Vulnerabilities
Vulnerable Software
Security Vulnerabilities - Known exploited
CVE-2022-22674
Known exploited
An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Monterey 12.3.1, Security Update 2022-004 Catalina, macOS Big Sur 11.6.6. A local user may be able to read kernel memory.
CVSS Score
5.5
EPSS Score
0.001
Published
2022-05-26
CVE-2022-22675
Known exploited
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.3.1, iOS 15.4.1 and iPadOS 15.4.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..
CVSS Score
7.8
EPSS Score
0.005
Published
2022-05-26
CVE-2022-20821
Known exploited
A vulnerability in the health check RPM of Cisco IOS XR Software could allow an unauthenticated, remote attacker to access the Redis instance that is running within the NOSi container. This vulnerability exists because the health check RPM opens TCP port 6379 by default upon activation. An attacker could exploit this vulnerability by connecting to the Redis instance on the open port. A successful exploit could allow the attacker to write to the Redis in-memory database, write arbitrary files to the container filesystem, and retrieve information about the Redis database. Given the configuration of the sandboxed container that the Redis instance runs in, a remote attacker would be unable to execute remote code or abuse the integrity of the Cisco IOS XR Software host system.
CVSS Score
6.5
EPSS Score
0.132
Published
2022-05-26
CVE-2022-29303
Known exploited
SolarView Compact ver.6.00 was discovered to contain a command injection vulnerability via conf_mail.php.
CVSS Score
9.8
EPSS Score
0.944
Published
2022-05-12
CVE-2022-30525
Known exploited
A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.
CVSS Score
9.8
EPSS Score
0.944
Published
2022-05-12
CVE-2022-26923
Known exploited
Active Directory Domain Services Elevation of Privilege Vulnerability
CVSS Score
8.8
EPSS Score
0.916
Published
2022-05-10
CVE-2022-26925
Known exploited
Windows LSA Spoofing Vulnerability
CVSS Score
8.1
EPSS Score
0.294
Published
2022-05-10
CVE-2022-30333
Known exploited
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
CVSS Score
7.5
EPSS Score
0.91
Published
2022-05-09
CVE-2022-1388
Known exploited
On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CVSS Score
9.8
EPSS Score
0.945
Published
2022-05-05
CVE-2022-24706
Known exploited
In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations.
CVSS Score
9.8
EPSS Score
0.944
Published
2022-04-26


Contact Us

Shodan ® - All rights reserved