From 9c799b079601e4c09a89fc65adecaa9a3e9fa6f6 Mon Sep 17 00:00:00 2001 From: el3ktraz <86217941+el3ktraz@users.noreply.github.com> Date: Wed, 19 Jul 2023 10:06:00 +0530 Subject: [PATCH 1/4] Update cve_most_exploited.md --- cve_most_exploited.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/cve_most_exploited.md b/cve_most_exploited.md index c5d8c07..2f362bf 100644 --- a/cve_most_exploited.md +++ b/cve_most_exploited.md @@ -57,3 +57,10 @@ |Zimbra |CVE-2022-27925 |Path Traversal |https://github.com/Josexv1/CVE-2022-27925| |Zoho |CVE-2021-40539 |Remote code execution (RCE)|https://github.com/DarkSprings/CVE-2021-40539| |Zoho |CVE-2022-35405 |Remote code execution (RCE)|https://github.com/viniciuspereiras/CVE-2022-35405| +|Barracuda |CVE-2023-2868 |Remote code execution (RCE) | _https://github.com/cfielding-r7/poc-cve-2023-2868/blob/main/poc_cve_2023_2868.rb| +|Citrix |CVE-2022-27518 | Remote code execution (RCE) | https://github.com/dolby360/CVE-2022-27518_POC| +|Fortinet |CVE-2022-42475 |Remote code execution (RCE)| https://github.com/CKevens/CVE-2022-42475-RCE-POC| +|Microsoft |CVE-2023-28252 |Elevation of privilege (EOP)| https://github.com/fortra/CVE-2023-28252| +|Microsoft |CVE-2023-29336 |Elevation of privilege (EOP)| https://github.com/m-cetin/CVE-2023-29336| +|Sophos |CVE-2022-3236 |Remote code execution (RCE)| https://web.archive.org/web/20221017063308/https://github.com/n0npro/CVE-2022-3236-RCE-POC| + From 34f99a5c8f84af64efa7d13e9a133ba60dfada3c Mon Sep 17 00:00:00 2001 From: el3ktraz <86217941+el3ktraz@users.noreply.github.com> Date: Wed, 19 Jul 2023 10:06:58 +0530 Subject: [PATCH 2/4] Update cve_most_exploited.md --- cve_most_exploited.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cve_most_exploited.md b/cve_most_exploited.md index 2f362bf..e6e1fee 100644 --- a/cve_most_exploited.md +++ b/cve_most_exploited.md @@ -63,4 +63,9 @@ |Microsoft |CVE-2023-28252 |Elevation of privilege (EOP)| https://github.com/fortra/CVE-2023-28252| |Microsoft |CVE-2023-29336 |Elevation of privilege (EOP)| https://github.com/m-cetin/CVE-2023-29336| |Sophos |CVE-2022-3236 |Remote code execution (RCE)| https://web.archive.org/web/20221017063308/https://github.com/n0npro/CVE-2022-3236-RCE-POC| +| Microsoft | CVE-2022-42046 | Local Privilege Escalation (LPE) | https://github.com/kkent030315/CVE-2022-42046| +| Microsoft | CVE-2023-21752 | Arbitrary File Delete to System Shell | https://github.com/Wh04m1001/CVE-2023-21752 | +| Microsoft | CVE-2023-21768 | Local Privilege Escalation (LPE) | https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768 | +| Fortinet FortiNAC | CVE-2022-39952 | Arbitrary file write | https://github.com/horizon3ai/CVE-2022-39952 | + From d2083a8ade755deaf15f790f56061f928518d26e Mon Sep 17 00:00:00 2001 From: el3ktraz <86217941+el3ktraz@users.noreply.github.com> Date: Wed, 19 Jul 2023 10:07:24 +0530 Subject: [PATCH 3/4] Update cve_most_exploited.md --- cve_most_exploited.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/cve_most_exploited.md b/cve_most_exploited.md index e6e1fee..0c278b4 100644 --- a/cve_most_exploited.md +++ b/cve_most_exploited.md @@ -67,5 +67,8 @@ | Microsoft | CVE-2023-21752 | Arbitrary File Delete to System Shell | https://github.com/Wh04m1001/CVE-2023-21752 | | Microsoft | CVE-2023-21768 | Local Privilege Escalation (LPE) | https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768 | | Fortinet FortiNAC | CVE-2022-39952 | Arbitrary file write | https://github.com/horizon3ai/CVE-2022-39952 | +|Atlassian |CVE-2019-11580 |Remote code execution (RCE) | https://github.com/jas502n/CVE-2019-11580 | +|F5 Big IP |CVE 2020-5902 |Remote code execution (RCE)| https://github.com/yasserjanah/CVE-2020-5902 | +|Progress MOVEit|CVE-2023-34362 |Remote code execution| https://github.com/horizon3ai/CVE-2023-34362 | From 94fa62001f3412c824136a3d729706fc3c8218d6 Mon Sep 17 00:00:00 2001 From: el3ktraz <86217941+el3ktraz@users.noreply.github.com> Date: Wed, 19 Jul 2023 10:12:16 +0530 Subject: [PATCH 4/4] Update cve_most_exploited.md --- cve_most_exploited.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/cve_most_exploited.md b/cve_most_exploited.md index 0c278b4..c50d8a2 100644 --- a/cve_most_exploited.md +++ b/cve_most_exploited.md @@ -70,5 +70,7 @@ |Atlassian |CVE-2019-11580 |Remote code execution (RCE) | https://github.com/jas502n/CVE-2019-11580 | |F5 Big IP |CVE 2020-5902 |Remote code execution (RCE)| https://github.com/yasserjanah/CVE-2020-5902 | |Progress MOVEit|CVE-2023-34362 |Remote code execution| https://github.com/horizon3ai/CVE-2023-34362 | - - +|Microsoft windows|CVE-2023-27350|PaperCut MF/NG RCE Vulnerability|https://github.com/adhikara13/CVE-2023-27350| +|Microsoft windows|CVE-2023-21752|arbitrary file delete vulnerability in Windows Backup service|https://github.com/Wh04m1001/CVE-2023-21752| +|Microsoft windows|CVE-2023-23397|Microsoft Exchange CalendarNTLMLeak|https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY,https://github.com/api0cradle/CVE-2023-23397-POC-Powershell| +|Microsoft windows|CVE-2023-21823|Windows Graphics Component RCE Vulnerability & Windows Graphics Component Remote Code Execution|https://github.com/Elizarfish/CVE-2023-21823|