Vulnerabilities
Vulnerable Software
Security Vulnerabilities - Known exploited
CVE-2022-29464
Known exploited
Certain WSO2 products allow unrestricted file upload with resultant remote code execution. The attacker must use a /fileupload endpoint with a Content-Disposition directory traversal sequence to reach a directory under the web root, such as a ../../../../repository/deployment/server/webapps directory. This affects WSO2 API Manager 2.2.0 up to 4.0.0, WSO2 Identity Server 5.2.0 up to 5.11.0, WSO2 Identity Server Analytics 5.4.0, 5.4.1, 5.5.0 and 5.6.0, WSO2 Identity Server as Key Manager 5.3.0 up to 5.11.0, WSO2 Enterprise Integrator 6.2.0 up to 6.6.0, WSO2 Open Banking AM 1.4.0 up to 2.0.0 and WSO2 Open Banking KM 1.4.0, up to 2.0.0.
CVSS Score
9.8
EPSS Score
0.944
Published
2022-04-18
CVE-2022-28810
Known exploited
Zoho ManageEngine ADSelfService Plus before build 6122 allows a remote authenticated administrator to execute arbitrary operating OS commands as SYSTEM via the policy custom script feature. Due to the use of a default administrator password, attackers may be able to abuse this functionality with minimal effort. Additionally, a remote and partially authenticated attacker may be able to inject arbitrary commands into the custom script due to an unsanitized password field.
CVSS Score
6.8
EPSS Score
0.918
Published
2022-04-18
CVE-2022-26904
Known exploited
Windows User Profile Service Elevation of Privilege Vulnerability
CVSS Score
7.0
EPSS Score
0.216
Published
2022-04-15
CVE-2022-24521
Known exploited
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS Score
7.8
EPSS Score
0.076
Published
2022-04-15
CVE-2022-24816
Known exploited
JAI-EXT is an open-source project which aims to extend the Java Advanced Imaging (JAI) API. Programs allowing Jiffle script to be provided via network request can lead to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects the downstream GeoServer project. Version 1.2.22 will contain a patch that disables the ability to inject malicious code into the resulting script. Users unable to upgrade may negate the ability to compile Jiffle scripts from the final application, by removing janino-x.y.z.jar from the classpath.
CVSS Score
10.0
EPSS Score
0.937
Published
2022-04-13
CVE-2022-22960
Known exploited
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts. A malicious actor with local access can escalate privileges to 'root'.
CVSS Score
7.8
EPSS Score
0.727
Published
2022-04-13
CVE-2022-22954
Known exploited
VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.
CVSS Score
9.8
EPSS Score
0.944
Published
2022-04-11
CVE-2022-0609
Known exploited
Use after free in Animation in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVSS Score
8.8
EPSS Score
0.493
Published
2022-04-05
CVE-2022-22963
Known exploited
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
CVSS Score
9.8
EPSS Score
0.945
Published
2022-04-01
CVE-2022-22965
Known exploited
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
CVSS Score
9.8
EPSS Score
0.944
Published
2022-04-01


Contact Us

Shodan ® - All rights reserved