5
CVSSv2

CVE-2014-4210

Published: 17/07/2014 Updated: 09/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 447
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote malicious users to affect confidentiality via vectors related to WLS - Web Services.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle fusion middleware 10.0.2

oracle fusion middleware 10.3.6

Github Repositories

CVE-2014-4210 SSRF PORTSCANNER PoC

CVE-2014-4210 SSRF PORTSCANNER PoC Author: Aaron Mizrachi (unmanarc) aaron@unmanarccom Twitter: twittercom/unmanarc License: LGPLv3 Liability / Legal Disclaimer This project is made for EDUCATIONAL and ETHICAL TESTING purposes ONLY Using of source code in this repository for attacking targets without prior signed mutual consent is ILLEGAL I take NO responsibility an

CVE-2014-4210+Redis未授权访问

CVE-2014-4210+Redis未授权访问 安装 pip install -r requirementstxt 使用 usage: SSRFXpy [-h] [--url URL] [--threads THREADS] [--app APP] [--network NETWORK] [--type TYPE] [--vulapp VULAPP] [--lhost LHOST] [--lport LPORT] [--rhost RHOST] [--rport RPORT] SSRF Explotion Tools optiona

CVE-2014-4210+Redis未授权访问 安装 pip install -r requirementstxt 使用 usage: SSRFXpy [-h] [--url URL] [--threads THREADS] [--app APP] [--network NETWORK] [--type TYPE] [--vulapp VULAPP] [--lhost LHOST] [--lport LPORT] [--rhost RHOST] [--rport RPORT] SSRF Explotion Tools optiona

Weblogic SearchPublicRegistries SSRF(CVE-2014-4210) Exploit Script based on Python3

WebLogic-SSRF_CVE-2014-4210 Weblogic SearchPublicRegistries SSRF(CVE-2014-4210) Exploit Script based on Python3 Usage optional arguments: -h, --help        show this help message and exit -u U        Single Target URL

try a faster and simpler scanning framework.

Simple Scanner 原扫描器:githubcom/0xn0ne/weblogicScanner Simple Scanner,尽可能简单化的扫描,搭载 DNS 反射功能。 usage: sspy [-h] -t TARGETS [TARGETS ] [-m MODULE [MODULE ]] [-p PROCESS_NUMBER] [-o OUTPUT_FORMAT] [-s] ███████╗██╗███╗ ███╗██████╗ ██╗ ███████