{"vulnerability": "CVE-2021-2109", "sightings": [{"uuid": "f8f6689a-8d72-4109-b142-6ba5e83bd7f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2109", "type": "seen", "source": "MISP/5e6a7080-af48-4d95-ba3e-03ad60728fc8", "content": "", "creation_timestamp": "2024-11-14T06:07:38.000000Z"}, {"uuid": "aa058eb5-fa1a-4574-89b7-d454f511d310", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2109", "type": "published-proof-of-concept", "source": "https://t.me/v3n0mhack/301", "content": "https://github.com/sp4zcmd/WeblogicExploit-GUI\nWeblogic\u6f0f\u6d1e\u5229\u7528\u56fe\u5f62\u5316\u5de5\u5177\n\nCVE-2020-2551\nCVE-2020-2555\nCVE-2020-2883\nCVE-2016-3510\nCVE-2016-0638\nCVE-2017-10271\nJdk7u21\nCVE-2017-3248\uff08JRMP\uff09\nCVE-2018-2628\uff08JRMP\uff09\nCVE-2018-2893\uff08JRMP\uff09\nCVE-2018-3245\uff08JRMP\uff09\nCVE-2018-3181\uff08JNDI\uff09\nCVE-2020-14882\u672a\u6388\u6743\u8bbf\u95ee+CVE-2021-2109\uff08JNDI\uff09", "creation_timestamp": "2023-11-11T07:49:11.000000Z"}, {"uuid": "dae1749f-57ab-4d7c-bf05-1718a0006a20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2109", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/281", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-2109 basic scanner\nURL\uff1ahttps://github.com/dinosn/CVE-2021-2109", "creation_timestamp": "2021-08-09T11:06:06.000000Z"}, {"uuid": "f21ce3ca-0bfa-447c-9923-c2aa3e586831", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21090", "type": "seen", "source": "https://t.me/cibsecurity/25741", "content": "\u203c CVE-2021-21090 \u203c\n\nAdobe InCopy version 16.0 (and earlier) is affected by an path traversal vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve remote code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-06-28T18:27:18.000000Z"}, {"uuid": "79fd728a-f9ef-4ff7-b9c1-352a67386b2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2109", "type": "published-proof-of-concept", "source": "https://t.me/reconshell/420", "content": "CVE-2021-2109 Weblogic Server Remote Code Execution vulnerability analysis\n\n#WeblogicRCE #CVE-2021-2109 #vulnerability #InfoSec #CyberSecurity #RCE\n\nhttps://reconshell.com/cve-2021-2109-weblogic-server-remote-code-execution-vulnerability-analysis/", "creation_timestamp": "2021-02-07T20:56:01.000000Z"}, {"uuid": "dfafcf59-8d37-4555-9597-bd63eb902856", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2109", "type": "seen", "source": "https://t.me/cibsecurity/22389", "content": "\u203c CVE-2021-2109 \u203c\n\nVulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-20T18:37:43.000000Z"}, {"uuid": "f4e15ab4-081a-4505-aec8-568c8a229b3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2109", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1479", "content": "https://github.com/sp4zcmd/WeblogicExploit-GUI\nWeblogic\u6f0f\u6d1e\u5229\u7528\u56fe\u5f62\u5316\u5de5\u5177\n\nCVE-2020-2551\nCVE-2020-2555\nCVE-2020-2883\nCVE-2016-3510\nCVE-2016-0638\nCVE-2017-10271\nJdk7u21\nCVE-2017-3248\uff08JRMP\uff09\nCVE-2018-2628\uff08JRMP\uff09\nCVE-2018-2893\uff08JRMP\uff09\nCVE-2018-3245\uff08JRMP\uff09\nCVE-2018-3181\uff08JNDI\uff09\nCVE-2020-14882\u672a\u6388\u6743\u8bbf\u95ee+CVE-2021-2109\uff08JNDI\uff09\n\n#github #tools #exploit", "creation_timestamp": "2023-11-10T15:34:11.000000Z"}, {"uuid": "60fbfc2c-9a6a-4ba4-b9d2-0f3e3d9e2e2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2109", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2562", "content": "#Analytics\n10 most exploited vulnerabilities of the week (january 18-24)\nCVE-2020-14882/883:\nhttps://t.me/cybersecuritytechnologies/2004\nCVE-2021-2109:\nhttps://t.me/cybersecuritytechnologies/2540\nCVE-2020-6207:\nhttps://t.me/cybersecuritytechnologies/2506\nCVE-2021-3114/3115:\nArbitrary command execution in Go\nhttps://blog.golang.org/path-security\nCVE-2019-8791:\nhttps://t.me/cybersecuritytechnologies/2535\nCVE-2021-3129:\nhttps://t.me/cybersecuritytechnologies/2557\nCVE-2020-1033:\nhttps://t.me/cybersecuritytechnologies/2528\nCVE-2019-8792:\nhttps://t.me/cybersecuritytechnologies/2535", "creation_timestamp": "2021-01-24T14:36:01.000000Z"}, {"uuid": "0e8f84c7-93e4-4818-a813-cb822497a473", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2109", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2540", "content": "#exploit\nCVE-2021-2109:\nWeblogic Server RCE involving HTTP protocol and JNDI injection gadget\nhttps://mp.weixin.qq.com/s/wX9TMXl1KVWwB_k6EZOklw", "creation_timestamp": "2024-10-09T19:55:22.000000Z"}, {"uuid": "daca1861-1129-468c-850e-4ff6e81ab245", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2109", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2605", "content": "#Analytics\nTop 10 Most Used Vulnerabilities of the Month (january 1-31)\nCVE-2021-3156:\nhttps://t.me/cybersecuritytechnologies/2577\nCVE-2020-16875:\nhttps://t.me/cybersecuritytechnologies/1751\nCVE-2020-29583:\nhttps://t.me/cybersecuritytechnologies/2386\nCVE-2021-2109:\nhttps://t.me/cybersecuritytechnologies/2540\nCVE-2020-17519:\nhttps://t.me/cybersecuritytechnologies/2473\nCVE-2020-25684/25685/25686:\nhttps://t.me/cybersecuritytechnologies/2534\nCVE-2021-3011:\nhttps://t.me/cybersecuritytechnologies/2447", "creation_timestamp": "2025-01-04T20:01:45.000000Z"}]}