Loading HuntDB...

High-Impact Vulnerabilities

Critical + High Exploit High EPSS

Vulnerabilities that meet all three criteria: Critical/High severity, known exploits, and high probability of exploitation (EPSS ≥ 10%).

CVE-2023-2479 6 months, 2 weeks ago

OS Command Injection in GitHub repository appium/appium-desktop prior to v1.22.3-4.

CRITICAL (9.8) EPSS: 92.3% 1 exploit
Appium Desktop Server - Remot…
CVE-2023-2640 6 months, 2 weeks ago

On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.

HIGH (7.8) EPSS: 92.0% 1 exploit
GameOver(lay) - Local Privile…
CVE-2023-2949 6 months, 2 weeks ago

Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.1.

HIGH (8.3) EPSS: 72.2% 1 exploit
OpenEMR < 7.0.1 - Cross-site …
CVE-2023-2356 6 months, 2 weeks ago

Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1.

CRITICAL (10.0) EPSS: 82.8% 1 exploit
Mlflow <2.3.0 - Local File In…
CVE-2023-2780 6 months, 2 weeks ago

Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.3.1.

CRITICAL (9.8) EPSS: 86.6% 1 exploit
Mlflow <2.3.1 - Local File In…
CVE-2023-2982 6 months, 2 weeks ago

The WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 7.6.4. This is due to insufficient encryption on the user being supplied during a login validated through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they know the email address associated with that user. This was partially patched in version 7.6.4 and fully patched in version 7.6.5.

CRITICAL (9.8) EPSS: 75.6% 1 exploit
Miniorange Social Login and R…
CVE-2023-2732 6 months, 2 weeks ago

The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.2. This is due to insufficient verification on the user being supplied during the add listing REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.

CRITICAL (9.8) EPSS: 90.1% 1 exploit
MStore API <= 3.9.2 - Authent…
CVE-2023-2948 6 months, 2 weeks ago

Cross-site Scripting (XSS) - Generic in GitHub repository openemr/openemr prior to 7.0.1.

HIGH (8.3) EPSS: 83.3% 1 exploit
OpenEMR < 7.0.1 - Cross-Site …
CVE-2023-2227 6 months, 2 weeks ago

Improper Authorization in GitHub repository modoboa/modoboa prior to 2.1.0.

CRITICAL (9.1) EPSS: 90.9% 1 exploit
Modoboa < 2.1.0 - Improper Au…
CVE-2023-2825 6 months, 2 weeks ago

An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.

CRITICAL (10.0) EPSS: 93.3% 1 exploit
GitLab 16.0.0 - Path Traversal
CVE-2023-7028 6 months, 2 weeks ago

An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.

CRITICAL (10.0) EPSS: 94.1% 1 exploit
GitLab - Account Takeover via…
CVE-2023-42793 6 months, 2 weeks ago

In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible

CRITICAL (9.8) EPSS: 94.6% 1 exploit
JetBrains TeamCity < 2023.05.…
CVE-2023-42442 6 months, 2 weeks ago

JumpServer is an open source bastion host and a professional operation and maintenance security audit system. Starting in version 3.0.0 and prior to versions 3.5.5 and 3.6.4, session replays can download without authentication. Session replays stored in S3, OSS, or other cloud storage are not affected. The api `/api/v1/terminal/sessions/` permission control is broken and can be accessed anonymously. SessionViewSet permission classes set to `[RBACPermission | IsSessionAssignee]`, relation is or, so any permission matched will be allowed. Versions 3.5.5 and 3.6.4 have a fix. After upgrading, visit the api `$HOST/api/v1/terminal/sessions/?limit=1`. The expected http response code is 401 (`not_authenticated`).

HIGH (8.2) EPSS: 83.6% 1 exploit
JumpServer > 3.6.4 - Informat…
CVE-2023-39361 6 months, 2 weeks ago

Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a SQL injection discovered in graph_view.php. Since guest users can access graph_view.php without authentication by default, if guest users are being utilized in an enabled state, there could be the potential for significant damage. Attackers may exploit this vulnerability, and there may be possibilities for actions such as the usurpation of administrative privileges or remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CRITICAL (9.8) EPSS: 93.1% 1 exploit
Cacti 1.2.24 - SQL Injection
CVE-2023-46732 6 months, 2 weeks ago

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki is vulnerable to reflected cross-site scripting (RXSS) via the `rev` parameter that is used in the content of the content menu without escaping. If an attacker can convince a user to visit a link with a crafted parameter, this allows the attacker to execute arbitrary actions in the name of the user, including remote code (Groovy) execution in the case of a user with programming right, compromising the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.6 RC1, 15.5.1 and 14.10.14. The patch in commit `04e325d57` can be manually applied without upgrading (or restarting) the instance. Users are advised to upgrade or to manually apply the patch. There are no known workarounds for this vulnerability.

CRITICAL (9.7) EPSS: 53.7% 1 exploit
XWiki < 14.10.14 - Cross-Site…
CVE-2023-46805 6 months, 2 weeks ago

An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.

HIGH (8.2) EPSS: 94.4% 1 exploit
Ivanti ICS - Authentication B…
CVE-2023-50719 6 months, 2 weeks ago

XWiki Platform is a generic wiki platform. Starting in 7.2-milestone-2 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the Solr-based search in XWiki discloses the password hashes of all users to anyone with view right on the respective user profiles. By default, all user profiles are public. This vulnerability also affects any configurations used by extensions that contain passwords like API keys that are viewable for the attacker. Normally, such passwords aren't accessible but this vulnerability would disclose them as plain text. This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1. There are no known workarounds for this vulnerability.

HIGH (7.5) EPSS: 25.8% 1 exploit
XWiki < 4.10.15 - Sensitive I…
CVE-2023-5074 6 months, 2 weeks ago

Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28

CRITICAL (9.8) EPSS: 92.3% 1 exploit
D-Link D-View 8 v2.0.1.28 - A…
CVE-2023-5830 6 months, 2 weeks ago

A vulnerability classified as critical has been found in ColumbiaSoft Document Locator. This affects an unknown part of the file /api/authentication/login of the component WebTools. The manipulation of the argument Server leads to improper authentication. It is possible to initiate the attack remotely. Upgrading to version 7.2 SP4 and 2021.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-243729 was assigned to this vulnerability.

HIGH (7.3) EPSS: 87.6% 1 exploit
ColumbiaSoft DocumentLocator …
CVE-2023-49103 6 months, 2 weeks ago

An issue was discovered in ownCloud owncloud/graphapi 0.2.x before 0.2.1 and 0.3.x before 0.3.1. The graphapi app relies on a third-party GetPhpInfo.php library that provides a URL. When this URL is accessed, it reveals the configuration details of the PHP environment (phpinfo). This information includes all the environment variables of the webserver. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key. Simply disabling the graphapi app does not eliminate the vulnerability. Additionally, phpinfo exposes various other potentially sensitive configuration details that could be exploited by an attacker to gather information about the system. Therefore, even if ownCloud is not running in a containerized environment, this vulnerability should still be a cause for concern. Note that Docker containers from before February 2023 are not vulnerable to the credential disclosure.

CRITICAL (10.0) EPSS: 94.4% 1 exploit
OwnCloud - Phpinfo Configurat…