From 467f18e80efcade3d7965628a33a4cf683158c83 Mon Sep 17 00:00:00 2001 From: V <45754825+vxsh4d0w@users.noreply.github.com> Date: Fri, 13 Jan 2023 15:17:21 +0000 Subject: [PATCH] Added CVE-2022-42475 Added CVE-2022-42475 - https://thehackernews.com/2023/01/fortios-flaw-exploited-as-zero-day-in.html --- cve_most_exploited.md | 1 + 1 file changed, 1 insertion(+) diff --git a/cve_most_exploited.md b/cve_most_exploited.md index bb996ff..3c1024b 100644 --- a/cve_most_exploited.md +++ b/cve_most_exploited.md @@ -13,6 +13,7 @@ |Drupal |CVE-2018-7600 |Remote code execution (RCE) |https://github.com/a2u/CVE-2018-7600| |Fortinet |CVE-2018-13379 |Path traversal |https://github.com/milo2012/CVE-2018-13382| |Fortinet |CVE-2022-40684 |Authentication Bypass |https://github.com/horizon3ai/CVE-2022-40684| +|Fortinet |CVE-2022-42475 |Remote code execution (RCE)|| |F5 Big IP |CVE 2020-5902 |Remote code execution (RCE)|https://pentest-tools.com/blog/big-ip-tmui-rce/| |Log4j |CVE-2021-44228 |Remote code execution (RCE)|https://github.com/kozmer/log4j-shell-poc| |F5 Big IP |CVE-2022-1388 |Remote Code execution (RCE)|https://github.com/alt3kx/CVE-2022-1388_PoC|