Loading HuntDB...

High-Impact Vulnerabilities

Critical + High Exploit High EPSS

Vulnerabilities that meet all three criteria: Critical/High severity, known exploits, and high probability of exploitation (EPSS ≥ 10%).

CVE-2024-44000 4 months, 3 weeks ago

Insufficiently Protected Credentials vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Authentication Bypass.This issue affects LiteSpeed Cache: from n/a before 6.5.0.1.

CRITICAL (9.8) EPSS: 48.1% 1 exploit
LiteSpeed Cache <= 6.4.1 - Se…
CVE-2024-27198 4 months, 3 weeks ago

In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible

CRITICAL (9.8) EPSS: 96.8% 1 exploit
TeamCity < 2023.11.4 - Authen…
CVE-2024-6670 4 months, 3 weeks ago

In WhatsUp Gold versions released before 2024.0.0, a SQL Injection vulnerability allows an unauthenticated attacker to retrieve the users encrypted password.

CRITICAL (9.8) EPSS: 89.3% 1 exploit
WhatsUp Gold HasErrors SQL In…
CVE-2024-29824 4 months, 3 weeks ago

An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.

CRITICAL (9.6) EPSS: 31.3% 1 exploit
Ivanti EPM - Remote Code Exec…
CVE-2024-10924 4 months, 3 weeks ago

The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).

CRITICAL (9.8) EPSS: 23.0% 1 exploit
Really Simple Security < 9.1.…
CVE-2024-36991 4 months, 3 weeks ago

In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.

HIGH (7.5) EPSS: 12.0% 1 exploit
Splunk Enterprise - Local Fil…
CVE-2024-36401 4 months, 3 weeks ago

GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code. Versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed.

CRITICAL (9.8) EPSS: 95.3% 1 exploit
GeoServer RCE in Evaluating P…
CVE-2024-22320 4 months, 3 weeks ago

IBM Operational Decision Manager 8.10.3 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code in the context of SYSTEM. IBM X-Force ID: 279146.

CRITICAL (9.8) EPSS: 41.5% 1 exploit
IBM Operational Decision Mana…
CVE-2024-20767 4 months, 3 weeks ago

ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify restricted files. Exploitation of this issue does not require user interaction. Exploitation of this issue requires the admin panel be exposed to the internet.

HIGH (7.4) EPSS: 96.7% 1 exploit
Adobe ColdFusion - Arbitrary …
CVE-2024-21644 4 months, 3 weeks ago

pyLoad is the free and open-source Download Manager written in pure Python. Any unauthenticated user can browse to a specific URL to expose the Flask config, including the `SECRET_KEY` variable. This issue has been patched in version 0.5.0b3.dev77.

HIGH (7.5) EPSS: 31.7% 1 exploit
pyLoad Flask Config - Access …
CVE-2024-21650 4 months, 3 weeks ago

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki is vulnerable to a remote code execution (RCE) attack through its user registration feature. This issue allows an attacker to execute arbitrary code by crafting malicious payloads in the "first name" or "last name" fields during user registration. This impacts all installations that have user registration enabled for guests. This vulnerability has been patched in XWiki 14.10.17, 15.5.3 and 15.8 RC1.

CRITICAL (10.0) EPSS: 80.8% 1 exploit
XWiki < 4.10.20 - Remote code…
CVE-2024-21887 4 months, 3 weeks ago

A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.

CRITICAL (9.1) EPSS: 97.3% 1 exploit
Ivanti Connect Secure (9.x, 2…
CVE-2024-3400 4 months, 3 weeks ago

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

CRITICAL (10.0) EPSS: 96.4% 1 exploit
GlobalProtect - OS Command In…
CVE-2024-28987 4 months, 3 weeks ago

The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.

CRITICAL (9.1) EPSS: 96.4% 1 exploit
SolarWinds Web Help Desk - Ha…
CVE-2024-28995 4 months, 3 weeks ago

SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.

HIGH (8.6) EPSS: 96.5% 1 exploit
SolarWinds Serv-U - Directory…
CVE-2024-51378 4 months, 3 weeks ago

getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.

CRITICAL (10.0) EPSS: 23.1% 1 exploit
CyberPanel - Command Injection
CVE-2024-7593 4 months, 3 weeks ago

Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel.

CRITICAL (9.8) EPSS: 97.2% 1 exploit
Ivanti vTM - Authentication B…
CVE-2024-50603 4 months, 3 weeks ago

An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.

CRITICAL (10.0) EPSS: 88.9% 1 exploit
Aviatrix Controller - Remote …
CVE-2024-1212 4 months, 3 weeks ago

Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.

CRITICAL (10.0) EPSS: 93.7% 1 exploit
Progress Kemp LoadMaster - Co…
CVE-2024-1709 4 months, 3 weeks ago

ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.

CRITICAL (10.0) EPSS: 94.7% 1 exploit
ConnectWise ScreenConnect 23.…