Skip to main content Link Menu Expand (external link) Document Search Copy Copied

move / rce

Mitre Att&ck Entreprise:

</tbody> </table>
Reference OS Service PoC
CVE-2021-22986 BIG-IP LB
CVE-2021-21972 VMware VCenter
CVE-2021-21974 VMware VCenter
  • POC:
CVE-2021-21985 VMware VCenter
CVE-2021-22005 VMware VCenter
CVE-2021-44228 Apache Log4j
CVE-2021-41773 Apache
  • VER: httpd:2.4.49
  • POC: nmap nse
  • CMD: curl http://localhost:8080/cgi-bin/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd
CVE-2021-26855 Microsoft Exchange
  • CODENAME: ProxyLogon
CVE-2021-26084 Confluence OGNL CVE-2021-40444 Microsoft MSHTML
CVE-2021-43798 Graphana
CVE-2021-22205 GitLab
CVE-2021-42013 Apache HTTP
  • VER: httpd 2.4.50
  • REQ: CGI-BIN enabled,
CVE-2021-36934 Windows
  • CODENAME: HiveNightmare / SeriousSam
CVE-2021-21300 Git Visual Studio
CVE-2021-38647 Azure Open Management Infrastructure OmiGod
CVE-2021-42278 / CVE-2021-42287 Windows Active Directory
CVE-2021-35211 Serv-U FTP
CVE-2020-5902 BIG-IP LB
  • POC: GH jas502n
  • MSF: exploit/linux/http/f5_bigip_tmui_rce
CVE-2020-0796 Windows SMBv3
  • CODENAME: SMBGhost
  • MSF: exploit/smbghost_privesc
  • POC: Disable security: Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" DisableCompression -Type DWORD -Value 0 -Force
CVE-2020-1472 Windows MS-NRPC
CVE-2020-14882 Oracle WebLogic
CVE-2020-1938 Apache Tomcat
  • CODENAME: GhostCat
  • POC: github/hypn0s
  • POC: AJP protocol enabled. Port 8009 open.
  • VER: v9.0.x < 9.0.31, v8.5.x < 8.5.51, v7.x < 7.0.100
  • TEST: TryHackMe
CVE-2020-3452 Cisco ASA
CVE-2020-0688 Windows Exchange
CVE-2020-16898 Windows
  • CODENAME: Bad Neighor
CVE-2020-11651 SaltStack
CVE-2020-1350 Windows DNS
  • CODENAME: SIGRed
CVE-2019-0708 Windows RDP
  • CODENAME: BlueKeep
  • MSF: exploit/windows/rdp/cve_2019_0708_bluekeep_rce
CVE-2019-19781 Citrix ADC ADC
  • MSF: exploit/linux/http/citrix_dir_traversal_rce
  • VER: 10.5, 11.1, 12.0, 12.1, and 13.0
CVE-2017-0144 Windows SMB
  • CODENAME: EternalBlue
  • MSF: exploit/windows/smb/ms17_010_eternalblue
  • TEST:
CVE-2017-0145 Windows SMB
  • CODENAME: DoublePulsar
  • MSF: exploit/windows/smb/smb_doublepulsar_rce
CVE-2017-0145 Windows RDP
  • CODENAME: DoublePulsar
  • MSF: exploit/windows/rdp/rdp_doublepulsar_rce