Oracle Weblogic Server vulnerabilities

306 known vulnerabilities affecting oracle/weblogic_server.

Total CVEs
306
CISA KEV
15
actively exploited
Public exploits
31
Exploited in wild
22
Severity breakdown
CRITICAL81HIGH92MEDIUM129LOW4

Vulnerabilities

Page 4 of 16
CVE-2022-21361MEDIUMCVSS 6.1v12.2.1.4.0v14.1.1.0.02022-01-19
CVE-2022-21361 [MEDIUM] CVE-2022-21361: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Sample a Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Sample apps). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a p
nvd
CVE-2022-21262MEDIUMCVSS 6.1v12.2.1.4.0v14.1.1.0.02022-01-19
CVE-2022-21262 [MEDIUM] CVE-2022-21262: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples) Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a perso
nvd
CVE-2022-21258MEDIUMCVSS 6.1v14.1.1.0.02022-01-19
CVE-2022-21258 [MEDIUM] CVE-2022-21258: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples) Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). The supported version that is affected is 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than t
nvd
CVE-2022-21260MEDIUMCVSS 6.1v12.2.1.4.0v14.1.1.0.02022-01-19
CVE-2022-21260 [MEDIUM] CVE-2022-21260: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples) Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a perso
nvd
CVE-2022-21386MEDIUMCVSS 6.1v12.1.3.0.0v12.2.1.3.0+2 more2022-01-19
CVE-2022-21386 [MEDIUM] CVE-2022-21386: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Cont Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require
nvd
CVE-2022-21350MEDIUMCVSS 6.5v12.1.3.0.0v12.2.1.3.0+2 more2022-01-19
CVE-2022-21350 [MEDIUM] CVE-2022-21350: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). S Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerabili
nvd
CVE-2022-21257MEDIUMCVSS 6.1v12.2.1.4.0v14.1.1.0.02022-01-19
CVE-2022-21257 [MEDIUM] CVE-2022-21257: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples) Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a perso
nvd
CVE-2022-21261MEDIUMCVSS 6.1v12.2.1.4.0v14.1.1.0.02022-01-19
CVE-2022-21261 [MEDIUM] CVE-2022-21261: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples) Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a perso
nvd
CVE-2022-21259MEDIUMCVSS 6.1v12.2.1.4.0v14.1.1.0.02022-01-19
CVE-2022-21259 [MEDIUM] CVE-2022-21259: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples) Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a perso
nvd
CVE-2022-21252MEDIUMCVSS 6.5v12.2.1.4.0v14.1.1.0.02022-01-19
CVE-2022-21252 [MEDIUM] CVE-2022-21252: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples) Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in un
nvd
CVE-2022-23305CRITICALCVSS 9.8v12.2.1.3.0v12.2.1.4.0+1 more2022-01-18
CVE-2022-23305 [CRITICAL] CWE-89 CVE-2022-23305: By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter whe By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that ar
nvd
CVE-2022-23302HIGHCVSS 8.8v12.2.1.3.0v12.2.1.4.0+1 more2022-01-18
CVE-2022-23302 [HIGH] CVE-2022-23302: JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the att JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in r
nvd
CVE-2022-23307HIGHCVSS 8.8v12.2.1.3.0v12.2.1.4.0+1 more2022-01-18
CVE-2022-23307 [HIGH] CVE-2022-23307: CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chain CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
nvd
CVE-2021-44832MEDIUMCVSS 6.6Exploitedv12.2.1.3.0v12.2.1.4.0+1 more2021-12-28
CVE-2021-44832 [MEDIUM] CWE-20 CVE-2021-44832: Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) a Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java
nvd
CVE-2021-45105MEDIUMCVSS 5.9v12.2.1.3.0v12.2.1.4.0+1 more2021-12-18
CVE-2021-45105 [MEDIUM] CWE-20 CVE-2021-45105: Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from u Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.
nvd
CVE-2021-23450CRITICALCVSS 9.8v12.2.1.4.0v14.1.1.0.02021-12-17
CVE-2021-23450 [CRITICAL] CWE-1321 CVE-2021-23450: All versions of package dojo are vulnerable to Prototype Pollution via the setObject function. All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
nvd
CVE-2021-4104HIGHCVSS 7.5v12.2.1.3.0v12.2.1.4.0+1 more2021-12-14
CVE-2021-4104 [HIGH] CWE-502 CVE-2021-4104: JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has wr JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228.
nvd
CVE-2021-41182MEDIUMCVSS 6.1v12.2.1.3.0v12.2.1.4.0+1 more2021-10-26
CVE-2021-41182 [MEDIUM] CWE-79 CVE-2021-41182: jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the valu jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not acc
nvd
CVE-2021-41183MEDIUMCVSS 6.1v12.2.1.3.0v12.2.1.4.0+1 more2021-10-26
CVE-2021-41183 [MEDIUM] CWE-79 CVE-2021-41183: jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the valu jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is
nvd
CVE-2021-41184MEDIUMCVSS 6.1v12.2.1.3.0v12.2.1.4.0+1 more2021-10-26
CVE-2021-41184 [MEDIUM] CWE-79 CVE-2021-41184: jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the valu jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the val
nvd