Oracle Weblogic Server deserialization remote command execution exploit with patch bypass.
837c2f0617dd4b3f41f05a46a57a7e73ab7bc936ea31caa66a3b2934f79ee87c
An unauthenticated attacker with network access to the Oracle Weblogic Server T3 interface can send a serialized object to the interface to execute code on vulnerable hosts.
3b706831a95e7ec9767cb60c343331abe8d92f1382ece3a3f50c5943e25d0275