From ce4102396f1b300885d5f99a12ce964f6fe4e652 Mon Sep 17 00:00:00 2001 From: V <45754825+vxsh4d0w@users.noreply.github.com> Date: Tue, 30 May 2023 12:02:18 +0000 Subject: [PATCH] Update cve_most_exploited.md CVE-2023-27350 --- cve_most_exploited.md | 1 + 1 file changed, 1 insertion(+) diff --git a/cve_most_exploited.md b/cve_most_exploited.md index 9e48b1c..eca832e 100644 --- a/cve_most_exploited.md +++ b/cve_most_exploited.md @@ -39,6 +39,7 @@ |Microsoft |CVE-2023-23397 |Elevation of privilege (EOP)|https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY| |MobileIron |CVE 2020-15505 |Arbitrary File Write |https://github.com/httpvoid/CVE-Reverse/tree/master/CVE-2020-15505| |Oracle |CVE-2020-2555 |Remote code execution (RCE)|https://www.exploit-db.com/exploits/48508| +|Papercut |CVE-2023-27350 |Remote Code ececution (RCE)|https://github.com/horizon3ai/CVE-2023-27350| |Pulse |CVE-2019-11510 |Arbitrary file reading |https://github.com/projectzeroindia/CVE-2019-11510| |Sophos |CVE-2022-3236 |Remote code execution (RCE)|| |Telerik |CVE-2019-18935 |Remote code execution (RCE)|https://github.com/noperator/CVE-2019-18935|