Skip to content

Studied Vulnerabilities

Fogo Tunde-Onadele edited this page Jan 17, 2024 · 1 revision

Studied Vulnerability Exploits

The table highlights the vulnerability exploits studied in the research paper: "SHIL: Self-Supervised Hybrid Learning for Security Attack Detection in Containerized Applications" (ACSOS '22).

Return a shell and execute arbitrary code

Attack Application
1. CVE-2012-1823 PHP
2. CVE-2014-3120 Elasticsearch
3. CVE-2015-1427 Elasticsearch (Groovy scripting)
4. CVE-2015-2208 phpMoAdmin (env)
5. CVE-2015-3306 ProFTPD
6. CVE-2015-8103 Jboss (Jenkins)
7. CVE-2016-3088 ActiveMQ
8. CVE-2016-9920 Roundcube
9. CVE-2016-10033 PHPMailer
10. CVE-2017-7494 Samba
11. CVE-2017-8291 Ghostscript
12. CVE-2017-11610 Supervisor on Unix systems
13. CVE-2017-12149 Jboss
14. CVE-2017-12615 Tomcat

Execute arbitrary code

Attack Application
15. CVE-2014-6271 Bash
16. CVE-2015-8562 Joomla
17. CVE-2016-3714 ImageMagick - Linux systems
18. CVE-2017-5638 Apache Struts 2
19. CVE-2017-12794 Django
20. CVE-2018-11776 Apache Struts 2
21. CVE-2018-16509 GhostScript
22. CVE-2018-19475 GhostScript
23. CVE-2019-6116 GhostScript
24. CVE-2019-5420 Rails
25. CVE-2020-17530 Apache Struts 2
26. CVE-2021-44228 Apache Log4j2

Disclose credential information

Attack Application
27. CVE-2014-0160 OpenSSL
28. CVE-2015-5531 Elasticsearch
29. CVE-2017-7529 Nginx
30. CVE-2017-8917 Joomla
31. CVE-2018-15473 OpenSSH
32. CVE-2020-1938 Tomcat
33. CVE-2021-28164 Jetty
34. CVE-2021-28169 Jetty
35. CVE-2021-34429 Jetty
36. CVE-2021-41773 Apache HTTP Server 2.4.49

Consume excessive CPU

Attack Application
37. CVE-2014-0050 Apache Commons FileUpload
38. CVE-2016-6515 OpenSSH

Crash the application

Attack Application
39. CVE-2015-5477 BIND
40. CVE-2016-7434 NTP

Escalate privilege level

Attack Application
41. CVE-2017-12635 CouchDB
Clone this wiki locally