{"vulnerability": "CVE-2020-2555", "sightings": [{"uuid": "99d3256d-69e1-418c-95f5-8b8128d30913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "MISP/5f850411-c103-491f-abff-9421425403cf", "content": "", "creation_timestamp": "2020-10-21T08:19:10.000000Z"}, {"uuid": "2a836718-edd3-4cd0-b8be-3e61ffb462b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "MISP/42d04e94-bf5b-427d-acc8-f5d740675941", "content": "", "creation_timestamp": "2020-10-20T15:57:21.000000Z"}, {"uuid": "34c8fe2d-03bf-4929-a3c6-bc28757c2757", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:19.000000Z"}, {"uuid": "0387157c-5c39-4fef-bd35-26d2a67b5253", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "5b4291bd-2978-4ed0-8a0d-5c9d2e9bc61d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "MISP/d925a2ee-e7cf-46f6-bec1-ad8e19122730", "content": "", "creation_timestamp": "2020-10-20T15:58:04.000000Z"}, {"uuid": "5a87a0e1-6e93-43ae-8dd0-bfae12d83282", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "exploited", "source": "https://www.exploit-db.com/exploits/48508", "content": "", "creation_timestamp": "2020-05-22T00:00:00.000000Z"}, {"uuid": "506e646f-8e87-4260-9812-5dc75767fb3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2970963", "content": "", "creation_timestamp": "2024-12-24T20:22:22.473138Z"}, {"uuid": "a791fc7e-c2ca-4499-850d-b60dcba88d08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "4abbcaff-ad5e-456b-b49a-a61d606bae21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "published-proof-of-concept", "source": "https://t.me/codeby_sec/4803", "content": "\u200b\u200bCVE-2020-2555: RCE \u0438\u0437-\u0437\u0430 \u043e\u0448\u0438\u0431\u043a\u0438 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 oracle weblogic\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0441\u0442\u0430\u043b\u0438 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0439 \u0446\u0435\u043b\u044c\u044e \u0434\u043b\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432/\u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432\u0435\u0431-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 Java. \u042d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0447\u0430\u0441\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 \u0438, \u043a\u0430\u043a \u043f\u0440\u0430\u0432\u0438\u043b\u043e, \u0438\u0445 \u0441\u043b\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u0442\u044c. \u0412 \u044d\u0442\u043e\u043c \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0438 \u043c\u044b \u0440\u0430\u0441\u0441\u043c\u043e\u0442\u0440\u0438\u043c CVE-2020-2555 (ZDI-20-128 ), \u043e \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0441\u043e\u043e\u0431\u0449\u0438\u043b ZDI \u0427\u0430\u043d\u0433 \u0438\u0437 VNPT ISC. \u042d\u0442\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS 9,8) \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0443 Oracle Coherence, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Oracle WebLogic Server. \u0415\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 \u0432 \u044f\u043d\u0432\u0430\u0440\u0435 \u0432\u043c\u0435\u0441\u0442\u0435 \u0441 333 \u0434\u0440\u0443\u0433\u0438\u043c\u0438 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438.\n\n\u0427\u0438\u0442\u0430\u0442\u044c: https://codeby.net/threads/cve-2020-2555-rce-iz-za-oshibki-deserializacii-na-servere-oracle-weblogic.72438/\n\n#cve #java #rce", "creation_timestamp": "2021-08-05T17:17:00.000000Z"}, {"uuid": "d4c7bf94-f03a-4443-a9c4-1b1e9b3d46b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:26.000000Z"}, {"uuid": "5e618c2d-e968-40ea-ae41-25ad1c95af7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-2555", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/045371fc-8f9e-4a8f-87b3-fe5eb4746b0e", "content": "", "creation_timestamp": "2026-02-02T12:28:58.925197Z"}, {"uuid": "b35014f5-ce95-4e1c-9f1f-6ca4365b370d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:47.000000Z"}, {"uuid": "f3c2f619-198a-41c5-8bf2-e5301ea46285", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/weblogic_deserialize_badattrval.rb", "content": "", "creation_timestamp": "2020-05-21T04:38:33.000000Z"}, {"uuid": "649fc3f0-552e-473f-b6a7-373e2fc08ff3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "Telegram/PVGW_iYWrXwvHICjPeyw_EDO3u1o6PJ0r-5seweSlIJ23Ey2", "content": "", "creation_timestamp": "2025-02-14T21:08:32.000000Z"}, {"uuid": "0ace862b-9201-4ba8-8d9e-ea14722fdfce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "https://t.me/codeby_sec/3000", "content": "\u0421\u0430\u043c\u044b\u0435 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0435 \u0442\u0435\u043c\u044b \u0437\u0430 \u043f\u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 30 \u0434\u043d\u0435\u0439:\n\n\u0421 \u043d\u0435\u0442\u0435\u0440\u043f\u0435\u043d\u0438\u0435\u043c \u0436\u0434\u0435\u043c \u0432\u0441\u0442\u0440\u0435\u0447\u0438 \u0441 \u0442\u043e\u0431\u043e\u0439 \u043d\u0430 Codeby\n\nSoft - \u0418\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u0440\u0438\u0439 AngelSecurityTeam\n\u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u2014 Soft\n\n\u0421\u0442\u0430\u0442\u044c\u044f - Welcome to the club, buddy! \u0418\u043b\u0438 \u043a\u0430\u043a \u043d\u0430\u0447\u0430\u0442\u044c \u0441\u0432\u043e\u0439 \u043f\u0443\u0442\u044c \u0432 \u0418\u0411?\n\u042d\u0442\u0438\u0447\u043d\u044b\u0439 \u0445\u0430\u043a\u0438\u043d\u0433 \u0438 \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 - Python telegram bot api \u043d\u0435 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u043a \u043f\u0440\u043e\u043a\u0441\u0438, \u043f\u0438\u0448\u0435\u0442 \u0447\u0442\u043e \u043d\u0435\u0442 SOCKS5\n\u0412\u043e\u043f\u0440\u043e\u0441 - \u041e\u0442\u0432\u0435\u0442\n\n\u0421\u0442\u0430\u0442\u044c\u044f - Out-of-band \u0430\u0442\u0430\u043a\u0438\n\u042d\u0442\u0438\u0447\u043d\u044b\u0439 \u0445\u0430\u043a\u0438\u043d\u0433 \u0438 \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435\n\n\u0420\u0435\u0448\u0435\u043d\u043e - \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 kali linux 2020,1, \u043f\u0440\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0435 \u043f\u0438\u0448\u0435\u0442 \u0442\u043e \u0447\u0442\u043e \u043d\u0430 \u0444\u043e\u0442\u043e (\u0440\u0438\u0441 1)\n\u0412\u043e\u043f\u0440\u043e\u0441 - \u041e\u0442\u0432\u0435\u0442\n\n\u0421\u0442\u0430\u0442\u044c\u044f - \u0411\u043b\u0443\u0436\u0434\u0430\u0435\u043c \u043f\u043e \u043f\u0440\u043e\u0441\u0442\u043e\u0440\u0430\u043c GitHub: \u0414\u044b\u0440\u044b, \u0441\u043a\u0440\u0438\u043f\u0442\u044b, QR-\u043a\u043e\u0434\u044b \u0438 \u0447\u0435\u0440\u0442\u043e\u0432\u0449\u0438\u043d\u0430\n\u042d\u0442\u0438\u0447\u043d\u044b\u0439 \u0445\u0430\u043a\u0438\u043d\u0433 \u0438 \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435\n\n\u0421\u0442\u0430\u0442\u044c\u044f - \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u043c\u0435\u043d\u0438 \u0412\u0435\u043a\u0435\u0440\u0442\u0430 - Google \u0432 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438\n\u042d\u0442\u0438\u0447\u043d\u044b\u0439 \u0445\u0430\u043a\u0438\u043d\u0433 \u0438 \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435\n\n\u0421\u0442\u0430\u0442\u044c\u044f - \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u0447\u0435\u043b\u043e\u0432\u0435\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0434\u043e\u0432\u0435\u0440\u0438\u044f \u0438\u043b\u0438 \u043d\u0430\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043d\u0430\u0438\u0432\u0435\u043d \u0447\u0435\u043b\u043e\u0432\u0435\u043a\n\u042d\u0442\u0438\u0447\u043d\u044b\u0439 \u0445\u0430\u043a\u0438\u043d\u0433 \u0438 \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435\n\n\u0421\u0442\u0430\u0442\u044c\u044f - CVE-2020-2555: RCE \u0438\u0437-\u0437\u0430 \u043e\u0448\u0438\u0431\u043a\u0438 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 oracle weblogic\n\u042d\u0442\u0438\u0447\u043d\u044b\u0439 \u0445\u0430\u043a\u0438\u043d\u0433 \u0438 \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435\n\n\u0421\u0442\u0430\u0442\u044c\u044f - DLL Hijacking\n\u042d\u0442\u0438\u0447\u043d\u044b\u0439 \u0445\u0430\u043a\u0438\u043d\u0433 \u0438 \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435\n\n\u0421\u0442\u0430\u0442\u044c\u044f - \u041f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0430\u0432 \u0432 AWS\n\u042d\u0442\u0438\u0447\u043d\u044b\u0439 \u0445\u0430\u043a\u0438\u043d\u0433 \u0438 \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435\n\nSoft - \u0421\u043e\u0444\u0442 Dangerzone: \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043e\u043f\u0430\u0441\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432\n\u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u2014 Soft", "creation_timestamp": "2023-03-31T16:18:19.000000Z"}, {"uuid": "8f5c7e84-b0d3-46c9-adf9-f0a5cd1cd272", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "published-proof-of-concept", "source": "https://t.me/codeby_sec/2928", "content": "\u200b\u0421\u0442\u0430\u0442\u044c\u044f CVE-2020-2555: RCE \u0438\u0437-\u0437\u0430 \u043e\u0448\u0438\u0431\u043a\u0438 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 oracle weblogic\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0441\u0442\u0430\u043b\u0438 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0439 \u0446\u0435\u043b\u044c\u044e \u0434\u043b\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432/\u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432\u0435\u0431-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 Java. \u042d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0447\u0430\u0441\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 \u0438, \u043a\u0430\u043a \u043f\u0440\u0430\u0432\u0438\u043b\u043e, \u0438\u0445 \u0441\u043b\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u0442\u044c.\n\n\u0427\u0438\u0442\u0430\u0442\u044c: https://codeby.net/threads/cve-2020-2555-rce-iz-za-oshibki-deserializacii-na-servere-oracle-weblogic.72438/\n\n#pentest", "creation_timestamp": "2020-03-16T03:07:51.000000Z"}, {"uuid": "b9464d72-9cb5-40e4-b8e1-608ebf0e194d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4463", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-2555\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2020-01-15T17:15:17.347\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html\n2. http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html\n3. http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html\n4. https://www.oracle.com/security-alerts/cpujan2020.html\n5. https://www.oracle.com/security-alerts/cpujan2021.html\n6. https://www.oracle.com/security-alerts/cpujul2020.html\n7. https://www.oracle.com/security-alerts/cpujul2021.html\n8. https://www.oracle.com/security-alerts/cpuoct2020.html\n9. http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html\n10. http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html\n11. http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html\n12. https://www.oracle.com/security-alerts/cpujan2020.html\n13. https://www.oracle.com/security-alerts/cpujan2021.html\n14. https://www.oracle.com/security-alerts/cpujul2020.html\n15. https://www.oracle.com/security-alerts/cpujul2021.html\n16. https://www.oracle.com/security-alerts/cpuoct2020.html", "creation_timestamp": "2025-02-14T17:12:14.000000Z"}, {"uuid": "d2771547-b657-4a4e-bf80-3d88ca334d61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "https://t.me/is_n3ws/36", "content": "\u0410\u041d\u0411 \u043f\u0440\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043b\u043e \u0430\u0442\u0430\u043a\u0438 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0432\u0442\u0432\u0435\u043d\u043d\u044b\u0445 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u043e \u043e\u0442\u0447\u0435\u0442. Top-20 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\nhttps://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF\n\nGaining Remote Access: \n-----------------------------\nCVE-2019-11510: Arbitrary file read/Pulse Secure VPN\nCVE-2019-19781: RCE/Citrix ADC\nCVE-2020-8195/3/6: Unauthenticated access\nCVE-2019-0708: RCE on RDP server\nCVE-2020-5902: RCE in F5 BIG-IP\n\nAD:\n----\nCVE-2020-1472: #ZeroLogon\nCVE-2019-1040: NTLM relay bypass\n\nMDM: \n------\nCVE-2020-15505: MobileIron device management\n\nExploiting Public Facing Services:\n---------------- \nCVE-2020-1350: RCE/ DNS Servers #SigRed\nCVE-2018-6789: RCE/ Exim mail transfer\nCVE-2018-4939: RCE/ Adobe's Cold Fusion\n\nWorkstation Local Privilege Escalation:\n-------------------------\nCVE-2020-0601: ECC spoofing #CurveBall\nCVE-2019-0803: Win32k Elevation of Privilege\n\nInternal Applications:\n--------------------\nCVE-2020-0688: RCE/MS Exchange\nCVE-2020-2555: RCE/Oracle Weblogic\nCVE-2019-11580: RCE/Atlassian Crowd\nCVE-2019-18935: RCE/ASP.Net\nCVE-2015-4852: RCE/Apache\nCVE-2019-3396: Unauthorized Access/Confluence\nCVE-2020-10189: RCE/Desktop Central", "creation_timestamp": "2020-11-06T22:00:17.000000Z"}, {"uuid": "81f954d6-3553-480d-be82-61219278fd08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "https://t.me/reconshell/599", "content": "Weblogic-Framework best tool for detecting weblogic vulnerabilities\n\n#vulnerabilities #weblogic #vulnerability \n#CVE-2020-2883 #CVE-2020-2555 #CVE-2020-2551\n\nhttps://upurl.me/rltsw", "creation_timestamp": "2021-03-27T21:09:01.000000Z"}, {"uuid": "7bbe0b21-bbf7-443a-a9b1-89c8e580a55c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "published-proof-of-concept", "source": "https://t.me/v3n0mhack/301", "content": "https://github.com/sp4zcmd/WeblogicExploit-GUI\nWeblogic\u6f0f\u6d1e\u5229\u7528\u56fe\u5f62\u5316\u5de5\u5177\n\nCVE-2020-2551\nCVE-2020-2555\nCVE-2020-2883\nCVE-2016-3510\nCVE-2016-0638\nCVE-2017-10271\nJdk7u21\nCVE-2017-3248\uff08JRMP\uff09\nCVE-2018-2628\uff08JRMP\uff09\nCVE-2018-2893\uff08JRMP\uff09\nCVE-2018-3245\uff08JRMP\uff09\nCVE-2018-3181\uff08JNDI\uff09\nCVE-2020-14882\u672a\u6388\u6743\u8bbf\u95ee+CVE-2021-2109\uff08JNDI\uff09", "creation_timestamp": "2023-11-11T07:49:11.000000Z"}, {"uuid": "6525063f-9483-4e2b-8e4e-75dde068414f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "https://t.me/arpsyndicate/1844", "content": "#ExploitObserverAlert\n\nCVE-2020-2555\n\nDESCRIPTION: Exploit Observer has 113 entries related to CVE-2020-2555. Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Caching,CacheStore,Invocation). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\n\nFIRST-EPSS: 0.965730000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-17T21:29:46.000000Z"}, {"uuid": "b57feeb9-8af6-4053-bfa8-0de62bc82620", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "exploited", "source": "https://t.me/techpwnews/630", "content": "Details on the Oracle WebLogic Vulnerability Being Exploited in the Wild\n\nEarlier this year, I blogged about a deserialization vulnerability in the Oracle WebLogic Server. This was patched by Oracle and assigned CVE-2020-2555. However, researcher Quynh Le of VNPT ISC submitted a bug to the ZDI that showed how the patch could be bypassed. This bug, labeled CVE-2020-2883, is now being reported by Oracle as being used in active attacks. In this blog post, we will go through the details of this recently...\n\nContinue reading at Zero Day Initiative - Blog", "creation_timestamp": "2020-05-12T00:13:56.000000Z"}, {"uuid": "179acfad-6962-4b13-aa04-ee8d515f797b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/766", "content": "#exploit\n1. CVE-2020-10174:\nTimeshift: arbitrary local code execution due to unsafe usage of temporary directory in /tmp/timeshift \nhttps://www.openwall.com/lists/oss-security/2020/03/06/3\n]-&gt; https://github.com/teejee2008/timeshift\n\n2. CVE-2020-2555:\nRCE Through a Deserialization Bug in Oracle's Weblogic Server\nhttps://www.thezdi.com/blog/2020/3/5/cve-2020-2555-rce-through-a-deserialization-bug-in-oracles-weblogic-server", "creation_timestamp": "2022-07-04T21:47:38.000000Z"}, {"uuid": "090d688f-b2c5-41c1-a63d-bba7a2269685", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "Telegram/0sD_EyHySREvSWLaWKL-XHqTqDduPkHhIy1vEKF4pCPQbv8", "content": "", "creation_timestamp": "2020-10-28T02:58:38.000000Z"}, {"uuid": "b9d8b875-f6d0-4624-9e34-63dbc2165867", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "published-proof-of-concept", "source": "https://t.me/HackerOne/2626", "content": "https://medium.com/@testbnull/the-art-of-deserialization-gadget-hunting-part-3-how-i-found-cve-2020-2555-by-known-tools-67819b29cb63", "creation_timestamp": "2020-03-12T20:01:19.000000Z"}, {"uuid": "72f0297f-c55e-4ab0-ac3e-14d8b06a2780", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1479", "content": "https://github.com/sp4zcmd/WeblogicExploit-GUI\nWeblogic\u6f0f\u6d1e\u5229\u7528\u56fe\u5f62\u5316\u5de5\u5177\n\nCVE-2020-2551\nCVE-2020-2555\nCVE-2020-2883\nCVE-2016-3510\nCVE-2016-0638\nCVE-2017-10271\nJdk7u21\nCVE-2017-3248\uff08JRMP\uff09\nCVE-2018-2628\uff08JRMP\uff09\nCVE-2018-2893\uff08JRMP\uff09\nCVE-2018-3245\uff08JRMP\uff09\nCVE-2018-3181\uff08JNDI\uff09\nCVE-2020-14882\u672a\u6388\u6743\u8bbf\u95ee+CVE-2021-2109\uff08JNDI\uff09\n\n#github #tools #exploit", "creation_timestamp": "2023-11-10T15:34:11.000000Z"}, {"uuid": "2d0fd046-e6bc-4fa9-8677-f4453cb5889f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2555", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/961", "content": "#exploit\n1. CVE-2020-2555:\nOracle WebLogic Server 12.2.1.4.0 - RCE\nhttps://github.com/nu11secur1ty/Windows10Exploits/tree/master/Undefined/CVE-2020-2555\n\n2. CVE-2020-1615:\nDefault credentials supplied in Junos OS vMX configuration (17.x, 18.x, 19.x versions)\nhttps://kb.juniper.net/InfoCenter/index?page=content&amp;id=JSA10998", "creation_timestamp": "2022-06-18T18:37:30.000000Z"}, {"uuid": "100cb278-a5f6-4f59-bb23-a549fdb8bdb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25557", "type": "seen", "source": "https://t.me/cibsecurity/16297", "content": "\u203c CVE-2020-25557 \u203c\n\nIn CMSuno 1.6.2, an attacker can inject malicious PHP code as a \"username\" while changing his/her username &amp; password. After that, when attacker logs in to the application, attacker's code will be run. As a result of this vulnerability, authenticated user can run command on the server.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-13T18:33:51.000000Z"}]}