Snapshot
Dec. 2, 2022 - Dec. 9, 2022
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2022-4262 | Google Chromium V8 contains a type confusion vulnerability. Specific impacts from exploitation are not available at this time. | HIGH | Dec. 5, 2022 | |
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2022-40259 | AMI MegaRAC Redfish Arbitrary Code Execution | CRITICAL | Ami | Risk Context N/A |
CVE-2022-40242 | MegaRAC Default Credentials Vulnerability | CRITICAL | Ami | Risk Context N/A |
CVE-2022-4262 | Type confusion in V8 in Google Chrome prior to 108.0.5359.94 allowed a remote attacker to potentially exploit heap corruption... | HIGH |
CISA Known Exploited Actively Exploited |
|
CVE-2022-4135 | Heap buffer overflow in GPU in Google Chrome prior to 107.0.5304.121 allowed a remote attacker who had compromised the render... | CRITICAL | Google, Microsoft |
CISA Known Exploited Actively Exploited |
CVE-2022-41128 | Windows Scripting Languages Remote Code Execution Vulnerability. | HIGH | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution |
CVE-2022-31199 | Remote code execution vulnerabilities exist in the Netwrix Auditor User Activity Video Recording component affecting both the... | CRITICAL |
Remote Code Execution |
|
CVE-2021-44228 | Apache Log4j2 2.0-beta9 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect agai... | CRITICAL | Snowsoftware, Percussion, Fedoraproject, Siemens, Bentley, Debian, Netapp, Intel, Apache, Cisco |
CISA Known Exploited Actively Exploited Public Exploits Available |
CISA Known Exploited Vulnerabilities
CISA added 1 vulnerability to the known exploited vulnerabilities list.
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2022-40259 |
CRITICAL CVSS 9.80 |
Risk Context N/A |
Published: Dec. 5, 2022 |
AMI MegaRAC Redfish Arbitrary Code Execution |
Vendor Impacted: Ami |
Product Impacted: Megarac Sp-X |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-40242 |
CRITICAL CVSS 9.80 |
Risk Context N/A |
Published: Dec. 5, 2022 |
MegaRAC Default Credentials Vulnerability |
Vendor Impacted: Ami |
Product Impacted: Megarac Sp-X |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-4262 |
HIGH CVSS 8.80 |
CISA Known Exploited Actively Exploited |
Published: Dec. 2, 2022 |
Type confusion in V8 in Google Chrome prior to 108.0.5359.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
Vendor Impacted: Google |
Product Impacted: Chromium V8 Engine |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-4135 |
CRITICAL CVSS 9.60 |
CISA Known Exploited Actively Exploited |
Published: Nov. 25, 2022 |
Heap buffer overflow in GPU in Google Chrome prior to 107.0.5304.121 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
Vendors Impacted: Google, Microsoft |
Products Impacted: Edge, Edge Chromium, Chromium |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2022-41128 |
HIGH CVSS 8.80 |
CISA Known Exploited Actively Exploited Remote Code Execution |
Published: Nov. 9, 2022 |
Windows Scripting Languages Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41118. |
Vendor Impacted: Microsoft |
Products Impacted: Windows 7, Windows Server 2012, Windows Server 2022, Windows Server 2016, Windows, Windows 10, Windows 8.1, Windows Server 2008, Windows Server 2019, Windows 11 |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-31199 |
CRITICAL CVSS 9.80 |
Remote Code Execution |
Published: Nov. 8, 2022 |
Remote code execution vulnerabilities exist in the Netwrix Auditor User Activity Video Recording component affecting both the Netwrix Auditor server and agents installed on monitored systems. The remote code execution vulnerabilities exist within the underlying protocol used by the component, and potentially allow an unauthenticated remote attacker to execute arbitrary code as the NT AUTHORITY\SYSTEM user on affected systems, including on systems Netwrix Auditor monitors. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2021-44228 |
CRITICAL CVSS 10.00 |
CISA Known Exploited Actively Exploited Public Exploits Available |
Published: Dec. 10, 2021 |
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects. |
Vendors Impacted: Snowsoftware, Percussion, Fedoraproject, Siemens, Bentley, Debian, Netapp, Intel, Apache, Cisco |
Products Impacted: Gma-Manager, Connected Mobile Experiences, Cyber Vision, Logo\! Soft Comfort, Workload Optimization Manager, Video Surveillance Manager, Smart Phy, Unity Connection, Secure Device Onboard, Firepower 2140, Optical Network Controller, Prime Service Catalog, Vesys, Xpedition Package Integrator, Xpedition Enterprise, Firepower 4110, Virtual Topology System, Firepower 1150, Contact Center Domain Manager, Fog Director, Oneapi Sample Browser, Siveillance Viewpoint, Dna Spaces Connector, Firepower 2120, Unified Computing System, Unified Intelligence Center, Iot Operations Dashboard, Unified Contact Center Express, Cyber Vision Sensor Management Exten, Firepower 4145, Log4j, Ucs Central, Finesse, System Debugger, Business Process Automation, Industrial Edge Management Hub, Snapcenter, Dna Spaces\, Unified Sip Proxy, Paging Server, Connected Analytics For Network Depl, Dna Center, Common Services Platform Collector, Cloudcenter Workload Manager, Unified Contact Center Enterprise, Crosswork Zero Touch Provisioning, Unified Workforce Optimization, Navigator, Audio Development Kit, Enterprise Chat And Email, Firepower 2130, Ucs Central Software, Intersight Virtual Appliance, Head-End System Universal Device Int, Network Dashboard Fabric Controller, Mobility Services Engine, Firepower 4150, Firepower 4112, Video Surveillance Operations Manage, Firepower 1120, Siveillance Command, Mendix, Packaged Contact Center Enterprise, Unified Customer Voice Portal, System Studio, Fxos, Sipass Integrated, Genomics Kernel Library, Customer Experience Cloud Agent, Energyip, Advanced Malware Protection Virtual , Contact Center Management Portal, Sd-Wan Vmanage, Cx Cloud Agent, Siveillance Control Pro, Oncommand Insight, Energy Engage, Cloud Secure Agent, Firepower 4140, Cloudcenter Suite Admin, Operation Scheduler, Comos, Spectrum Power 4, Crosswork Data Gateway, Firepower 1140, Computer Vision Annotation Tool, Ontap Tools, Firepower 9300, Firepower 1010, Sppa-T3000 Ses3000, Crosswork Network Automation, Active Iq Unified Manager, Debian Linux, Wan Automation Engine, Solid Edge Harness Design, Crosswork Platform Infrastructure, Emergency Responder, Fedora, Network Assurance Engine, Siveillance Vantage, Broadworks, Log4j2, Synchro, Firepower Threat Defense, Sensor Solution Firmware Development, Ucs Director, Teamcenter, Captial, Virtualized Voice Browser, Desigo Cc Advanced Reports, Mindsphere, Integrated Management Controller Sup, Firepower 4115, Crosswork Optimization Engine, Dna Spaces, Energyip Prepay, Firepower 4120, Opcenter Intelligence, Unified Communications Manager, Unified Contact Center Management Po, Synchro 4d, Unified Communications Manager Im An, Virtualized Infrastructure Manager, Cloudcenter Suite, Data Center Network Manager, Nexus Insights, Spectrum Power 7, Firepower 2110, Industrial Edge Management, Unified Communications Manager Im \&, Data Center Manager, Desigo Cc Info Center, Solid Edge Cam Pro, Nexus Dashboard, Identity Services Engine, Siguard Dsa, Evolved Programmable Network Manager, Sentron Powermanager, Siveillance Identity, Automated Subsea Tuning, Nx, Cloud Insights, Firepower 4125, Cloudcenter, Vm Access Proxy, Crosswork Network Controller, Cloud Connect, E-Car Operation Center, Cloud Manager, Webex Meetings Server, Rhythmyx, Network Services Orchestrator, Snow Commander, Sppa-T3000 Ses3000 Firmware, Cloudcenter Cost Optimizer, Network Insights For Data Center |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.