d7\u05d4 \u05d3\u05d7\u05d5\u05e4\u05d4, \u05e9\u05dc\u05d0 \u05d1\u05de\u05e1\u05d2\u05e8\u05ea \u05d4\u05ea\u05e8\u05e2\u05d5\u05ea\u05d9\u05d4 \u05d4\u05ea\u05e7\u05d5\u05e4\u05ea\u05d9\u05d5\u05ea, \u05dc\u05d0\u05d7\u05e8 \u05e9\u05d4\u05ea\u05d2\u05dc\u05ea\u05d4 \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05e7\u05e8\u05d9\u05d8\u05d9\u05ea \u05d4\u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05d4\u05e8\u05e6\u05ea \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7 (RCE), \u05d4\u05de\u05e9\u05e4\u05d9\u05e2\u05d4 \u05e2\u05dc \u05de\u05e1\u05e4\u05e8 \u05d2\u05e8\u05e1\u05d0\u05d5\u05ea \u05e9\u05dc \u05e9\u05e8\u05ea WebLogic \u05de\u05ea\u05d5\u05e6\u05e8\u05ea\u05d4.\n\n2. \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d6\u05d5 \u05e7\u05e9\u05d5\u05e8\u05d4 \u05dc\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea CVE-2020-14882 \u05d0\u05e9\u05e8 \u05e4\u05d5\u05e8\u05e1\u05de\u05d4 \u05d1\u05de\u05e1\u05d2\u05e8\u05ea \u05d4\u05ea\u05e8\u05e2\u05ea \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05e8\u05d1\u05e2\u05d5\u05e0\u05d9\u05ea \u05d4\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05e9\u05dc \u05d0\u05d5\u05e8\u05e7\u05dc.\n\n3. \u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05e4\u05d5\u05e8\u05e1\u05de\u05d5 \u05e2\u05d3\u05d5\u05d9\u05d5\u05ea \u05dc\u05db\u05da \u05e9\u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05e2\u05d5\u05e8\u05db\u05d9\u05dd \u05e1\u05e8\u05d9\u05e7\u05d5\u05ea \u05d0\u05d7\u05e8 \u05e9\u05e8\u05ea\u05d9\u05dd \u05e9\u05de\u05d5\u05ea\u05e7\u05e0\u05d9\u05dd \u05d1\u05d4\u05dd \u05d2\u05e8\u05e1\u05d0\u05d5\u05ea \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05e9\u05dc WebLogic \u05d1\u05de\u05d8\u05e8\u05d4 \u05dc\u05e0\u05e6\u05dc \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d6\u05d0\u05ea \u05d5\u05d1\u05d0\u05de\u05e6\u05e2\u05d5\u05ea\u05d4 \u05dc\u05d4\u05e9\u05ea\u05dc\u05d8 \u05e2\u05dc \u05d4\u05e9\u05e8\u05ea \u05d1\u05d0\u05de\u05e6\u05e2\u05d5\u05ea \u05e9\u05dc\u05d9\u05d7\u05ea \u05d1\u05e7\u05e9\u05ea HTTP GET \u05d1\u05dc\u05d1\u05d3.", "creation_timestamp": "2020-11-03T16:19:41.000000Z"}, {"uuid": "0119d532-feaf-4da7-809d-a00d375fc457", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "https://t.me/infosec1z/47", "content": "\ud83d\udd30Top 10 vulnerabilities in 2020:\n\n 1. CVE-2020-12720: vBulletin SQL Injection (OWASP 1: Injection)\n\n 2. CVE-2020-5902: F5 BIG IP RCE and LFI (OWASP 1: Injection)\n\n\ud83c\udfa5 CVE PoC videos\n\nhttps://youtu.be/-ppzdYDk-ZM\n\nhttps://youtube.com/playlist?list=PLiVfOzljj-46iFcif16qMaPP84ZxCZ4Mb\n\n\n\n 3. CVE-2020-15506: MobileIron Core Authentication Bypass\n (OWASP 2: Broken Authentication)\n\n 4. CVE-2020-14882: Oracle WebLogic RCE (OWASP 1: Injection)\n\n 5. CVE-2020-14750: Oracle WebLogic RCE (OWASP 1: Injection)\n\n 6. CVE-2020-17530: Apache Struts 2 RCE (OWASP 1: Injection)\n\n\ud83c\udfa5 CVE PoC videos\n\nhttps://youtu.be/MUAAwijvAe8\n\n\n 7. CVE-2020-2551: Oracle WebLogic RCE (OWASP 1: Injection)\n\n 8. CVE-2020-13379: Grafana SSRF\n (OWASP 3: Broken Access Control)\n\n 9. CVE-2020-1147: Microsoft SharePoint Server RCE\n (OWASP 1: Injection)\n\n 10. CVE-2020-8209: Citrix XenMobile Server Path Traversal\n (OWASP 3: Broken Access Control)\n\n\n\u2796\u2796 @infosec1z \u2796\u2796", "creation_timestamp": "2021-09-05T16:58:17.000000Z"}, {"uuid": "34b362fb-3ff6-465c-88b8-e791fd196db6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/2986", "content": "\ud83d\udea8 Threat Alert: The notorious 8220 Gang is exploiting a high-severity flaw (CVE-2020-14883) in Oracle WebLogic Server to spread malware. \n \nFind details here: https://thehackernews.com/2023/12/8220-gang-exploiting-oracle-weblogic.html", "creation_timestamp": "2023-12-19T19:27:52.000000Z"}, {"uuid": "85eac009-5e46-46e6-9528-cd81aff76f36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "exploited", "source": "https://t.me/KomunitiSiber/1240", "content": "8220 Gang Exploiting Oracle WebLogic Server Vulnerability to Spread Malware\nhttps://thehackernews.com/2023/12/8220-gang-exploiting-oracle-weblogic.html\n\nThe threat actors associated with the\u00a08220 Gang\u00a0have been observed exploiting a high-severity flaw in Oracle WebLogic Server to propagate their malware.\nThe security shortcoming is\u00a0CVE-2020-14883\u00a0(CVSS score: 7.2), a remote code execution bug that could be exploited by authenticated attackers to take over susceptible servers.\n\"This vulnerability allows remote authenticated", "creation_timestamp": "2023-12-19T09:02:00.000000Z"}, {"uuid": "e1ecca6b-1d77-4519-b478-a9df5232c556", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "seen", "source": "https://t.me/arpsyndicate/1165", "content": "#ExploitObserverAlert\n\nCVE-2020-14883\n\nDESCRIPTION: Exploit Observer has 53 entries related to CVE-2020-14883. Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).\n\nFIRST-EPSS: 0.972700000\nNVD-IS: 5.9\nNVD-ES: 1.2", "creation_timestamp": "2023-12-04T09:17:11.000000Z"}, {"uuid": "21fb9d74-5d67-4fe1-88af-a0a4ae2f8b92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "exploited", "source": "Telegram/LsRGGiJahHotlINUxOl50wNbD-x2x4vNQnSb8o2xUS7G0w", "content": "", "creation_timestamp": "2023-12-19T08:53:19.000000Z"}, {"uuid": "92f49727-69f4-46c2-975b-7cd2ba840951", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/253", "content": "\ud83d\udea8 Threat Alert: The notorious 8220 Gang is exploiting a high-severity flaw (CVE-2020-14883) in Oracle WebLogic Server to spread malware. \n \nFind details here: https://thehackernews.com/2023/12/8220-gang-exploiting-oracle-weblogic.html", "creation_timestamp": "2023-12-19T19:27:52.000000Z"}, {"uuid": "00715b84-9902-49fa-9fb1-d3958f3d2632", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "Telegram/eKZtjcL8DJDaMHyGAjl_T18EJ4MioT9b265HGTxVckEH9w", "content": "", "creation_timestamp": "2021-01-07T21:15:24.000000Z"}, {"uuid": "2fc8b140-6acb-4729-8fe6-786e1af51c1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "https://t.me/v3n0mhack/301", "content": "https://github.com/sp4zcmd/WeblogicExploit-GUI\nWeblogic\u6f0f\u6d1e\u5229\u7528\u56fe\u5f62\u5316\u5de5\u5177\n\nCVE-2020-2551\nCVE-2020-2555\nCVE-2020-2883\nCVE-2016-3510\nCVE-2016-0638\nCVE-2017-10271\nJdk7u21\nCVE-2017-3248\uff08JRMP\uff09\nCVE-2018-2628\uff08JRMP\uff09\nCVE-2018-2893\uff08JRMP\uff09\nCVE-2018-3245\uff08JRMP\uff09\nCVE-2018-3181\uff08JNDI\uff09\nCVE-2020-14882\u672a\u6388\u6743\u8bbf\u95ee+CVE-2021-2109\uff08JNDI\uff09", "creation_timestamp": "2023-11-11T07:49:11.000000Z"}, {"uuid": "bfff789c-f677-43fe-a821-d58144de90b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "Telegram/SFbizCI1HR_3r7JtPdd678d16a-iSOkLNYQlXhHYNjQfZSw", "content": "", "creation_timestamp": "2025-01-17T16:00:09.000000Z"}, {"uuid": "36c64413-4d3e-4e0d-a732-81f87710183a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "https://t.me/information_security_channel/41520", "content": "Attackers are found to be exploiting Oracle WebLogic Servers via CVE-2020\u201314882 to install Cobalt Strike which will allow persistent remote access to the compromised devices. Testing the vulnerability The latter half of last week saw a flurry of scans against Oracle\u2019s WebLogic Server to check the vulnerability of CVE-2020-14882. It is important to note that [\u2026]\nThe post Hackers Attacking WebLogic Servers via CVE-2020\u201314882 Flaw to install Cobalt Strike Malware (https://gbhackers.com/weblogic-servers-flaw/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2020-11-09T06:34:16.000000Z"}, {"uuid": "4d99ebe4-1ffa-40df-bd55-669e52dbd2f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "exploited", "source": "https://t.me/thehackernews/4304", "content": "\ud83d\udea8 Threat Alert: The notorious 8220 Gang is exploiting a high-severity flaw (CVE-2020-14883) in Oracle WebLogic Server to spread malware. \n \nFind details here: https://thehackernews.com/2023/12/8220-gang-exploiting-oracle-weblogic.html", "creation_timestamp": "2023-12-19T07:59:01.000000Z"}, {"uuid": "18a86371-cf01-422e-831e-a2e9cc27c036", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "https://t.me/information_security_channel/42040", "content": "Juniper Threat Labs researchers observed active attacks on Oracle WebLogic software using CVE-2020-14882. This vulnerability, if successfully exploited, allows unauthenticated remote code execution.\u00a0 Researchers found almost 3,109 open Oracle WebLogic servers using Shodan. As a minimum of five different variants of attacks/payload. One particular payload installs a bot called DarkIRC. This bot performs a unique [\u2026]\nThe post Critical Oracle WebLogic Vulnerability Flaw Actively Exploited by DarkIRC Malware (https://gbhackers.com/oracle-weblogic-vulnerability/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2020-12-03T15:09:45.000000Z"}, {"uuid": "bdef78f5-5e0e-4183-bfeb-30a7fa418611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/798", "content": "https://github.com/jas502n/CVE-2020-14882\n#github", "creation_timestamp": "2023-08-01T14:01:19.000000Z"}, {"uuid": "6979434b-a775-47ab-ad5b-cb35ea353d4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "https://t.me/xakep_ru/9934", "content": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Oracle WebLogic \u0443\u0436\u0435 \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u043f\u043e\u0434 \u0430\u0442\u0430\u043a\u0430\u043c\u0438\n\n\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 Oracle \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442: \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0430\u044f \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-14882, \u043d\u0430\u0431\u0440\u0430\u0432\u0448\u0430\u044f 9,8 \u0431\u0430\u043b\u043b\u043e\u0432 \u0438\u0437 10 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS, \u0443\u0436\u0435 \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u043f\u043e\u0434 \u0430\u0442\u0430\u043a\u0430\u043c\u0438.\n\nhttps://xakep.ru/2020/10/30/weblogic-attacks/", "creation_timestamp": "2020-10-30T17:45:11.000000Z"}, {"uuid": "e559f32a-650d-48f9-9c8d-64a6170baab5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "https://t.me/xakep_ru/10093", "content": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0431\u0430\u0433 \u0432 Oracle WebLogic \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u043c\u0430\u043b\u0432\u0430\u0440\u044c\u044e DarkIRC\n\n\u0411\u043e\u0442\u043d\u0435\u0442 DarckIRC \u0430\u0442\u0430\u043a\u0443\u0435\u0442 \u0442\u044b\u0441\u044f\u0447\u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Oracle WebLogic, \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u043f\u0435\u0440\u0435\u0434 RCE-\u0431\u0430\u0433\u043e\u043c CVE-2020-14882, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0431\u044b\u043b \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d \u0434\u0432\u0430 \u043c\u0435\u0441\u044f\u0446\u0430 \u043d\u0430\u0437\u0430\u0434.\n\nhttps://xakep.ru/2020/12/02/weblogic-darkirc/", "creation_timestamp": "2020-12-02T20:40:11.000000Z"}, {"uuid": "2276cf2e-d810-4c6a-96a8-5131231f02cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/4841", "content": "Weblogic RCE by only one GET request \u2014 CVE-2020\u201314882 Analysis\n\nhttps://testbnull.medium.com/weblogic-rce-by-only-one-get-request-cve-2020-14882-analysis-6e4b09981dbf", "creation_timestamp": "2020-10-28T22:29:31.000000Z"}, {"uuid": "75a8924c-ff7b-4fd2-8e69-87d0c7ab9d40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/4888", "content": "CVE-2020\u201314882 Weblogic Unauthorized bypass RCE\n\nhttps://github.com/jas502n/CVE-2020-14882", "creation_timestamp": "2020-11-12T10:39:46.000000Z"}, {"uuid": "6ed6155c-a9fe-426e-900d-389b120d7771", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1488", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1629", "content": "#Threat_Research\nWindows 8/10 AppXSVC Deployment Service Local Privilege Escalation (CVE-2020-1488)\nhttps://www.activecyber.us/activelabs/windows-appx-deployment-service-local-privilege-escalation-cve-2020-1488", "creation_timestamp": "2021-01-02T23:14:36.000000Z"}, {"uuid": "03e480e5-13c3-4815-ba4a-d75fbe969ddb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1479", "content": "https://github.com/sp4zcmd/WeblogicExploit-GUI\nWeblogic\u6f0f\u6d1e\u5229\u7528\u56fe\u5f62\u5316\u5de5\u5177\n\nCVE-2020-2551\nCVE-2020-2555\nCVE-2020-2883\nCVE-2016-3510\nCVE-2016-0638\nCVE-2017-10271\nJdk7u21\nCVE-2017-3248\uff08JRMP\uff09\nCVE-2018-2628\uff08JRMP\uff09\nCVE-2018-2893\uff08JRMP\uff09\nCVE-2018-3245\uff08JRMP\uff09\nCVE-2018-3181\uff08JNDI\uff09\nCVE-2020-14882\u672a\u6388\u6743\u8bbf\u95ee+CVE-2021-2109\uff08JNDI\uff09\n\n#github #tools #exploit", "creation_timestamp": "2023-11-10T15:34:11.000000Z"}, {"uuid": "35efa3a0-c9fa-4804-9808-f08c6109d612", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2562", "content": "#Analytics\n10 most exploited vulnerabilities of the week (january 18-24)\nCVE-2020-14882/883:\nhttps://t.me/cybersecuritytechnologies/2004\nCVE-2021-2109:\nhttps://t.me/cybersecuritytechnologies/2540\nCVE-2020-6207:\nhttps://t.me/cybersecuritytechnologies/2506\nCVE-2021-3114/3115:\nArbitrary command execution in Go\nhttps://blog.golang.org/path-security\nCVE-2019-8791:\nhttps://t.me/cybersecuritytechnologies/2535\nCVE-2021-3129:\nhttps://t.me/cybersecuritytechnologies/2557\nCVE-2020-1033:\nhttps://t.me/cybersecuritytechnologies/2528\nCVE-2019-8792:\nhttps://t.me/cybersecuritytechnologies/2535", "creation_timestamp": "2021-01-24T14:36:01.000000Z"}, {"uuid": "866110c9-f878-4954-81d2-a54f426f0acb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14887", "type": "seen", "source": "https://t.me/cibsecurity/15448", "content": "\u203c CVE-2020-14887 \u203c\n\nVulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.3.0 and 14.0.0-14.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-21T18:57:11.000000Z"}, {"uuid": "b6801c0f-6cf9-488e-a618-0f65e1b758fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14883", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2004", "content": "CVE-2020-14882/CVE-2020-14883:\nOracle Weblogic Server Unauthorized bypass RCE / Single GET Request \nhttps://paper.seebug.org/1411\nPoC:\nhttps://github.com//jas502n//CVE-2020-14882", "creation_timestamp": "2021-01-27T04:04:05.000000Z"}, {"uuid": "2eb857eb-5955-44be-a2bf-b836ce3f2a7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2004", "content": "CVE-2020-14882/CVE-2020-14883:\nOracle Weblogic Server Unauthorized bypass RCE / Single GET Request \nhttps://paper.seebug.org/1411\nPoC:\nhttps://github.com//jas502n//CVE-2020-14882", "creation_timestamp": "2021-01-27T04:04:05.000000Z"}, {"uuid": "dc3bb0c2-7106-4da5-a550-701ba7e0c203", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "seen", "source": "https://t.me/cibsecurity/15466", "content": "\u203c CVE-2020-14882 \u203c\n\nVulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-21T19:04:20.000000Z"}, {"uuid": "099b1f99-361b-4629-9ea0-2e1c0413bed1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14884", "type": "seen", "source": "https://t.me/cibsecurity/15476", "content": "\u203c CVE-2020-14884 \u203c\n\nVulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.16. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-21T19:04:33.000000Z"}, {"uuid": "172cb6d3-dde5-4c1a-ac93-062c2442f489", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-14882", "type": "exploited", "source": "https://t.me/cibsecurity/15713", "content": "\u274c Oracle WebLogic Server RCE Flaw Under Active Attack \u274c\n\nThe flaw in the console component of the WebLogic Server, CVE-2020-14882, is under active attack, researchers warn.\n\n\ud83d\udcd6 Read\n\nvia \"Threat Post\".", "creation_timestamp": "2020-10-29T16:14:25.000000Z"}]}