Top 10 Most Exploited Vulnerabilities in 2020

data breach

malware

network threats

AI generated Image

(codename: SIGRed)If you are interested by our vFeed Vulnerability Intelligence indicators of the Top 2020 Most Exploited Vulnerabilities in JSON files, please drop us an email (support at vfeed.io ) so we can send you a copy. We delved into the tons of vulnerability intelligence data we accumulated over the years. We have relied on our vFeed vulnerability database indicators to create the list based on the following criteria:Number proof-of-concepts per vulnerabilityEase of exploitabilityHigh popularity ratioWeaponization of the exploitMalware based campaigns1- CVE-2020-0796 : Windows SMBv3 Client/Server Remote Code Execution Vulnerability(codename: SMBGhost)2- CVE-2020-5902: F5 Networks BIG-IP TMUI RCE vulnerability3- CVE-2020-1472: Microsoft Netlogon Elevation of Privilege(codename: Zerologon)4- CVE-2020-0601: Windows CryptoAPI Spoofing Vulnerability(codename: CurveBall)5- CVE-2020-14882: Oracle WebLogic Server RCE6- CVE-2020-1938: Apache Tomcat AJP File Read/Inclusion Vulnerability(codename: GhostCat)7- CVE-2020-3452: Cisco ASA and Firepower Path Traversal Vulnerability8- CVE-2020-0688: Microsoft Exchange Server Static Key Flaw Could Lead to Remote Code Execution9- CVE-2020-16898: Windows TCP/IP Vulnerability(codename: Bad Neighbor)10- CVE-2020-11651: SaltStack RCE Authentication Bypass10- CVE-2020-1350: Critical Windows DNS Server RCE.

Source read time: 1 min - toolswatch.org

Also offered in: Nederlands

More news for you