Vulnerability in the Oracle Weblogic Server component of Oracle Fusion Middleware. Easily exploitable vulnerability allowss unauthenticated attacker with network access via T3 to compromise Oracle Weblogic Server. Successful attacks of this vulnerability can result in takeover of Oracle Weblogic Server. This rule supports to defend the A6: Vulnerable and Outdated Components of OWASP Top 10 - 2021. Other reference:None