From e4d190a5aded4ef6c072151de2ca763e200da135 Mon Sep 17 00:00:00 2001 From: V <45754825+vxsh4d0w@users.noreply.github.com> Date: Mon, 9 Jan 2023 10:53:11 +0000 Subject: [PATCH] Removed link --- cve_most_exploited.md | 1 - 1 file changed, 1 deletion(-) diff --git a/cve_most_exploited.md b/cve_most_exploited.md index 1472181..26a5c33 100644 --- a/cve_most_exploited.md +++ b/cve_most_exploited.md @@ -13,7 +13,6 @@ |Fortinet |CVE-2018-13379 |Path traversal |https://github.com/milo2012/CVE-2018-13382| |Fortinet |CVE-2022-40684 |Authentication Bypass |https://github.com/horizon3ai/CVE-2022-40684| |F5 Big IP |CVE 2020-5902 |Remote code execution (RCE)|https://pentest-tools.com/blog/big-ip-tmui-rce/| -|Log4j |CVE 2021-44228 |Remote code execution (RCE) |https://www.advintel.io/post/ransomware-advisory-log4shell-exploitation-for-initial-access-lateral-movement| |Log4j |CVE-2021-44228 |Remote code execution (RCE)|https://github.com/kozmer/log4j-shell-poc| |F5 Big IP |CVE-2022-1388 |Remote Code execution (RCE)|https://github.com/alt3kx/CVE-2022-1388_PoC| |ManageEngine |CVE-2022-35405 |Remote code execution (RCE)|https://github.com/viniciuspereiras/CVE-2022-35405|