diff --git a/cve_most_exploited.md b/cve_most_exploited.md index 1472181..26a5c33 100644 --- a/cve_most_exploited.md +++ b/cve_most_exploited.md @@ -13,7 +13,6 @@ |Fortinet |CVE-2018-13379 |Path traversal |https://github.com/milo2012/CVE-2018-13382| |Fortinet |CVE-2022-40684 |Authentication Bypass |https://github.com/horizon3ai/CVE-2022-40684| |F5 Big IP |CVE 2020-5902 |Remote code execution (RCE)|https://pentest-tools.com/blog/big-ip-tmui-rce/| -|Log4j |CVE 2021-44228 |Remote code execution (RCE) |https://www.advintel.io/post/ransomware-advisory-log4shell-exploitation-for-initial-access-lateral-movement| |Log4j |CVE-2021-44228 |Remote code execution (RCE)|https://github.com/kozmer/log4j-shell-poc| |F5 Big IP |CVE-2022-1388 |Remote Code execution (RCE)|https://github.com/alt3kx/CVE-2022-1388_PoC| |ManageEngine |CVE-2022-35405 |Remote code execution (RCE)|https://github.com/viniciuspereiras/CVE-2022-35405|