Top 15 Vulnerabilities Attackers Exploited Millions of Times to Hack Linux Systems
Saturday 28 August 2021 11:23 AM Beirut Time · 2421
Wajdi Alkayal Wajdi Alkayal
Top 15 Vulnerabilities Attackers Exploited Millions of Times to Hack Linux Systems


☰ open


DIGITAL TRANSFORMATION   Latest News

BY: 



  • CVE-2017-5638 (CVSS score: 10.0) - Apache Struts 2 remote code execution (RCE) vulnerability
  • CVE-2017-9805 (CVSS score: 8.1) - Apache Struts 2 REST plugin XStream RCE vulnerability
  • CVE-2018-7600 (CVSS score: 9.8) - Drupal Core RCE vulnerability
  • CVE-2020-14750 (CVSS score: 9.8) - Oracle WebLogic Server RCE vulnerability
  • CVE-2020-25213 (CVSS score: 10.0) - WordPress File Manager (wp-file-manager) plugin RCE vulnerability
  • CVE-2020-17496 (CVSS score: 9.8) - vBulletin 'subwidgetConfig' unauthenticated RCE vulnerability
  • CVE-2020-11651 (CVSS score: 9.8) - SaltStack Salt authorization weakness vulnerability
  • CVE-2017-12611 (CVSS score: 9.8) - Apache Struts OGNL expression RCE vulnerability
  • CVE-2017-7657 (CVSS score: 9.8) - Eclipse Jetty chunk length parsing integer overflow vulnerability
  • CVE-2021-29441 (CVSS score: 9.8) - Alibaba Nacos AuthFilter authentication bypass vulnerability
  • CVE-2020-14179 (CVSS score: 5.3) - Atlassian Jira information disclosure vulnerability
  • CVE-2013-4547 (CVSS score: 8.0) - Nginx crafted URI string handling access restriction bypass vulnerability
  • CVE-2019-0230 (CVSS score: 9.8) - Apache Struts 2 RCE vulnerability
  • CVE-2018-11776 (CVSS score: 8.1) - Apache Struts OGNL expression RCE vulnerability
  • CVE-2020-7961 (CVSS score: 9.8) - Liferay Portal untrusted deserialization vulnerability


Even more troublingly, the 15 most commonly used Docker images on the official Docker Hub repository has been revealed to harbor hundreds of vulnerabilities spanning across python, node, wordpress, golang, nginx, postgres, influxdb, httpd, mysql, debian, memcached, redis, mongo, centos, and rabbitmq, underscoring the need to secure containers from a wide range of potential threats at each stage of the development pipeline.

"Users and organizations should always apply security best practices, which include utilizing the security by design approach, deploying multilayered virtual patching or vulnerability shielding, employing the principle of least privilege, and adhering to the shared responsibility model," the researchers concluded.

Found this article interesting? Follow THN on FacebookTwitter  and LinkedIn to read more exclusive content we post.


Join Our Telegram Channel for More Insights


WMK-IT W3.CSS


News

Machinlearning
python
Programming
Javascript
Css
Mobile Application
Web development
Coding
Digital Marketing
Web Development
WMK-IT&TECH
Job

Blog post

DIGITAL MARKETING SPECIALIST
Technical Team Lead (iOS)
AUTOMATION QA ENGINEER
Related Posts
Graphic design
09 June
The Power of Email Marketing
03 June
Photography
01 June