{"vulnerability": "CVE-2024-21182", "sightings": [{"uuid": "8298306d-6140-48e5-8768-c9fa92a6743d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-21182", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lenisuth4s22", "content": "", "creation_timestamp": "2025-01-01T02:20:51.622996Z"}, {"uuid": "09cc10cb-baa0-45b3-996f-3d671efe6e63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21182", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3leo5hi2hil2a", "content": "", "creation_timestamp": "2025-01-01T08:30:17.206481Z"}, {"uuid": "48b7201c-1283-4c2b-a86d-1e6dacef6334", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21182", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3leormlhvin25", "content": "", "creation_timestamp": "2025-01-01T14:31:03.769806Z"}, {"uuid": "1d028f96-4fad-4ff5-af74-12af1a2241c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21182", "type": "seen", "source": "MISP/f7787455-9994-4047-b6f7-77347597c104", "content": "", "creation_timestamp": "2025-08-26T18:36:20.000000Z"}, {"uuid": "222ee949-f6c2-4443-b796-d0c302180107", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21182", "type": "seen", "source": "https://t.me/cvedetector/1042", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-21182 - Oracle WebLogic Server Remote Unauthorized Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-21182 \nPublished : July 16, 2024, 11:15 p.m. | 44\u00a0minutes ago \nDescription : Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core).  Supported versions that are affected are 12.2.1.4.0 and  14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-17T02:20:15.000000Z"}, {"uuid": "5d5274eb-cb15-45ed-b141-9c3cd953a4bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21182", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9640", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPoC for CVE-2024021182\nURL\uff1ahttps://github.com/k4it0k1d/CVE-2024-21182\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-29T15:51:23.000000Z"}, {"uuid": "d898807a-2e9a-4f76-b59f-35f0265168d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21182", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/1926", "content": "\u26a1\ufe0fCVE-2024-21182 : Allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server\n\nPoC : https://github.com/k4it0k1d/CVE-2024-21182\n\n#CyberBulletin", "creation_timestamp": "2025-01-03T06:32:56.000000Z"}, {"uuid": "da86e3d4-af5c-41f1-835e-c2b5185a1dd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21182", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/9339", "content": "\u26a1\ufe0fCVE-2024-21182 : Allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server\n\nPoC : https://github.com/k4it0k1d/CVE-2024-21182\n\n#CyberBulletin", "creation_timestamp": "2025-01-06T06:33:13.000000Z"}, {"uuid": "f3417be0-9b4c-45d5-b1c7-8f2e53c4d118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21182", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1394", "content": "#Github #Tools\n\nSlides for COM Hijacking AV/EDR Talk on 38c3\n\nhttps://github.com/0x4d5a-ctf/38c3_com_talk\n\nPoC for CVE-2024-21182\n\nhttps://github.com/k4it0k1d/CVE-2024-21182\n\nRustScan in Rust\n\nhttps://github.com/spacialsec/RustScan\n\nA Hex Editor for Reverse Engineers, Programmers.\n\nhttps://github.com/WerWolv/ImHex\n\nRed-Team-Exercises\n\nhttps://github.com/CyberSecurityUP/Red-Team-Exercises\n\nRecon tool to help you search vulnerability on web server.\n\nhttps://github.com/x0rr-dan/s1c0n\n\n#HackersForum", "creation_timestamp": "2024-12-31T02:57:20.000000Z"}, {"uuid": "d045301a-08f4-4dd9-a166-c03ae16e6b36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21182", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/9229", "content": "#Github #Tools\n\nSlides for COM Hijacking AV/EDR Talk on 38c3\n\nhttps://github.com/0x4d5a-ctf/38c3_com_talk\n\nPoC for CVE-2024-21182\n\nhttps://github.com/k4it0k1d/CVE-2024-21182\n\nRustScan in Rust\n\nhttps://github.com/spacialsec/RustScan\n\nA Hex Editor for Reverse Engineers, Programmers.\n\nhttps://github.com/WerWolv/ImHex\n\nRed-Team-Exercises\n\nhttps://github.com/CyberSecurityUP/Red-Team-Exercises\n\nRecon tool to help you search vulnerability on web server.\n\nhttps://github.com/x0rr-dan/s1c0n\n\n#HackersForum", "creation_timestamp": "2024-12-31T02:57:24.000000Z"}, {"uuid": "3f498757-3242-411b-a47d-0c00f364770d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21182", "type": "seen", "source": "https://t.me/proxy_bar/2464", "content": "CVE-2024-21182\nOracle WebLogic Server JNDI Vulnerability\nLink", "creation_timestamp": "2024-12-31T17:38:06.000000Z"}, {"uuid": "c0e9a76f-e241-4151-8f77-189cf88dc260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21182", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/4053", "content": "#Github #Tools\n\nSlides for COM Hijacking AV/EDR Talk on 38c3\n\nhttps://github.com/0x4d5a-ctf/38c3_com_talk\n\nPoC for CVE-2024-21182\n\nhttps://github.com/k4it0k1d/CVE-2024-21182\n\nRustScan in Rust\n\nhttps://github.com/spacialsec/RustScan\n\nA Hex Editor for Reverse Engineers, Programmers.\n\nhttps://github.com/WerWolv/ImHex\n\nRed-Team-Exercises\n\nhttps://github.com/CyberSecurityUP/Red-Team-Exercises\n\nRecon tool to help you search vulnerability on web server.\n\nhttps://github.com/x0rr-dan/s1c0n\n\n#HackersForum", "creation_timestamp": "2024-12-31T02:57:13.000000Z"}, {"uuid": "efe0c639-8632-4974-bfab-6d8d644924a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21182", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/27030", "content": "\u26a1\ufe0fCVE-2024-21182 : Allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server\n\nPoC : https://github.com/k4it0k1d/CVE-2024-21182\n\n#CyberBulletin", "creation_timestamp": "2025-01-03T06:32:56.000000Z"}, {"uuid": "aae1911a-c78b-4e2c-a633-5275fe1227b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21182", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7807", "content": "#Github #Tools\n\nSlides for COM Hijacking AV/EDR Talk on 38c3\n\nhttps://github.com/0x4d5a-ctf/38c3_com_talk\n\nPoC for CVE-2024-21182\n\nhttps://github.com/k4it0k1d/CVE-2024-21182\n\nRustScan in Rust\n\nhttps://github.com/spacialsec/RustScan\n\nA Hex Editor for Reverse Engineers, Programmers.\n\nhttps://github.com/WerWolv/ImHex\n\nRed-Team-Exercises\n\nhttps://github.com/CyberSecurityUP/Red-Team-Exercises\n\nRecon tool to help you search vulnerability on web server.\n\nhttps://github.com/x0rr-dan/s1c0n\n\n#HackersForum", "creation_timestamp": "2024-12-31T02:57:24.000000Z"}]}