{"vulnerability": "CVE-2015-4852", "sightings": [{"uuid": "a09cad7f-63df-44bf-8cc4-20b55bc3e1ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "MISP/5a4ecbf4-1b24-4a5f-9f4d-4b7c98036464", "content": "", "creation_timestamp": "2018-01-05T01:08:44.000000Z"}, {"uuid": "18f10b7c-63a5-434f-abf8-acdd1f98a651", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "MISP/42d04e94-bf5b-427d-acc8-f5d740675941", "content": "", "creation_timestamp": "2020-10-20T15:57:21.000000Z"}, {"uuid": "9db40654-d92b-42d5-9cbf-b8a3b0888394", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "MISP/5f850411-c103-491f-abff-9421425403cf", "content": "", "creation_timestamp": "2020-10-21T08:19:09.000000Z"}, {"uuid": "f57db03d-1600-49cc-a6e6-daf042ebee50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:19.000000Z"}, {"uuid": "d28c2c68-d938-4b6b-a848-897773b858de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "aded11eb-8a48-4a0a-894d-b1f70a3a0400", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "MISP/d925a2ee-e7cf-46f6-bec1-ad8e19122730", "content": "", "creation_timestamp": "2020-10-20T15:58:03.000000Z"}, {"uuid": "30282693-1ce2-4ab7-b173-e0c852db6437", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "exploited", "source": "https://www.exploit-db.com/exploits/46628", "content": "", "creation_timestamp": "2019-03-28T00:00:00.000000Z"}, {"uuid": "057b0e00-c9a1-4ef5-a826-e706935d91df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "MISP/26ba3adb-59ea-499d-b41d-2af2cc7abc0d", "content": "", "creation_timestamp": "2024-11-14T06:10:14.000000Z"}, {"uuid": "289b8b5b-3484-41a2-9e14-f5d3bde29d3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2970960", "content": "", "creation_timestamp": "2024-12-24T20:22:20.117453Z"}, {"uuid": "7770113e-e5bd-4394-a3c2-c84e0d6ddb21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:42.000000Z"}, {"uuid": "98f8a11a-10e5-44ce-b729-53e2c7fc9e05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:09:40.000000Z"}, {"uuid": "ce358700-a84a-479a-a3d4-d70d45528f5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:38.000000Z"}, {"uuid": "e5b2d194-eebf-4e2f-ad25-b80eb2303231", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "https://gist.github.com/meirdev/9456cc133c7718206f32c0d5528671a4", "content": "", "creation_timestamp": "2025-10-27T14:41:05.000000Z"}, {"uuid": "eca16521-6e80-4458-9edf-0512d8b8610f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "https://gist.github.com/meirdev/9456cc133c7718206f32c0d5528671a4", "content": "", "creation_timestamp": "2025-10-27T14:41:05.000000Z"}, {"uuid": "e7830310-1849-4c96-879d-4d6d751c0e83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/weblogic_deserialize_rawobject.rb", "content": "", "creation_timestamp": "2019-03-26T22:18:44.000000Z"}, {"uuid": "67dc8d6c-53a8-4f5e-acdf-a3b4e453efd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:58.000000Z"}, {"uuid": "c27477b8-60a5-4456-81cf-c0f32e6ad089", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "published-proof-of-concept", "source": "https://t.me/Master_X_Cha/5666", "content": "\u0644\u0627\u0632\u0645 \u062a\u062a\u0623\u0643\u062f \u0625\u0646 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u0644\u064a \u0628\u062a\u0642\u0648\u0645 \u0628\u0640 Deserialization \u0644\u064a\u0647\u0627 \u0645\u0635\u062f\u0631 \u0645\u0648\u062b\u0648\u0642\u060c \u064a\u0639\u0646\u064a \u062a\u062a\u062c\u0646\u0628 \u0627\u0644\u062a\u0639\u0627\u0645\u0644 \u0645\u0639 \u0628\u064a\u0627\u0646\u0627\u062a \u062c\u0627\u064a\u0629 \u0645\u0646 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646 \u0623\u0648 \u0645\u0635\u0627\u062f\u0631 \u063a\u064a\u0631 \u0645\u0639\u0631\u0648\u0641\u0629.\n\n3. \u0627\u0644\u062a\u062d\u0642\u0642 \u0645\u0646 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a:\n\n\u0644\u0627\u0632\u0645 \u062a\u062a\u062d\u0642\u0642 \u0645\u0646 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0642\u0628\u0644 \u0645\u0627 \u062a\u0628\u062f\u0623 \u0641\u064a \u0641\u0643\u0647\u0627. \u0645\u062b\u0644\u0627\u064b\u060c \u0644\u0648 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u062c\u0627\u064a\u0629 \u0645\u0646 HTTP request \u0623\u0648 \u0645\u0646 \u0642\u0627\u0639\u062f\u0629 \u0628\u064a\u0627\u0646\u0627\u062a\u060c \u062a\u0623\u0643\u062f \u0645\u0646 \u0625\u0646\u0647\u0627 \u0645\u062a\u0648\u0627\u0641\u0642\u0629 \u0645\u0639 \u0627\u0644\u0635\u064a\u063a\u0629 \u0627\u0644\u0645\u062a\u0648\u0642\u0639\u0629 \u0642\u0628\u0644 \u0641\u0643\u0647\u0627.\n\n4. \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0627\u0644\u0640 Digital Signatures:\n\n\u0644\u0648 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u0644\u064a \u0628\u062a\u0633\u062a\u0642\u0628\u0644\u0647\u0627 \u0645\u0646 \u0645\u0635\u062f\u0631 \u0628\u0639\u064a\u062f (remote) \u0623\u0648 \u063a\u064a\u0631 \u0645\u0648\u062b\u0648\u0642\u060c \u062d\u0627\u0648\u0644 \u062a\u0633\u062a\u062e\u062f\u0645 digital signatures \u0639\u0644\u0649 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0639\u0634\u0627\u0646 \u062a\u0636\u0645\u0646 \u0625\u0646 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0645\u0627 \u062a\u0645\u0634 \u0627\u0644\u062a\u0644\u0627\u0639\u0628 \u0641\u064a\u0647\u0627.\n\n5. \u062a\u0641\u0639\u064a\u0644 \u0627\u0644\u0640 Sandboxing:\n\n\u062d\u0637 \u0627\u0644\u0639\u0645\u0644\u064a\u0627\u062a \u0648\u0627\u0644\u0640 Deserialization \u0641\u064a \u0628\u064a\u0626\u0629 \u0645\u0646\u0639\u0632\u0644\u0629 (sandbox)\u060c \u0628\u062d\u064a\u062b \u0644\u0648 \u062d\u0635\u0644 \u0623\u064a \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u060c \u064a\u0643\u0648\u0646 \u0645\u062d\u0635\u0648\u0631 \u0641\u064a \u0628\u064a\u0626\u0629 \u0645\u063a\u0644\u0642\u0629 \u0645\u0627 \u062a\u0623\u062b\u0631\u0634 \u0639\u0644\u0649 \u0627\u0644\u0646\u0638\u0627\u0645 \u0643\u0644\u0647.\n\n6. \u0641\u062d\u0635 \u0627\u0644\u0643\u0648\u062f \u0628\u0634\u0643\u0644 \u062f\u0648\u0631\u064a:\n\n\u0644\u0627\u0632\u0645 \u062a\u0639\u0645\u0644 \u0641\u062d\u0635 \u062f\u0648\u0631\u064a (Code Review) \u0639\u0644\u0649 \u062a\u0637\u0628\u064a\u0642\u0627\u062a\u0643 \u0639\u0634\u0627\u0646 \u062a\u0643\u062a\u0634\u0641 \u0623\u064a \u062b\u063a\u0631\u0627\u062a \u0645\u0645\u0643\u0646 \u062a\u0643\u0648\u0646 \u0645\u0648\u062c\u0648\u062f\u0629 \u0641\u064a \u0639\u0645\u0644\u064a\u0629 Deserialization.\n\n\n\u0623\u062f\u0648\u0627\u062a \u0644\u0627\u0643\u062a\u0634\u0627\u0641 \u0648\u0627\u0633\u062a\u063a\u0644\u0627\u0644 Deserialization\n\n1. ysoserial:\n\n\u0623\u062f\u0627\u0629 \u0645\u0641\u062a\u0648\u062d\u0629 \u0627\u0644\u0645\u0635\u062f\u0631 \u0628\u062a\u0633\u0627\u0639\u062f\u0643 \u0639\u0644\u0649 \u0628\u0646\u0627\u0621 Payloads \u0644\u0640 Deserialization \u0641\u064a Java.\n\n\u062a\u0642\u062f\u0631 \u062a\u0633\u062a\u062e\u062f\u0645\u0647\u0627 \u0639\u0634\u0627\u0646 \u062a\u0648\u0644\u062f Payloads \u062a\u0633\u062a\u063a\u0644 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u062f\u064a.\n\n\u0645\u062b\u0627\u0644:\n\njava -jar ysoserial.jar CommonsCollections1 \"calc.exe\"\n\n2. Burp Suite Extensions:\n\n\u0641\u064a Burp Suite \u0641\u064a\u0647 \u0625\u0636\u0627\u0641\u0627\u062a \u0632\u064a Java Deserialization Scanner \u0628\u062a\u0633\u0627\u0639\u062f\u0643 \u062a\u0643\u062a\u0634\u0641 \u062b\u063a\u0631\u0627\u062a Deserialization.\n\n3. PHPGGC:\n\n\u0623\u062f\u0627\u0629 \u062e\u0627\u0635\u0629 \u0628\u0640 PHP \u0628\u062a\u0633\u0627\u0639\u062f\u0643 \u0641\u064a \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0627\u0644\u0640 Deserialization \u0639\u0646 \u0637\u0631\u064a\u0642 \u062a\u062c\u0645\u064a\u0639 \u0633\u0644\u0627\u0633\u0644 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0644\u0640 unserialize().\n\n4. Deserialization Scanner:\n\n\u0641\u064a\u0647 \u0623\u062f\u0648\u0627\u062a \u0632\u064a Deserialization Scanner \u0627\u0644\u0644\u064a \u0628\u062a\u0639\u0645\u0644 \u0641\u062d\u0635 \u062a\u0644\u0642\u0627\u0626\u064a \u0644\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0639\u0634\u0627\u0646 \u062a\u0643\u062a\u0634\u0641 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u062f\u064a.\n\n\n\n\u0623\u0645\u062b\u0644\u0629 \u062d\u0642\u064a\u0642\u064a\u0629 \u0644\u062b\u063a\u0631\u0629 Deserialization\n\nCVE-2017-9805 (Apache Struts2):\n\n\u0627\u0644\u062b\u063a\u0631\u0629 \u062f\u064a \u0643\u0627\u0646\u062a \u0645\u0648\u062c\u0648\u062f\u0629 \u0641\u064a Apache Struts2 \u0641\u064a REST Plugin\u060c \u0648\u0643\u0627\u0646\u062a \u0628\u062a\u0633\u0645\u062d \u0644\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u0628\u062a\u0646\u0641\u064a\u0630 \u0623\u0648\u0627\u0645\u0631 \u0639\u0646 \u0628\u064f\u0639\u062f \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 Deserialization.\n\nCVE-2015-4852 (WebLogic Server):\n\n\u0643\u0627\u0646\u062a \u0641\u064a WebLogic Server \u0648\u0633\u0645\u062d\u062a \u0628\u062a\u0646\u0641\u064a\u0630 \u0623\u0643\u0648\u0627\u062f \u0639\u0646 \u0628\u064f\u0639\u062f \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 Deserialization \u0644\u0643\u0627\u0626\u0646\u0627\u062a Java \u063a\u064a\u0631 \u0622\u0645\u0646\u0629.\n\n\n\u062e\u0627\u062a\u0645\u0629\n\n\u062b\u063a\u0631\u0629 Deserialization \u0648\u0627\u062d\u062f\u0629 \u0645\u0646 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u062e\u0637\u064a\u0631\u0629 \u0627\u0644\u0644\u064a \u0645\u0645\u0643\u0646 \u062a\u0639\u0631\u0636 \u062a\u0637\u0628\u064a\u0642\u0643 \u0623\u0648 \u0633\u064a\u0631\u0641\u0631\u0643 \u0644\u0644\u0627\u062e\u062a\u0631\u0627\u0642. \u0627\u0644\u0645\u0641\u062a\u0627\u062d \u0644\u0644\u062d\u0645\u0627\u064a\u0629 \u0645\u0646\u0647\u0627 \u0647\u0648 \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0645\u0643\u062a\u0628\u0627\u062a \u0622\u0645\u0646\u0629\u060c \u0648\u0627\u0644\u062a\u062d\u0642\u0642 \u0645\u0646 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0628\u0639\u0646\u0627\u064a\u0629 \u0642\u0628\u0644 \u0641\u0643\u0647\u0627\u060c \u0648\u0623\u064a\u0636\u064b\u0627 \u0641\u062d\u0635 \u0627\u0644\u0643\u0648\u062f \u0628\u0634\u0643\u0644 \u062f\u0648\u0631\u064a. \u0644\u0648 \u062d\u0628\u064a\u062a \u062a\u062d\u0645\u064a \u0646\u0641\u0633\u0643 \u0628\u0634\u0643\u0644 \u0623\u0641\u0636\u0644\u060c \u0645\u0646 \u0627\u0644\u0645\u0647\u0645 \u0623\u0646 \u062a\u0644\u062a\u0632\u0645 \u0628\u0623\u0641\u0636\u0644 \u0645\u0645\u0627\u0631\u0633\u0627\u062a \u0627\u0644\u0623\u0645\u0627\u0646 \u0641\u064a \u0627\u0644\u062a\u0639\u0627\u0645\u0644 \u0645\u0639 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u0645\u064f\u0633\u0644\u0633\u0644\u0629.", "creation_timestamp": "2025-04-24T05:54:18.000000Z"}, {"uuid": "4edf47e1-28d5-4e5f-b4bb-91db5d1a4369", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "https://gist.github.com/Darkcrai86/f31a74734bf888040ee2deaa3364c94e", "content": "", "creation_timestamp": "2025-12-09T19:29:10.000000Z"}, {"uuid": "2487f6c1-ffea-4078-bf4d-252319cc4207", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2015-4852", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/bc0dbb5d-f75c-4af4-b98a-c070599eca8a", "content": "", "creation_timestamp": "2026-02-02T12:28:59.282006Z"}, {"uuid": "864ba25f-a9a9-4c08-a090-946069230fd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "https://t.me/is_n3ws/36", "content": "\u0410\u041d\u0411 \u043f\u0440\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043b\u043e \u0430\u0442\u0430\u043a\u0438 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0432\u0442\u0432\u0435\u043d\u043d\u044b\u0445 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u043e \u043e\u0442\u0447\u0435\u0442. Top-20 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\nhttps://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF\n\nGaining Remote Access: \n-----------------------------\nCVE-2019-11510: Arbitrary file read/Pulse Secure VPN\nCVE-2019-19781: RCE/Citrix ADC\nCVE-2020-8195/3/6: Unauthenticated access\nCVE-2019-0708: RCE on RDP server\nCVE-2020-5902: RCE in F5 BIG-IP\n\nAD:\n----\nCVE-2020-1472: #ZeroLogon\nCVE-2019-1040: NTLM relay bypass\n\nMDM: \n------\nCVE-2020-15505: MobileIron device management\n\nExploiting Public Facing Services:\n---------------- \nCVE-2020-1350: RCE/ DNS Servers #SigRed\nCVE-2018-6789: RCE/ Exim mail transfer\nCVE-2018-4939: RCE/ Adobe's Cold Fusion\n\nWorkstation Local Privilege Escalation:\n-------------------------\nCVE-2020-0601: ECC spoofing #CurveBall\nCVE-2019-0803: Win32k Elevation of Privilege\n\nInternal Applications:\n--------------------\nCVE-2020-0688: RCE/MS Exchange\nCVE-2020-2555: RCE/Oracle Weblogic\nCVE-2019-11580: RCE/Atlassian Crowd\nCVE-2019-18935: RCE/ASP.Net\nCVE-2015-4852: RCE/Apache\nCVE-2019-3396: Unauthorized Access/Confluence\nCVE-2020-10189: RCE/Desktop Central", "creation_timestamp": "2020-11-06T22:00:17.000000Z"}, {"uuid": "af573602-cee9-4d04-87b3-fc34b465cb44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "Telegram/wtf6nHUYuM8omcu5jFW0fyvjBmqBFCHZfkvzfSVY_E14J-fa", "content": "", "creation_timestamp": "2025-02-06T02:41:39.000000Z"}, {"uuid": "2c8cddc7-9f46-4795-9390-5bb2c589b62a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "Telegram/G-XAzhbMBDNlyk2KRS0Tadt8XPWxn307F25v3rOkuaQ4MUB7", "content": "", "creation_timestamp": "2025-02-06T02:42:29.000000Z"}, {"uuid": "ceeff1da-a4c9-4fc0-80be-60531c311879", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "Telegram/0sD_EyHySREvSWLaWKL-XHqTqDduPkHhIy1vEKF4pCPQbv8", "content": "", "creation_timestamp": "2020-10-28T02:58:38.000000Z"}, {"uuid": "5363903b-f41c-4e60-b6ce-2b0b9893f1b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "https://t.me/arpsyndicate/1066", "content": "#ExploitObserverAlert\n\nCVE-2015-4852\n\nDESCRIPTION: Exploit Observer has 60 entries related to CVE-2015-4852. The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE: the scope of this CVE is limited to the WebLogic Server product.\n\nFIRST-EPSS: 0.966900000\nNVD-IS: 6.4\nNVD-ES: 10.0", "creation_timestamp": "2023-12-04T00:13:08.000000Z"}, {"uuid": "c4214ee6-70d0-434f-8cfc-2264c8adb444", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-4852", "type": "seen", "source": "https://t.me/ctinow/157639", "content": "https://ift.tt/c9wtWpK\nCVE-2015-4852 Exploit", "creation_timestamp": "2023-12-21T12:18:53.000000Z"}]}