15 of the most commonly exploited Linux vulnerabilities

 The most popular vulnerabilities among hackers were remote code execution vulnerabilities.



Trend Micro security specialists examined the Linux operating system's threat landscape for the first half of 2021 and identified the most dangerous threats and vulnerabilities.

Malware infecting Linux-based cloud systems was studied, and researchers discovered that cryptominers and ransomware comprise 54% of all malware instances, while web shells constitute 29% of the total.

Furthermore, the research team created a list of 15 known security flaws, all of which were shown to be exploited in actual assaults or had proof-of-concept code to utilise them.

Apache Struts 2 Remote Code Execution (RCE) vulnerability (CVE-2017-5638) (CVSS score: 10.0).

RCE vulnerability CVE-2017-9805 (CVSS 8.1) - REST plugin for Apache Struts 2, XStream RCE;

The RCE vulnerability CVE-2018-7600 (CVSS: 9.8) is in Drupal Core.

A RCE vulnerability (CVE-2020-14750; CVSS score: 9.8) in Oracle WebLogic Server.

CVE-2020-25213 (CvSS score: 10.0) - WordPress File Manager (wp-file-manager) vulnerability of the RCE;

vBulletin 'subwidgetConfig' subwidget authorisation flaw (CVE-2020-17496, CVSS score: 9.8)

SaltStack Salt Authorization Vulnerability (CVE-2020-11651; CVSS score: 9.8).

CVSS score: 9.8; OGNL expression RCE vulnerability in Apache Struts.

CVE-2017-7657 (CVSS score: 9.8) - A vulnerability in Eclipse Jetty's integer block length.

Alibaba Nacos AuthFilter Authentication Bypass Vulnerability (CVE-2021-29441; CVSS: 9.8).

The CVE-2020-14179 flaw (CVSS Rating: 5.3) Atlassian Jira Data Disclosure Vulnerability.

CVE-2013-4547 (bug in SUSE Linux Enterprise Server 12 SP1) (CVSS score: 8.0) Nginx URI String Access Restriction Bypass.

CVE-2019-0230 (fixed): (CVSS score: 9.8) Apache Struts 2 RCE vulnerability

A Remote Code Execution (RCE) vulnerability in an OGNL expression in Apache Struts: CVE-2018-11776 (CVSS score: 8.1).

Liferay Portal Untrusted Deserialization Vulnerability (CVE-2020-7961, CVSS Score: 9.8).

The top 15 Docker images used by Docker Hub also include hundreds of vulnerabilities for Python, Node, WordPress, Golang, Nginx, Postgres, InfluxDB, HTTPd, MySQL, Debian, Memcached, Redis, MongoDB, CentOS, and RabbitMQ, making it obvious why container security is so important at every stage of development.

Post a Comment

Previous Post Next Post

POST ADS1

POST ADS 2