forked from fastfire/deepdarkCTI
-
Notifications
You must be signed in to change notification settings - Fork 0
/
cve_most_exploited
21 lines (20 loc) · 1.95 KB
/
cve_most_exploited
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
|Vendor|CVE|Type|PoC|
| ------ | ------ | ------ | ------ |
|Atlassian |CVE-2019-11580 |Remote code execution (RCE) |https://www.corben.io/atlassian-crowd-rce/|
|Citrix |CVE-2019-19781 |Arbitrary code execution |https://github.com/trustedsec/cve-2019-19781|
|Drupal |CVE-2018-7600 |Remote code execution (RCE) |https://github.com/a2u/CVE-2018-7600|
|Fortinet |CVE 2018-13379 |Path traversal |https://github.com/milo2012/CVE-2018-13382|
|F5 Big IP |CVE 2020-5902 |Remote code execution (RCE)|https://pentest-tools.com/blog/big-ip-tmui-rce/|
|Microsoft |CVE-2017-11882 |Remote code execution (RCE)|https://github.com/unamer/CVE-2017-11882|
|Microsoft |CVE-2020-0787 |Elevation of privilege |https://itm4n.github.io/cve-2020-0787-windows-bits-eop/|
|Microsoft |CVE-2020-1472 |Elevation of privilege |https://github.com/dirkjanm/CVE-2020-1472|
|Microsoft |CVE-2019-0604 |Remote code execution (RCE) |https://www.exploit-db.com/exploits/48053|
|Microsoft |CVE-2021-42321 |Remote code execution (RCE)|https://github.com/DarkSprings/CVE-2021-42321|
|Microsoft |CVE-2021-26855 |Server-Side Request Forgery (SSRF) |https://pythonrepo.com/repo/herwonowr-exprolog|
|Microsoft |CVE-2021-26857 |Insecure Deserialization |https://pythonrepo.com/repo/herwonowr-exprolog|
|Microsoft |CVE-2021-26858 |Arbitrary File Write |https://pythonrepo.com/repo/herwonowr-exprolog|
|Microsoft |CVE-2021-27065 |Remote code execution (RCE) |https://pythonrepo.com/repo/herwonowr-exprolog|
|MobileIron |CVE 2020-15505 |Arbitrary File Write |https://github.com/httpvoid/CVE-Reverse/tree/master/CVE-2020-15505|
|Pulse |CVE 2019-11510 |Arbitrary file reading |https://github.com/projectzeroindia/CVE-2019-11510|
|Telerik |CVE 2019-18935 |Remote code execution (RCE) |https://labs.bishopfox.com/tech-blog/cve-2019-18935-remote-code-execution-in-telerik-ui#exploit-details|
|Log4j |CVE 2021-44228 |Remote code execution (RCE) |https://www.advintel.io/post/ransomware-advisory-log4shell-exploitation-for-initial-access-lateral-movement|