Top Google Trends CVE
1
CVE-2020-2555
2
CVE-2020-10189
3
CVE-2020-0688
4
CVE-2020-13935
5
CVE-2020-0787
6
CVE-2020-1147
7
CVE-2020-2551
8
CVE-2020-9484
9
CVE-2020-1938
10
CVE-2020-3118
11
Drag to adjust the number of frozen columns
Discovered Date
Exploit Posted Date
Weaponization Time
Patch
Vendor
Product
Exploit Links
Type Exploit
Severity
CVSS V3 Score
CVSS V2 Score
Ransomware
APT Group
APT Attack Method
APT_Mitre tech
APT_SoftwareUsed
Tenable PluginID
Nexpose PluginID
Qualys PluginID
Jan 15, 2020
April 14, 2020
3 months
https://www.oracle.com/security-alerts/cpujan2020.html
oracle
fusion_middleware
https://www.exploit-db.com/exploits/48508,https://www.exploit-db.com/exploits/48320
RCE
Critical
9.8
7.5
N/A
N/A
142223, 137854
N/A
372345
March 6, 2020
March 17, 2020
10 days
https://srcincite.io/advisories/src-2020-0011/
zohocorp
manageengine_desktop_central
https://www.exploit-db.com/exploits/48224
RCE
Critical
9.8
10
N/A
APT41
Backdoor
Accessibility Features, Bootkit, Brute Force, Clear Command History, Code Signing, Command-Line Interface, Compiled HTML File, Connection Proxy, Create Account, Credential Dumping, Data Compressed, Data Encrypted for Impact, DLL Side-Loading, Domain Generation Algorithms, Exploitation for Client Execution, External Remote Services, Fallback Channels, File Deletion, Indicator Removal on Host, Input Capture, Masquerading, Modify Existing Service, Modify Registry, Network Service Scanning, Network Share Discovery, PowerShell, Process Injection, Registry Run Keys / Startup Folder, Remote Desktop Protocol, Resource Hijacking, Rootkit, Scheduled Task, Spearphishing Attachment, Standard Application Layer Protocol, Supply Chain Compromise, System Network Configuration Discovery, System Network Connections Discovery, System Owner/User Discovery, Valid Accounts, Web Service, Windows Management Instrumentation, Accessibility Features, Bootkit, Brute Force, Clear Command History, Code Signing, Command-Line Interface, Compiled HTML File, Connection Proxy, Create Account, Credential Dumping, Data Compressed, Data Encrypted for Impact, DLL Side-Loading, Domain Generation Algorithms, Exploitation for Client Execution, External Remote Services, Fallback Channels, File Deletion, Indicator Removal on Host, Input Capture, Masquerading, Modify Existing Service, Modify Registry, Network Service Scanning, Network Share Discovery, PowerShell, Process Injection, Registry Run Keys / Startup Folder, Remote Desktop Protocol, Resource Hijacking, Rootkit, Scheduled Task, Spearphishing Attachment, Standard Application Layer Protocol, Supply Chain Compromise, System Network Configuration Discovery, System Network Connections Discovery, System Owner/User Discovery, Valid Accounts, Web Service, Windows Management Instrumentation, Accessibility Features, Bootkit, Brute Force, Clear Command History, Code Signing, Command-Line Interface, Compiled HTML File, Connection Proxy, Create Account, Credential Dumping, Data Compressed, Data Encrypted for Impact, DLL Side-Loading, Domain Generation Algorithms, Exploitation for Client Execution, External Remote Services, Fallback Channels, File Deletion, Indicator Removal on Host, Input Capture, Masquerading, Modify Existing Service, Modify Registry, Network Service Scanning, Network Share Discovery, PowerShell, Process Injection, Registry Run Keys / Startup Folder, Remote Desktop Protocol, Resource Hijacking, Rootkit, Scheduled Task, Spearphishing Attachment, Standard Application Layer Protocol, Supply Chain Compromise, System Network Configuration Discovery, System Network Connections Discovery, System Owner/User Discovery, Valid Accounts, Web Service, Windows Management Instrumentation, Accessibility Features, Bootkit, Brute Force, Clear Command History, Code Signing, Command-Line Interface, Compiled HTML File, Connection Proxy, Create Account, Credential Dumping, Data Compressed, Data Encrypted for Impact, DLL Side-Loading, Domain Generation Algorithms, Exploitation for Client Execution, External Remote Services, Fallback Channels, File Deletion, Indicator Removal on Host, Input Capture, Masquerading, Modify Existing Service, Modify Registry, Network Service Scanning, Network Share Discovery, PowerShell, Process Injection, Registry Run Keys / Startup Folder, Remote Desktop Protocol, Resource Hijacking, Rootkit, Scheduled Task, Spearphishing Attachment, Standard Application Layer Protocol, Supply Chain Compromise, System Network Configuration Discovery, System Network Connections Discovery, System Owner/User Discovery, Valid Accounts, Web Service, Windows Management Instrumentation, Accessibility Features, Bootkit, Brute Force, Clear Command History, Code Signing, Command-Line Interface, Compiled HTML File, Connection Proxy, Create Account, Credential Dumping, Data Compressed, Data Encrypted for Impact, DLL Side-Loading, Domain Generation Algorithms, Exploitation for Client Execution, External Remote Services, Fallback Channels, File Deletion, Indicator Removal on Host, Input Capture, Masquerading, Modify Existing Service, Modify Registry, Network Service Scanning, Network Share Discovery, PowerShell, Process Injection, Registry Run Keys / Startup Folder, Remote Desktop Protocol, Resource Hijacking, Rootkit, Scheduled Task, Spearphishing Attachment, Standard Application Layer Protocol, Supply Chain Compromise, System Network Configuration Discovery, System Network Connections Discovery, System Owner/User Discovery, Valid Accounts, Web Service, Windows Management Instrumentation, Accessibility Features, Bootkit, Brute Force, Clear Command History, Code Signing, Command-Line Interface, Compiled HTML File, Connection Proxy, Create Account, Credential Dumping, Data Compressed, Data Encrypted for Impact, DLL Side-Loading, Domain Generation Algorithms, Exploitation for Client Execution, External Remote Services, Fallback Channels, File Deletion, Indicator Removal on Host, Input Capture, Masquerading, Modify Existing Service, Modify Registry, Network Service Scanning, Network Share Discovery, PowerShell, Process Injection, Registry Run Keys / Startup Folder, Remote Desktop Protocol, Resource Hijacking, Rootkit, Scheduled Task, Spearphishing Attachment, Standard Application Layer Protocol, Supply Chain Compromise, System Network Configuration Discovery, System Network Connections Discovery, System Owner/User Discovery, Valid Accounts, Web Service, Windows Management Instrumentation, Accessibility Features, Bootkit, Brute Force, Clear Command History, Code Signing, Command-Line Interface, Compiled HTML File, Connection Proxy, Create Account, Credential Dumping, Data Compressed, Data Encrypted for Impact, DLL Side-Loading, Domain Generation Algorithms, Exploitation for Client Execution, External Remote Services, Fallback Channels, File Deletion, Indicator Removal on Host, Input Capture, Masquerading, Modify Existing Service, Modify Registry, Network Service Scanning, Network Share Discovery, PowerShell, Process Injection, Registry Run Keys / Startup Folder, Remote Desktop Protocol, Resource Hijacking, Rootkit, Scheduled Task, Spearphishing Attachment, Standard Application Layer Protocol, Supply Chain Compromise, System Network Configuration Discovery, System Network Connections Discovery, System Owner/User Discovery, Valid Accounts, Web Service, Windows Management Instrumentation
ASPXSpy, BLACKCOFFEE, China Chopper, Derusbi, gh0st RAT, Mimikatz, netstat, njRAT, Ping, PlugX, PowerSploit, pwdump, ROCKBOOT, ZxShell, ASPXSpy, BLACKCOFFEE, China Chopper, Derusbi, gh0st RAT, Mimikatz, netstat, njRAT, Ping, PlugX, PowerSploit, pwdump, ROCKBOOT, ZxShell, ASPXSpy, BLACKCOFFEE, China Chopper, Derusbi, gh0st RAT, Mimikatz, netstat, njRAT, Ping, PlugX, PowerSploit, pwdump, ROCKBOOT, ZxShell, ASPXSpy, BLACKCOFFEE, China Chopper, Derusbi, gh0st RAT, Mimikatz, netstat, njRAT, Ping, PlugX, PowerSploit, pwdump, ROCKBOOT, ZxShell, ASPXSpy, BLACKCOFFEE, China Chopper, Derusbi, gh0st RAT, Mimikatz, netstat, njRAT, Ping, PlugX, PowerSploit, pwdump, ROCKBOOT, ZxShell, ASPXSpy, BLACKCOFFEE, China Chopper, Derusbi, gh0st RAT, Mimikatz, netstat, njRAT, Ping, PlugX, PowerSploit, pwdump, ROCKBOOT, ZxShell, ASPXSpy, BLACKCOFFEE, China Chopper, Derusbi, gh0st RAT, Mimikatz, netstat, njRAT, Ping, PlugX, PowerSploit, pwdump, ROCKBOOT, ZxShell
135293, 134677
http-manageengine-dc-cve-2020-10189
372442
Feb 11, 2020
March 2, 2020
20 days
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0688
microsoft
exchange_server
https://www.exploit-db.com/exploits/48153 https://www.exploit-db.com/exploits/48168
RCE
High
8.8
9
Egregor, Thanos
N/A
701277, 133617
msft-cve-2020-0688
50098
July 14, 2020
Nov 2, 2020
3 months & 19 days
https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E
apache
tomcat
https://github.com/RedTeamPentesting/CVE-2020-13935
Dos
High
7.5
5
N/A
N/A
142299, 142134, 141862, 141847, 141833, 141829, 141699, 141616, 141038, 140860, 112558, 112557, 112549, 112548, 139460, 139368, 139323, 139320, 139221, 139159, 139089, 139052, 139046, 139021, 138923, 138859, 138851, 138816, 138647, 138591, 138574
redhat_linux-cve-2020-13935,suse-cve-2020-13935
198112
March 12, 2020
Jun 16, 2020
3 months
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0787
microsoft
windows_10, windows_8\.1, windows_7, windows_rt_8\.1, windows_server_2019, windows_server_2016, windows_server_2008, windows_server_2012
https://github.com/cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION/releases, https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/cve_2020_0787_bits_arbitrary_file_move.rb
PE
High
7.8
7.2
N/A
N/A
134866, 134865, 134375, 134374, 134373, 134372, 134371, 134370, 134369, 134368
msft-cve-2020-0787
91609
July 14, 2020
July 31, 2020
15 days
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1147
microsoft
sharepoint_enterprise_server, \.net_core, visual_studio_2017, visual_studio_2019, sharepoint_server, \.net_framework
http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html,
RCE
High
7.8
6.8
N/A
N/A
112593, 112592, 112591, 112590, 138842, 138661, 138660, 138609, 138606, 138512, 138505, 138504, 138500, 138473, 138466, 138465, 138464, 138463, 138462, 138461, 138460, 138459, 138458, 138457, 138456, 138455, 138454, 138453
msft-cve-2020-1147,redhat_linux-cve-2020-1147
91658
Jan 15, 2020
May 22, 2020
4 months
https://www.oracle.com/security-alerts/cpujan2020.html
oracle
weblogic_server
https://github.com/hktalent/CVE-2020-2551
RCE
Critical
9.8
7.5
N/A
N/A
138509, 132961
oracle-weblogic-cve-2020-2551
150309
May 20, 2020
Jun 03, 2020
13 days
https://lists.apache.org/thread.html/r77eae567ed829da9012cadb29af17f2df8fa23bf66faf88229857bb1%40%3Cannounce.tomcat.apache.org%3E
oracle, apache, opensuse, fedoraproject, canonical, debian
leap, tomcat, instantis_enterprisetrack, debian_linux, ubuntu_linux, fedora
https://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html
RCE
High
7
4.4
N/A
N/A
143961, 142210, 141862, 141833, 140860, 140153, 139368, 139159, 138647, 138393, 138061, 138060, 138051, 137736, 137533, 137530, 137487, 137458, 137390, 137387, 137370, 137360, 137359, 137324, 137317, 137308, 112429, 112428, 112427, 112426, 137197, 137189, 136951, 136889, 136851, 136833, 136807, 136806, 136770
apache-tomcat-cve-2020-9484,huawei-euleros-2_0_sp3-cve-2020-9484
13785
Feb 24, 2020
Feb 20, 2020
https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db@%3Cnotifications.ofbiz.apache.org%3E
apache
tomcat
https://www.exploit-db.com/exploits/48143
webapps
Critical
9.8
7.5
N/A
N/A
143968, 143082, 140282, 140278, 138567, 138160, 138023, 138021, 138020, 137487, 136951, 136662, 136376, 136369, 136310, 136078, 136014, 135773, 135686, 135567, 134906, 134872, 134862, 134849, 134846, 134821, 134818, 134794, 134729, 134673, 134668, 134651, 134620, 134575, 134574, 134569, 134243, 98948, 98947, 98946, 701269, 133845
debian-cve-2020-1938,huawei-euleros-2_0_sp3-cve-2020-1938,apache-tomcat-cve-2020-1938
177794
Feb 5, 2020
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-iosxr-cdp-rce
cisco
ios_xr
N/A
N/A
High
8.8
8.3
N/A
N/A
701265, 133603
N/A
316792
11 records

Alert

Lorem ipsum
Okay