Loading HuntDB...

High-Impact Vulnerabilities

Critical + High Exploit High EPSS

Vulnerabilities that meet all three criteria: Critical/High severity, known exploits, and high probability of exploitation (EPSS ≥ 10%).

CVE-2022-2733 6 months, 2 weeks ago

Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.1.

CRITICAL (9.6) EPSS: 88.1% 1 exploit
Openemr < 7.0.0.1 - Cross-Sit…
CVE-2022-2486 6 months, 2 weeks ago

A vulnerability, which was classified as critical, was found in WAVLINK WN535K2 and WN535K3. This affects an unknown part of the file /cgi-bin/mesh.cgi?page=upgrade. The manipulation of the argument key leads to os command injection. The exploit has been disclosed to the public and may be used.

HIGH (8.0) EPSS: 94.1% 1 exploit
Wavlink WN535K2/WN535K3 - OS …
CVE-2022-2487 6 months, 2 weeks ago

A vulnerability has been found in WAVLINK WN535K2 and WN535K3 and classified as critical. This vulnerability affects unknown code of the file /cgi-bin/nightled.cgi. The manipulation of the argument start_hour leads to os command injection. The exploit has been disclosed to the public and may be used.

HIGH (8.0) EPSS: 94.2% 1 exploit
Wavlink WN535K2/WN535K3 - OS …
CVE-2022-2185 6 months, 2 weeks ago

A critical issue has been discovered in GitLab affecting all versions starting from 14.0 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 where an authenticated user authorized to import projects could import a maliciously crafted project leading to remote code execution.

CRITICAL (9.9) EPSS: 93.5% 1 exploit
GitLab CE/EE - Remote Code Ex…
CVE-2022-2467 6 months, 2 weeks ago

A vulnerability has been found in SourceCodester Garage Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument username with the input [email protected]' AND (SELECT 6427 FROM (SELECT(SLEEP(5)))LwLu) AND 'hsvT'='hsvT leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

HIGH (7.3) EPSS: 68.3% 1 exploit
Garage Management System 1.0 …
CVE-2022-2488 6 months, 2 weeks ago

A vulnerability was found in WAVLINK WN535K2 and WN535K3 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/touchlist_sync.cgi. The manipulation of the argument IP leads to os command injection. The exploit has been disclosed to the public and may be used.

HIGH (8.0) EPSS: 94.0% 1 exploit
Wavlink WN535K2/WN535K3 - OS …
CVE-2022-39952 6 months, 2 weeks ago

A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP request.

CRITICAL (9.8) EPSS: 93.1% 1 exploit
Fortinet FortiNAC - Arbitrary…
CVE-2022-33965 6 months, 2 weeks ago

Multiple Unauthenticated SQL Injection (SQLi) vulnerabilities in Osamaesh WP Visitor Statistics plugin <= 5.7 at WordPress.

CRITICAL (9.3) EPSS: 16.1% 1 exploit
WordPress Visitor Statistics …
CVE-2022-33174 6 months, 2 weeks ago

Power Distribution Units running on Powertek firmware (multiple brands) before 3.30.30 allows remote authorization bypass in the web interface. To exploit the vulnerability, an attacker must send an HTTP packet to the data retrieval interface (/cgi/get_param.cgi) with the tmpToken cookie set to an empty string followed by a semicolon. This bypasses an active session authorization check. This can be then used to fetch the values of protected sys.passwd and sys.su.name fields that contain the username and password in cleartext.

CRITICAL (9.8) EPSS: 83.0% 1 exploit
Powertek Firmware <3.30.30 - …
CVE-2022-46169 6 months, 2 weeks ago

Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. The vulnerability resides in the `remote_agent.php` file. This file can be accessed without authentication. This function retrieves the IP address of the client via `get_client_addr` and resolves this IP address to the corresponding hostname via `gethostbyaddr`. After this, it is verified that an entry within the `poller` table exists, where the hostname corresponds to the resolved hostname. If such an entry was found, the function returns `true` and the client is authorized. This authorization can be bypassed due to the implementation of the `get_client_addr` function. The function is defined in the file `lib/functions.php` and checks serval `$_SERVER` variables to determine the IP address of the client. The variables beginning with `HTTP_` can be arbitrarily set by an attacker. Since there is a default entry in the `poller` table with the hostname of the server running Cacti, an attacker can bypass the authentication e.g. by providing the header `Forwarded-For: <TARGETIP>`. This way the function `get_client_addr` returns the IP address of the server running Cacti. The following call to `gethostbyaddr` will resolve this IP address to the hostname of the server, which will pass the `poller` hostname check because of the default entry. After the authorization of the `remote_agent.php` file is bypassed, an attacker can trigger different actions. One of these actions is called `polldata`. The called function `poll_for_data` retrieves a few request parameters and loads the corresponding `poller_item` entries from the database. If the `action` of a `poller_item` equals `POLLER_ACTION_SCRIPT_PHP`, the function `proc_open` is used to execute a PHP script. The attacker-controlled parameter `$poller_id` is retrieved via the function `get_nfilter_request_var`, which allows arbitrary strings. This variable is later inserted into the string passed to `proc_open`, which leads to a command injection vulnerability. By e.g. providing the `poller_id=;id` the `id` command is executed. In order to reach the vulnerable call, the attacker must provide a `host_id` and `local_data_id`, where the `action` of the corresponding `poller_item` is set to `POLLER_ACTION_SCRIPT_PHP`. Both of these ids (`host_id` and `local_data_id`) can easily be bruteforced. The only requirement is that a `poller_item` with an `POLLER_ACTION_SCRIPT_PHP` action exists. This is very likely on a productive instance because this action is added by some predefined templates like `Device - Uptime` or `Device - Polling Time`. This command injection vulnerability allows an unauthenticated user to execute arbitrary commands if a `poller_item` with the `action` type `POLLER_ACTION_SCRIPT_PHP` (`2`) is configured. The authorization bypass should be prevented by not allowing an attacker to make `get_client_addr` (file `lib/functions.php`) return an arbitrary IP address. This could be done by not honoring the `HTTP_...` `$_SERVER` variables. If these should be kept for compatibility reasons it should at least be prevented to fake the IP address of the server running Cacti. This vulnerability has been addressed in both the 1.2.x and 1.3.x release branches with `1.2.23` being the first release containing the patch.

CRITICAL (9.8) EPSS: 94.5% 1 exploit
Cacti <=1.2.22 - Remote Comma…
CVE-2022-26833 6 months, 2 weeks ago

An improper authentication vulnerability exists in the REST API functionality of Open Automation Software OAS Platform V16.00.0121. A specially-crafted series of HTTP requests can lead to unauthenticated use of the REST API. An attacker can send a series of HTTP requests to trigger this vulnerability.

CRITICAL (9.4) EPSS: 88.1% 1 exploit
Open Automation Software OAS …
CVE-2022-1713 6 months, 2 weeks ago

SSRF on /proxy in GitHub repository jgraph/drawio prior to 18.0.4. An attacker can make a request as the server and read its contents. This can lead to a leak of sensitive information.

HIGH (7.5) EPSS: 88.8% 1 exploit
Drawio <18.0.4 - Server-Side …
CVE-2022-1329 6 months, 2 weeks ago

The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to obtain remote code execution, in versions 3.6.0 to 3.6.2.

HIGH (8.8) EPSS: 93.5% 1 exploit
Elementor Website Builder - R…
CVE-2022-1040 6 months, 2 weeks ago

An authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v18.5 MR3 and older.

CRITICAL (9.8) EPSS: 94.4% 1 exploit
Sophos Firewall <=18.5 MR3 - …
CVE-2022-1883 6 months, 2 weeks ago

SQL Injection in GitHub repository camptocamp/terraboard prior to 2.2.0.

CRITICAL (9.6) EPSS: 78.0% 1 exploit
Terraboard <2.2.0 - SQL Injec…
CVE-2022-1442 6 months, 2 weeks ago

The Metform WordPress plugin is vulnerable to sensitive information disclosure due to improper access control in the ~/core/forms/action.php file which can be exploited by an unauthenticated attacker to view all API keys and secrets of integrated third-party APIs like that of PayPal, Stripe, Mailchimp, Hubspot, HelpScout, reCAPTCHA and many more, in versions up to and including 2.1.3.

HIGH (7.5) EPSS: 85.2% 1 exploit
WordPress Metform <=2.1.3 - I…
CVE-2022-1162 6 months, 2 weeks ago

A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts

CRITICAL (9.1) EPSS: 89.8% 1 exploit
GitLab CE/EE - Hard-Coded Cre…
CVE-2022-1119 6 months, 2 weeks ago

The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader.php file due to missing controls which makes it possible unauthenticated attackers to supply a path to a file that will subsequently be downloaded, in versions up to and including 3.2.7.

HIGH (7.5) EPSS: 91.3% 1 exploit
WordPress Simple File List <3…
CVE-2022-1388 6 months, 2 weeks ago

On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

CRITICAL (9.8) EPSS: 94.5% 2 exploits
F5 BIG-IP iControl - REST Aut… F5 BIG-IP iControl REST Panel…
CVE-2022-1711 6 months, 2 weeks ago

Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.5.

HIGH (7.5) EPSS: 20.6% 1 exploit
draw.io < 18.0.5 - Server Sid…