From 0382c4de1fe196c2eb09e80772039e461e96403d Mon Sep 17 00:00:00 2001 From: V <45754825+vxsh4d0w@users.noreply.github.com> Date: Fri, 4 Aug 2023 14:00:10 +0000 Subject: [PATCH] Update cve_most_exploited_Review.md The list has been reviewed, sorted and updated with new poc and deleting several CVEs never actively exploited by any threat actor or already present. --- cve_most_exploited.md | 29 +++++++---------------------- 1 file changed, 7 insertions(+), 22 deletions(-) diff --git a/cve_most_exploited.md b/cve_most_exploited.md index c50d8a2..6808a7d 100644 --- a/cve_most_exploited.md +++ b/cve_most_exploited.md @@ -2,7 +2,7 @@ |Vendor|CVE|Type|PoC| | ------ | ------ | ------ | ------ | |3CX |CVE-2023-29059 |Arbitrary code execution |https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29059| -|Atlassian |CVE-2019-11580 |Remote code execution (RCE) |https://corben.io/atlassian-crowd-rce/| +|Atlassian |CVE-2019-11580 |Remote code execution (RCE) |https://github.com/jas502n/CVE-2019-11580| |Atlassian |CVE-2022-36804 |Code injection |https://github.com/BenHays142/CVE-2022-36804-PoC-Exploit| |Barracuda |CVE-2023-2868 |Remote code execution (RCE) || |Citrix |CVE-2019-19781 |Arbitrary code execution |https://github.com/trustedsec/cve-2019-19781| @@ -16,6 +16,7 @@ |Fortinet |CVE-2018-13379 |Path traversal |https://github.com/milo2012/CVE-2018-13382| |Fortinet |CVE-2022-40684 |Authentication Bypass |https://github.com/horizon3ai/CVE-2022-40684| |Fortinet |CVE-2022-42475 |Remote code execution (RCE)|| +|Fortinet |CVE-2022-39952 | Arbitrary file write | https://github.com/horizon3ai/CVE-2022-39952 | |Fortra |CVE-2023-0669 |Pre-authentication Command Injection |https://github.com/0xf4n9x/CVE-2023-0669| |F5 Big IP |CVE 2020-5902 |Remote code execution (RCE)|https://pentest-tools.com/blog/big-ip-tmui-rce/| |F5 Big IP |CVE-2022-1388 |Remote code execution (RCE)|https://github.com/alt3kx/CVE-2022-1388_PoC| @@ -39,15 +40,16 @@ |Microsoft |CVE-2022-41076 |Remote Code ececution (RCE)|https://gist.github.com/testanull/518871a2e2057caa2bc9c6ae6634103e| |Microsoft |CVE-2023-24880 |Elevation of privilege (EOP)|| |Microsoft |CVE-2023-23397 |Elevation of privilege (EOP)|https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY| -|Microsoft |CVE-2023-28252 |Elevation of privilege (EOP)|| +|Microsoft |CVE-2023-28252 |Elevation of privilege (EOP)|https://github.com/fortra/CVE-2023-28252| |Microsoft |CVE-2023-24932 |Elevation of privilege (EOP)|| -|Microsoft |CVE-2023-29336 |Elevation of privilege (EOP)|| +|Microsoft |CVE-2023-29336 |Elevation of privilege (EOP)|https://github.com/m-cetin/CVE-2023-29336| +|Microsoft |CVE-2023-21823|Remore Code Execution|https://github.com/Elizarfish/CVE-2023-21823| |MobileIron |CVE 2020-15505 |Arbitrary File Write |https://github.com/httpvoid/CVE-Reverse/tree/master/CVE-2020-15505| |Oracle |CVE-2020-2555 |Remote code execution (RCE)|https://www.exploit-db.com/exploits/48508| |Papercut |CVE-2023-27350 |Remote code ececution (RCE)|https://github.com/horizon3ai/CVE-2023-27350| -|Progress MOVEit|CVE-2023-34362 |Remote code execution| +|Progress MOVEit|CVE-2023-34362 |Remote code execution (RCE)|https://github.com/horizon3ai/CVE-2023-34362| |Pulse |CVE-2019-11510 |Arbitrary file reading |https://github.com/projectzeroindia/CVE-2019-11510| -|Sophos |CVE-2022-3236 |Remote code execution (RCE)|| +|Sophos |CVE-2022-3236 |Remote code execution (RCE)|https://github.com/n0npro/CVE-2022-3236-RCE-POC| |Telerik |CVE-2019-18935 |Remote code execution (RCE)|https://github.com/noperator/CVE-2019-18935| |Weblogic |CVE-2020-2555 |Remote code execution (RCE)|https://www.exploit-db.com/exploits/48508| |Vmware |CVE-2021-21972 |Remote code execution (RCE)|https://github.com/horizon3ai/CVE-2021-21972| @@ -57,20 +59,3 @@ |Zimbra |CVE-2022-27925 |Path Traversal |https://github.com/Josexv1/CVE-2022-27925| |Zoho |CVE-2021-40539 |Remote code execution (RCE)|https://github.com/DarkSprings/CVE-2021-40539| |Zoho |CVE-2022-35405 |Remote code execution (RCE)|https://github.com/viniciuspereiras/CVE-2022-35405| -|Barracuda |CVE-2023-2868 |Remote code execution (RCE) | _https://github.com/cfielding-r7/poc-cve-2023-2868/blob/main/poc_cve_2023_2868.rb| -|Citrix |CVE-2022-27518 | Remote code execution (RCE) | https://github.com/dolby360/CVE-2022-27518_POC| -|Fortinet |CVE-2022-42475 |Remote code execution (RCE)| https://github.com/CKevens/CVE-2022-42475-RCE-POC| -|Microsoft |CVE-2023-28252 |Elevation of privilege (EOP)| https://github.com/fortra/CVE-2023-28252| -|Microsoft |CVE-2023-29336 |Elevation of privilege (EOP)| https://github.com/m-cetin/CVE-2023-29336| -|Sophos |CVE-2022-3236 |Remote code execution (RCE)| https://web.archive.org/web/20221017063308/https://github.com/n0npro/CVE-2022-3236-RCE-POC| -| Microsoft | CVE-2022-42046 | Local Privilege Escalation (LPE) | https://github.com/kkent030315/CVE-2022-42046| -| Microsoft | CVE-2023-21752 | Arbitrary File Delete to System Shell | https://github.com/Wh04m1001/CVE-2023-21752 | -| Microsoft | CVE-2023-21768 | Local Privilege Escalation (LPE) | https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768 | -| Fortinet FortiNAC | CVE-2022-39952 | Arbitrary file write | https://github.com/horizon3ai/CVE-2022-39952 | -|Atlassian |CVE-2019-11580 |Remote code execution (RCE) | https://github.com/jas502n/CVE-2019-11580 | -|F5 Big IP |CVE 2020-5902 |Remote code execution (RCE)| https://github.com/yasserjanah/CVE-2020-5902 | -|Progress MOVEit|CVE-2023-34362 |Remote code execution| https://github.com/horizon3ai/CVE-2023-34362 | -|Microsoft windows|CVE-2023-27350|PaperCut MF/NG RCE Vulnerability|https://github.com/adhikara13/CVE-2023-27350| -|Microsoft windows|CVE-2023-21752|arbitrary file delete vulnerability in Windows Backup service|https://github.com/Wh04m1001/CVE-2023-21752| -|Microsoft windows|CVE-2023-23397|Microsoft Exchange CalendarNTLMLeak|https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY,https://github.com/api0cradle/CVE-2023-23397-POC-Powershell| -|Microsoft windows|CVE-2023-21823|Windows Graphics Component RCE Vulnerability & Windows Graphics Component Remote Code Execution|https://github.com/Elizarfish/CVE-2023-21823|