In 2022, we saw the aftermath of Log4J with new ways of exploiting the vulnerability (see review of 2022-01-11 and 2022-02-08) and variants of the former.
In 2022, a few days after the release of a patch for a Java code injection with the "Spring Expression Language" named Spring4Shell was released. (CVE-2022-22963). A kind of Log4J but fortunately requiring a configuration is not very common (see review of 2022-04-12).
In 2022, we understood that yes, there are major vulnerabilities in Cloud providers and yes, they can be exploited in the wild with gigantic impacts, like :
Those affecting AWS CloudFormation (see review of 2022-02-08).
Those affecting Azure Automation Account, allowing to retrieve the tokens of other customers (see review of 2022-03-08).
In 2022, we also saw many vulnerabilities affecting Microsoft Exchange such as ProxyNotShell, allowing a complete compromise and that Microsoft will have taken 3 months to fix (see review of 2022-10-11).
In 2022, we finally saw that Zimbra (the email suite) was targeted with exploits of vulnerabilities unknown to the editor (0-days) at the time of the attacks (cf. review of 2022-02-08, 2022-07-12, 2022-09-13, 2022-10-11).