Loading HuntDB...

High-Impact Vulnerabilities

Critical + High Exploit High EPSS

Vulnerabilities that meet all three criteria: Critical/High severity, known exploits, and high probability of exploitation (EPSS ≥ 10%).

CVE-2022-1768 6 months, 2 weeks ago

The RSVPMaker plugin for WordPress is vulnerable to unauthenticated SQL Injection due to insufficient escaping and parameterization on user supplied data passed to multiple SQL queries in the ~/rsvpmaker-email.php file. This makes it possible for unauthenticated attackers to steal sensitive information from the database in versions up to, and including, 9.3.2. Please note that this is separate from CVE-2022-1453 & CVE-2022-1505.

CRITICAL (9.8) EPSS: 82.7% 1 exploit
WordPress RSVPMaker <=9.3.2 -…
CVE-2022-24900 6 months, 2 weeks ago

Piano LED Visualizer is software that allows LED lights to light up as a person plays a piano connected to a computer. Version 1.3 and prior are vulnerable to a path traversal attack. The `os.path.join` call is unsafe for use with untrusted input. When the `os.path.join` call encounters an absolute path, it ignores all the parameters it has encountered till that point and starts working with the new absolute path. Since the "malicious" parameter represents an absolute path, the result of `os.path.join` ignores the static directory completely. Hence, untrusted input is passed via the `os.path.join` call to `flask.send_file` can lead to path traversal attacks. A patch with a fix is available on the `master` branch of the GitHub repository. This can also be fixed by preventing flow of untrusted data to the vulnerable `send_file` function. In case the application logic necessiates this behaviour, one can either use the `flask.safe_join` to join untrusted paths or replace `flask.send_file` calls with `flask.send_from_directory` calls.

CRITICAL (9.9) EPSS: 84.7% 1 exploit
Piano LED Visualizer 1.3 - Lo…
CVE-2022-24856 6 months, 2 weeks ago

FlyteConsole is the web user interface for the Flyte platform. FlyteConsole prior to version 0.52.0 is vulnerable to server-side request forgery (SSRF) when FlyteConsole is open to the general internet. An attacker can exploit any user of a vulnerable instance to access the internal metadata server or other unauthenticated URLs. Passing of headers to an unauthorized actor may occur. The patch for this issue deletes the entire `cors_proxy`, as this is not required for console anymore. A patch is available in FlyteConsole version 0.52.0. Disable FlyteConsole availability on the internet as a workaround.

CRITICAL (9.1) EPSS: 82.8% 1 exploit
Flyte Console <0.52.0 - Serve…
CVE-2022-24899 6 months, 2 weeks ago

Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settings.

HIGH (7.2) EPSS: 54.5% 1 exploit
Contao <4.13.3 - Cross-Site S…
CVE-2022-24816 6 months, 2 weeks ago

JAI-EXT is an open-source project which aims to extend the Java Advanced Imaging (JAI) API. Programs allowing Jiffle script to be provided via network request can lead to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects the downstream GeoServer project. Version 1.2.22 will contain a patch that disables the ability to inject malicious code into the resulting script. Users unable to upgrade may negate the ability to compile Jiffle scripts from the final application, by removing janino-x.y.z.jar from the classpath.

CRITICAL (10.0) EPSS: 94.2% 1 exploit
GeoServer <1.2.2 - Remote Cod…
CVE-2022-24384 6 months, 2 weeks ago

Cross-site Scripting (XSS) vulnerability in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.

HIGH (8.8) EPSS: 49.4% 1 exploit
SmarterTools SmarterTrack - C…
CVE-2022-32772 6 months, 2 weeks ago

A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the "msg" parameter which is inserted into the document with insufficient sanitization.

CRITICAL (9.6) EPSS: 24.5% 1 exploit
WWBN AVideo 11.6 - Cross-Site…
CVE-2022-32770 6 months, 2 weeks ago

A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the "toast" parameter which is inserted into the document with insufficient sanitization.

CRITICAL (9.6) EPSS: 44.6% 1 exploit
WWBN AVideo 11.6 - Cross-Site…
CVE-2022-32771 6 months, 2 weeks ago

A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the "success" parameter which is inserted into the document with insufficient sanitization.

CRITICAL (9.6) EPSS: 31.9% 1 exploit
WWBN AVideo 11.6 - Cross-Site…
CVE-2022-43769 6 months, 2 weeks ago

Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.1 and 9.3.0.2, including 8.3.x allow certain web services to set property values which contain Spring templates that are interpreted downstream.

HIGH (8.8) EPSS: 93.8% 1 exploit
Hitachi Pentaho Business Anal…
CVE-2022-40684 6 months, 2 weeks ago

An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.

CRITICAL (9.8) EPSS: 94.4% 1 exploit
Fortinet - Authentication Byp…
CVE-2022-41840 6 months, 2 weeks ago

Unauth. Directory Traversal vulnerability in Welcart eCommerce plugin <= 2.7.7 on WordPress.

HIGH (7.5) EPSS: 84.1% 1 exploit
Welcart eCommerce <=2.7.7 - L…
CVE-2022-47615 6 months, 2 weeks ago

Local File Inclusion vulnerability in LearnPress – WordPress LMS Plugin <= 4.1.7.3.2 versions.

CRITICAL (9.3) EPSS: 84.9% 1 exploit
LearnPress Plugin < 4.2.0 - L…
CVE-2022-47986 6 months, 2 weeks ago

IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier could allow a remote attacker to execute arbitrary code on the system, caused by a YAML deserialization flaw. By sending a specially crafted obsolete API call, an attacker could exploit this vulnerability to execute arbitrary code on the system. The obsolete API call was removed in Faspex 4.4.2 PL2. IBM X-Force ID: 243512.

CRITICAL (9.8) EPSS: 94.3% 1 exploit
IBM Aspera Faspex <=4.4.2 PL1…
CVE-2022-25149 6 months, 2 weeks ago

The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the IP parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5.

CRITICAL (9.8) EPSS: 39.0% 1 exploit
WordPress Plugin WP Statistic…
CVE-2022-25148 6 months, 2 weeks ago

The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the current_page_id parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5.

CRITICAL (9.8) EPSS: 39.2% 1 exploit
WordPress Plugin WP Statistic…
CVE-2021-44427 6 months, 2 weeks ago

An unauthenticated SQL Injection vulnerability in Rosario Student Information System (aka rosariosis) before 8.1.1 allows remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter.

CRITICAL (9.8) EPSS: 85.2% 1 exploit
Rosario Student Information S…
CVE-2021-34473 6 months, 2 weeks ago

No description available

CRITICAL (9.1) EPSS: 94.3% 1 exploit
Exchange Server - Remote Code…
CVE-2021-34621 6 months, 2 weeks ago

A vulnerability in the user registration component found in the ~/src/Classes/RegistrationAuth.php file of the ProfilePress WordPress plugin made it possible for users to register on sites as an administrator. This issue affects versions 3.0.0 - 3.1.3. .

CRITICAL (9.8) EPSS: 91.2% 1 exploit
WordPress ProfilePress 3.0.0…
CVE-2021-27651 6 months, 2 weeks ago

In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionality for local accounts can be used to bypass local authentication checks.

CRITICAL (9.8) EPSS: 90.4% 1 exploit
Pega Infinity - Authenticatio…