Vulnerabilities
Vulnerable Software
Security Vulnerabilities - Known exploited
CVE-2022-41082
Known exploited
Microsoft Exchange Server Remote Code Execution Vulnerability
CVSS Score
8.0
EPSS Score
0.923
Published
2022-10-03
CVE-2022-3075
Known exploited
Insufficient data validation in Mojo in Google Chrome prior to 105.0.5195.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
CVSS Score
9.6
EPSS Score
0.006
Published
2022-09-26
CVE-2022-2856
Known exploited
Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 104.0.5112.101 allowed a remote attacker to arbitrarily browse to a malicious website via a crafted HTML page.
CVSS Score
6.5
EPSS Score
0.031
Published
2022-09-26
CVE-2022-3038
Known exploited
Use after free in Network Service in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVSS Score
8.8
EPSS Score
0.812
Published
2022-09-26
CVE-2022-41352
Known exploited
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavis via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavis automatically prefers it over cpio.
CVSS Score
9.8
EPSS Score
0.815
Published
2022-09-26
CVE-2022-3236
Known exploited
A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older.
CVSS Score
9.8
EPSS Score
0.928
Published
2022-09-23
CVE-2022-39197
Known exploited
An XSS (Cross Site Scripting) vulnerability was found in HelpSystems Cobalt Strike through 4.7 that allowed a remote attacker to execute HTML on the Cobalt Strike teamserver. To exploit the vulnerability, one must first inspect a Cobalt Strike payload, and then modify the username field in the payload (or create a new payload with the extracted information and then modify that username field to be malformed).
CVSS Score
6.1
EPSS Score
0.103
Published
2022-09-22
CVE-2022-32917
Known exploited
The issue was addressed with improved bounds checks. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..
CVSS Score
7.8
EPSS Score
0.001
Published
2022-09-20
CVE-2022-40139
Known exploited
Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability.
CVSS Score
7.2
EPSS Score
0.184
Published
2022-09-19
CVE-2022-35914
Known exploited
/vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection.
CVSS Score
9.8
EPSS Score
0.944
Published
2022-09-19


Contact Us

Shodan ® - All rights reserved