mastodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance, open to everyone, but mainly English and French speaking.

Administered by:

Server stats:

750
active users

#weblogic

0 posts0 participants0 posts today
Martin<p><a href="https://blog.martinscloud.com/oracle-use-docker-compose-for-oracle-weblogic-server/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.martinscloud.com/oracle-u</span><span class="invisible">se-docker-compose-for-oracle-weblogic-server/</span></a> <a href="https://dresden.network/tags/docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>docker</span></a> <a href="https://dresden.network/tags/docker_compose" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>docker_compose</span></a> <a href="https://dresden.network/tags/compose" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compose</span></a> <a href="https://dresden.network/tags/docker_container" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>docker_container</span></a> <a href="https://dresden.network/tags/oracle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oracle</span></a> <a href="https://dresden.network/tags/weblogic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>weblogic</span></a> <a href="https://dresden.network/tags/wls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wls</span></a></p>
securityaffairs<p>U.S. <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/Oracle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Oracle</span></a> <a href="https://infosec.exchange/tags/WebLogic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebLogic</span></a> Server and <a href="https://infosec.exchange/tags/Mitel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mitel</span></a> <a href="https://infosec.exchange/tags/MiCollab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MiCollab</span></a>&nbsp;flaws to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/172783/security/u-s-cisa-adds-oracle-weblogic-server-mitel-micollab-flaws-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/172783/sec</span><span class="invisible">urity/u-s-cisa-adds-oracle-weblogic-server-mitel-micollab-flaws-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
securityaffairs<p>New <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> called <a href="https://infosec.exchange/tags/Hadooken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hadooken</span></a> targets <a href="https://infosec.exchange/tags/Oracle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Oracle</span></a> <a href="https://infosec.exchange/tags/WebLogic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebLogic</span></a> servers<br><a href="https://securityaffairs.com/168364/malware/hadooken-targets-oracle-weblogic-servers.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/168364/mal</span><span class="invisible">ware/hadooken-targets-oracle-weblogic-servers.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/Oracle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Oracle</span></a> <a href="https://infosec.exchange/tags/WebLogic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebLogic</span></a> Server flaw to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/164094/hacking/cisa-adds-oracle-weblogic-server-flaw-to-its-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/164094/hac</span><span class="invisible">king/cisa-adds-oracle-weblogic-server-flaw-to-its-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
Helidon<p>Announcing <a href="https://mastodon.social/tags/WebLogic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebLogic</span></a> / <a href="https://mastodon.social/tags/Helidon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Helidon</span></a> Integration! </p><p>Learn about it in a blog article by Randy Stafford:<br><a href="https://blogs.oracle.com/weblogicserver/post/announcing-weblogic-helidon-integration" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blogs.oracle.com/weblogicserve</span><span class="invisible">r/post/announcing-weblogic-helidon-integration</span></a></p>
heise online (inoffiziell)Eine kritische Sicherheitslücke in WebLogic-Servern sorgt erneut für Unruhe. Patches sind schon länger verfügbar.<br><a href="https://www.heise.de/news/Jetzt-patchen-Exploit-fuer-Oracle-WebLogic-im-Ausverkauf-fuer-75-US-Dollar-4977399.html" rel="nofollow noopener noreferrer" target="_blank">Jetzt patchen! Exploit für Oracle WebLogic im Ausverkauf für 75 US-Dollar</a><br>
IT News<p>Oracle vulnerability that executes malicious code is under active attack - Enlarge (credit: Oracle) <br>Attackers are targeting a recently patched Oracle WebLogic vulnerability... - <a href="https://arstechnica.com/?p=1726821" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1726821</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a>-2020-14750 <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a>-2020-14882 <a href="https://schleuss.online/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://schleuss.online/tags/weblogic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>weblogic</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>&amp;it <a href="https://schleuss.online/tags/oracle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oracle</span></a></p>
IT News<p>Hackers are on the hunt for Oracle servers vulnerable to potent exploit - Enlarge (credit: Victorgrigas) <br>Hackers are scanning the Internet for machines that have yet to pa... - <a href="https://arstechnica.com/?p=1718257" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1718257</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a>-2020-14882 <a href="https://schleuss.online/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://schleuss.online/tags/weblogic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>weblogic</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>&amp;it <a href="https://schleuss.online/tags/oracle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oracle</span></a></p>
Dr. Roy Schestowitz (罗伊)<a class="hashtag" href="https://pleroma.site/tag/ibm" rel="nofollow noopener noreferrer" target="_blank">#IBM</a> / <a class="hashtag" href="https://pleroma.site/tag/redhat" rel="nofollow noopener noreferrer" target="_blank">#RedHat</a> : <a class="hashtag" href="https://pleroma.site/tag/fedora" rel="nofollow noopener noreferrer" target="_blank">#Fedora</a> 's Power Architecture Builds, <a class="hashtag" href="https://pleroma.site/tag/websphere" rel="nofollow noopener noreferrer" target="_blank">#WebSphere</a> / <a class="hashtag" href="https://pleroma.site/tag/weblogic" rel="nofollow noopener noreferrer" target="_blank">#WebLogic</a> 's Demise, Red Hat’s David Egts<br> <a href="http://www.tuxmachines.org/node/128164" rel="nofollow noopener noreferrer" target="_blank">http://www.tuxmachines.org/node/128164</a>
Semi news bot of the Fedi<p>Oracle issues emergency update to patch actively exploited WebLogic flaw <a href="https://arstechnica.com/?p=1524451" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1524451</span><span class="invisible"></span></a> <a href="https://mstdn.foxfam.club/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://mstdn.foxfam.club/tags/uncategorized" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Uncategorized</span></a> <a href="https://mstdn.foxfam.club/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://mstdn.foxfam.club/tags/weblogic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebLogic</span></a> <a href="https://mstdn.foxfam.club/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Biz</span></a>&amp;IT <a href="https://mstdn.foxfam.club/tags/oracle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oracle</span></a></p>
Dr. Roy Schestowitz (罗伊)<a class="hashtag" href="https://pleroma.site/tag/oracle" rel="nofollow noopener noreferrer" target="_blank">#oracle</a> <a class="hashtag" href="https://pleroma.site/tag/proprietarysoftware" rel="nofollow noopener noreferrer" target="_blank">#proprietarysoftware</a> remotely exploitable, with exploits in the wild and no patches (i.e. the usual from such crap software) <a href="https://www.exploit-db.com/exploits/46942" rel="nofollow noopener noreferrer" target="_blank">https://www.exploit-db.com/exploits/46942</a> <a class="hashtag" href="https://pleroma.site/tag/weblogic" rel="nofollow noopener noreferrer" target="_blank">#weblogic</a>
Dr. Roy Schestowitz (罗伊)New <a class="hashtag" href="https://pleroma.site/tag/ransomware" rel="nofollow noopener noreferrer" target="_blank">#ransomware</a> variant targets <a class="hashtag" href="https://pleroma.site/tag/oracle" rel="nofollow noopener noreferrer" target="_blank">#Oracle</a> <a class="hashtag" href="https://pleroma.site/tag/weblogic" rel="nofollow noopener noreferrer" target="_blank">#WebLogic</a> on <a class="hashtag" href="https://pleroma.site/tag/microsoft" rel="nofollow noopener noreferrer" target="_blank">#Microsoft</a> <a class="hashtag" href="https://pleroma.site/tag/windows" rel="nofollow noopener noreferrer" target="_blank">#Windows</a> <br> <a href="https://www.itwire.com/security/86890-new-ransomware-variant-targets-oracle-weblogic-on-windows.html" rel="nofollow noopener noreferrer" target="_blank">https://www.itwire.com/security/86890-new-ransomware-variant-targets-oracle-weblogic-on-windows.html</a> <a href="http://techrights.org/wiki/index.php/Microsoft_and_the_NSA" rel="nofollow noopener noreferrer" target="_blank">http://techrights.org/wiki/index.php/Microsoft_and_the_NSA</a>
Dr. Roy Schestowitz (罗伊)<a class="hashtag" href="https://pleroma.site/tag/sodinokibi" rel="nofollow noopener noreferrer" target="_blank">#Sodinokibi</a> <a class="hashtag" href="https://pleroma.site/tag/ransomware" rel="nofollow noopener noreferrer" target="_blank">#ransomware</a> exploits <a class="hashtag" href="https://pleroma.site/tag/weblogic" rel="nofollow noopener noreferrer" target="_blank">#WebLogic</a> <a class="hashtag" href="https://pleroma.site/tag/server" rel="nofollow noopener noreferrer" target="_blank">#Server</a> vulnerability <a href="https://blog.talosintelligence.com/2019/04/sodinokibi-ransomware-exploits-weblogic.html" rel="nofollow noopener noreferrer" target="_blank">https://blog.talosintelligence.com/2019/04/sodinokibi-ransomware-exploits-weblogic.html</a> <a class="hashtag" href="https://pleroma.site/tag/proprietarysoftware" rel="nofollow noopener noreferrer" target="_blank">#proprietarysoftware</a> + <a class="hashtag" href="https://pleroma.site/tag/microsoft" rel="nofollow noopener noreferrer" target="_blank">#microsoft</a>
Gregori Fabre<p>Faulty Patch for Oracle <a href="https://mamot.fr/tags/weblogic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>weblogic</span></a> Flaw Opens Updated Servers to Hackers Again <a href="https://mamot.fr/tags/hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackers</span></a> <a href="https://thehackernews.com/2018/04/oracle-weblogic-rce-exploit.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2018/04/orac</span><span class="invisible">le-weblogic-rce-exploit.html</span></a></p>
heise online (inoffiziell)Angreifer nehmen derzeit Oracle-Server ins Visier, um Kryptogeld zu schürfen. Anzeichen dafür sind schnell erkennbar. <a href="https://www.heise.de/security/meldung/Angreifer-attackieren-ungepatchte-Server-Apps-von-Oracle-3938626.html" class="" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">www.heise.de/security/meldung/</span><span class="invisible">Angreifer-attackieren-ungepatchte-Server-Apps-von-Oracle-3938626.html</span></a> #<a href="https://squeet.me/search?tag=Hacking" class="" rel="nofollow noopener noreferrer" target="_blank">Hacking</a> #<a href="https://squeet.me/search?tag=Mining" class="" rel="nofollow noopener noreferrer" target="_blank">Mining</a> #<a href="https://squeet.me/search?tag=Monero" class="" rel="nofollow noopener noreferrer" target="_blank">Monero</a> #<a href="https://squeet.me/search?tag=Oracle" class="" rel="nofollow noopener noreferrer" target="_blank">Oracle</a> #<a href="https://squeet.me/search?tag=PeopleSoft" class="" rel="nofollow noopener noreferrer" target="_blank">PeopleSoft</a> #<a href="https://squeet.me/search?tag=Server" class="" rel="nofollow noopener noreferrer" target="_blank">Server</a> #<a href="https://squeet.me/search?tag=Weblogic" class="" rel="nofollow noopener noreferrer" target="_blank">Weblogic</a>