Vulnerabilities
Vulnerable Software
Security Vulnerabilities - Known exploited
CVE-2022-24816
Known exploited
JAI-EXT is an open-source project which aims to extend the Java Advanced Imaging (JAI) API. Programs allowing Jiffle script to be provided via network request can lead to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects the downstream GeoServer project. Version 1.2.22 will contain a patch that disables the ability to inject malicious code into the resulting script. Users unable to upgrade may negate the ability to compile Jiffle scripts from the final application, by removing janino-x.y.z.jar from the classpath.
CVSS Score
10.0
EPSS Score
0.937
Published
2022-04-13
CVE-2022-22960
Known exploited
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts. A malicious actor with local access can escalate privileges to 'root'.
CVSS Score
7.8
EPSS Score
0.727
Published
2022-04-13
CVE-2022-22954
Known exploited
VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.
CVSS Score
9.8
EPSS Score
0.944
Published
2022-04-11
CVE-2022-0609
Known exploited
Use after free in Animation in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVSS Score
8.8
EPSS Score
0.47
Published
2022-04-05
CVE-2022-22963
Known exploited
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
CVSS Score
9.8
EPSS Score
0.945
Published
2022-04-01
CVE-2022-22965
Known exploited
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
CVSS Score
9.8
EPSS Score
0.944
Published
2022-04-01
CVE-2022-26871
Known exploited
An arbitrary file upload vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to upload an arbitrary file which could lead to remote code execution.
CVSS Score
9.8
EPSS Score
0.194
Published
2022-03-29
CVE-2022-22948
Known exploited
The vCenter Server contains an information disclosure vulnerability due to improper permission of files. A malicious actor with non-administrative access to the vCenter Server may exploit this issue to gain access to sensitive information.
CVSS Score
6.5
EPSS Score
0.26
Published
2022-03-29
CVE-2022-26258
Known exploited
D-Link DIR-820L 1.05B03 was discovered to contain remote command execution (RCE) vulnerability via HTTP POST to get set ccp.
CVSS Score
9.8
EPSS Score
0.872
Published
2022-03-28
CVE-2022-1040
Known exploited
An authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v18.5 MR3 and older.
CVSS Score
9.8
EPSS Score
0.944
Published
2022-03-25


Contact Us

Shodan ® - All rights reserved