diff --git a/cve_most_exploited.md b/cve_most_exploited.md index 5184e5c..66760a6 100644 --- a/cve_most_exploited.md +++ b/cve_most_exploited.md @@ -8,8 +8,11 @@ |Citrix |CVE-2020-8195 |Local File Inclusion |https://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html| |Citrix |CVE-2020-8196 |Local File Inclusion |https://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html| |Drupal |CVE-2018-7600 |Remote code execution (RCE) |https://github.com/a2u/CVE-2018-7600| -|Fortinet |CVE 2018-13379 |Path traversal |https://github.com/milo2012/CVE-2018-13382| +|Fortinet |CVE-2018-13379 |Path traversal |https://github.com/milo2012/CVE-2018-13382| +|Fortinet |CVE-2022-40684 |Authentication Bypass |https://github.com/horizon3ai/CVE-2022-40684| |F5 Big IP |CVE 2020-5902 |Remote code execution (RCE)|https://pentest-tools.com/blog/big-ip-tmui-rce/| +|Log4j |CVE 2021-44228 |Remote code execution (RCE) |https://www.advintel.io/post/ransomware-advisory-log4shell-exploitation-for-initial-access-lateral-movement| +|Log4j |CVE-2021-44228 |Remote code execution (RCE)|https://github.com/kozmer/log4j-shell-poc| |F5 Big IP |CVE-2022-1388 |Remote Code execution (RCE)|https://github.com/alt3kx/CVE-2022-1388_PoC| |Microsoft |CVE-2017-11882 |Remote code execution (RCE)|https://github.com/unamer/CVE-2017-11882| |Microsoft |CVE-2019-0604 |Remote code execution (RCE) |https://www.exploit-db.com/exploits/48053| @@ -22,12 +25,13 @@ |Microsoft |CVE-2021-26858 |Arbitrary File Write |https://pythonrepo.com/repo/herwonowr-exprolog| |Microsoft |CVE-2021-27065 |Remote code execution (RCE) |https://pythonrepo.com/repo/herwonowr-exprolog| |Microsoft |CVE-2022-30190 |Remote code execution (RCE) |https://github.com/kevthehermit/follina.py| +|Microsoft |CVE-2022-41082 |Remote Code execution (RCE)|https://github.com/backcr4t/CVE-2022-41082-RCE-POC| +|Microsoft |CVE-2022-41040 |Remote Code ececution (RCE)|https://github.com/kljunowsky/CVE-2022-41040-POC| |MobileIron |CVE 2020-15505 |Arbitrary File Write |https://github.com/httpvoid/CVE-Reverse/tree/master/CVE-2020-15505| |Oracle |CVE-2020-2555 |Remote code execution (RCE)|https://www.exploit-db.com/exploits/48508| -|Pulse |CVE 2019-11510 |Arbitrary file reading |https://github.com/projectzeroindia/CVE-2019-11510| -|Telerik |CVE 2019-18935 |Remote code execution (RCE) |https://labs.bishopfox.com/tech-blog/cve-2019-18935-remote-code-execution-in-telerik-ui#exploit-details| -|Weblogic |CVE-2020-2555 |Remote code execution (RCE)|https://www.exploit-db.com/exploits/48508| -|Log4j |CVE 2021-44228 |Remote code execution (RCE) |https://www.advintel.io/post/ransomware-advisory-log4shell-exploitation-for-initial-access-lateral-movement| -|Vmware |CVE-2021-21985 |Remote code executon (RCE)|https://github.com/alt3kx/CVE-2021-21985_PoC| +|Pulse |CVE-2019-11510 |Arbitrary file reading |https://github.com/projectzeroindia/CVE-2019-11510| |Telerik |CVE-2019-18935 |Remote code execution (RCE)|https://github.com/noperator/CVE-2019-18935| -|Log4j |CVE-2021-44228 |Remote code execution (RCE)|https://github.com/kozmer/log4j-shell-poc| +|Weblogic |CVE-2020-2555 |Remote code execution (RCE)|https://www.exploit-db.com/exploits/48508| +|Vmware |CVE-2021-21985 |Remote code executon (RCE)|https://github.com/alt3kx/CVE-2021-21985_PoC| +|Zimbra |CVE-2022-41352 |Remote Code Execution (RCE)|https://github.com/segfault-it/cve-2022-41352| +