From d30422d95b1393e5c6c1331663e2e3a599573c3f Mon Sep 17 00:00:00 2001 From: V <45754825+vxsh4d0w@users.noreply.github.com> Date: Mon, 9 Jan 2023 10:56:38 +0000 Subject: [PATCH] Added CVE-2022-27518 --- cve_most_exploited.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/cve_most_exploited.md b/cve_most_exploited.md index 1472181..eb86423 100644 --- a/cve_most_exploited.md +++ b/cve_most_exploited.md @@ -4,11 +4,12 @@ |Atlassian |CVE-2019-11580 |Remote code execution (RCE) |https://corben.io/atlassian-crowd-rce/| |Atlassian |CVE-2022-36804 |Code injection |https://github.com/BenHays142/CVE-2022-36804-PoC-Exploit| |Citrix |CVE-2019-19781 |Arbitrary code execution |https://github.com/trustedsec/cve-2019-19781| -|Confluence |CVE-2019-3396 |Remote code execution (RCE)|https://github.com/jas502n/CVE-2019-3396| -|Confluence |CVE-2022-26134 |Remote code execution (RCE)|https://github.com/crowsec-edtech/CVE-2022-26134| |Citrix |CVE-2020-8193 |Local File Inclusion |https://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html| |Citrix |CVE-2020-8195 |Local File Inclusion |https://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html| |Citrix |CVE-2020-8196 |Local File Inclusion |https://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html| +|Citrix |CVE-2022-27518 | Remote code execution (RCE)|| +|Confluence |CVE-2019-3396 |Remote code execution (RCE)|https://github.com/jas502n/CVE-2019-3396| +|Confluence |CVE-2022-26134 |Remote code execution (RCE)|https://github.com/crowsec-edtech/CVE-2022-26134| |Drupal |CVE-2018-7600 |Remote code execution (RCE) |https://github.com/a2u/CVE-2018-7600| |Fortinet |CVE-2018-13379 |Path traversal |https://github.com/milo2012/CVE-2018-13382| |Fortinet |CVE-2022-40684 |Authentication Bypass |https://github.com/horizon3ai/CVE-2022-40684|