Snapshot
Sept. 30, 2022 - Oct. 7, 2022
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2022-36804 | Multiple API endpoints of Atlassian Bitbucket Server and Data Center contain a command injection vulnerability where an attacker with access to a public Bitbucket repository, or with read permissions to a private one, can execute code by sending a malicious HTTP request. | HIGH | Atlassian | Sept. 30, 2022 |
CVE-2022-41082 | Microsoft Exchange Server contains an unspecified vulnerability which allows for authenticated remote code execution. Dubbed "ProxyNotShell," this vulnerability is chainable with CVE-2022-41040 which allows for the remote code execution. | HIGH | Microsoft | Sept. 30, 2022 |
CVE-2022-41040 | Microsoft Exchange Server allows for server-side request forgery. Dubbed "ProxyNotShell," this vulnerability is chainable with CVE-2022-41082 which allows for remote code execution. | HIGH | Microsoft | Sept. 30, 2022 |
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2022-32910 | A logic issue was addressed with improved checks. | HIGH | Apple | Risk Context N/A |
CVE-2022-41082 | Microsoft Exchange Server Remote Code Execution Vulnerability. | HIGH | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2022-41040 | Microsoft Exchange Server Elevation of Privilege Vulnerability. | HIGH | Microsoft |
CISA Known Exploited Actively Exploited Used In Ransomware Public Exploits Available |
CVE-2022-36804 | Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before v... | HIGH | Atlassian |
CISA Known Exploited Actively Exploited Public Exploits Available |
CVE-2021-21551 | Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, ... | HIGH | Dell |
CISA Known Exploited Actively Exploited Public Exploits Available |
CVE-2021-27065 | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-... | HIGH | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2021-26858 | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-... | HIGH | Microsoft |
CISA Known Exploited Remote Code Execution |
CVE-2021-26857 | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-... | HIGH | Microsoft |
CISA Known Exploited Remote Code Execution Public Exploits Available |
CVE-2021-26855 | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-... | CRITICAL | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2019-16098 | The driver in Micro-Star MSI Afterburner 4.6.2.15658 allows any authenticated user to read and write to arbitrary memory, I/... | HIGH | Msi |
Actively Exploited Used In Ransomware Public Exploits Available |
CISA Known Exploited Vulnerabilities
CISA added 3 vulnerabilities to the known exploited vulnerabilities list.
Microsoft — Exchange Server |
CVE-2022-41082 / Added: Sept. 30, 2022 |
HIGH CVSS 8.80 |
Microsoft Exchange Server contains an unspecified vulnerability which allows for authenticated remote code execution. Dubbed "ProxyNotShell," this vulnerability is chainable with CVE-2022-41040 which allows for the remote code execution. |
Headlines
|
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2022-32910 |
HIGH CVSS 7.50 |
Risk Context N/A |
Published: Nov. 1, 2022 |
A logic issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6.8, macOS Monterey 12.5, Security Update 2022-005 Catalina. An archive may be able to bypass Gatekeeper. |
Vendor Impacted: Apple |
Products Impacted: Macos, Mac Os X |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-41082 |
HIGH CVSS 8.80 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Oct. 3, 2022 |
Microsoft Exchange Server Remote Code Execution Vulnerability. |
Vendor Impacted: Microsoft |
Product Impacted: Exchange Server |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-41040 |
HIGH CVSS 8.80 |
CISA Known Exploited Actively Exploited Used In Ransomware Public Exploits Available |
Published: Oct. 3, 2022 |
Microsoft Exchange Server Elevation of Privilege Vulnerability. |
Vendor Impacted: Microsoft |
Product Impacted: Exchange Server |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-36804 |
HIGH CVSS 8.80 |
CISA Known Exploited Actively Exploited Public Exploits Available |
Published: Aug. 25, 2022 |
Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew. |
Vendor Impacted: Atlassian |
Products Impacted: Bitbucket Server And Data Center, Bitbucket |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2021-21551 |
HIGH CVSS 7.80 |
CISA Known Exploited Actively Exploited Public Exploits Available |
Published: May 4, 2021 |
Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required. |
Vendor Impacted: Dell |
Products Impacted: Dbutil 2 3.sys, Dbutil Driver |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2021-27065 |
HIGH CVSS 7.80 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: March 3, 2021 |
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27078. |
Vendor Impacted: Microsoft |
Products Impacted: Microsoft Exchange Server, Exchange Server |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2021-26858 |
HIGH CVSS 7.80 |
CISA Known Exploited Remote Code Execution |
Published: March 3, 2021 |
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-27065, CVE-2021-27078. |
Vendor Impacted: Microsoft |
Product Impacted: Microsoft Exchange Server |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2021-26857 |
HIGH CVSS 7.80 |
CISA Known Exploited Remote Code Execution Public Exploits Available |
Published: March 3, 2021 |
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078. |
Vendor Impacted: Microsoft |
Product Impacted: Microsoft Exchange Server |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2021-26855 |
CRITICAL CVSS 9.80 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: March 3, 2021 |
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078. |
Vendor Impacted: Microsoft |
Products Impacted: Microsoft Exchange Server, Exchange Server |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2019-16098 |
HIGH CVSS 7.80 |
Actively Exploited Used In Ransomware Public Exploits Available |
Published: Sept. 11, 2019 |
The driver in Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code. |
Vendor Impacted: Msi |
Product Impacted: Afterburner |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.