Loading HuntDB...

High-Impact Vulnerabilities

Critical + High Exploit High EPSS

Vulnerabilities that meet all three criteria: Critical/High severity, known exploits, and high probability of exploitation (EPSS ≥ 10%).

CVE-2021-3577 6 months, 2 weeks ago

An unauthenticated remote code execution vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker on the same network unauthorized access to the device.

HIGH (8.8) EPSS: 86.4% 1 exploit
Motorola Baby Monitors - Remo…
CVE-2021-35250 6 months, 2 weeks ago

A researcher reported a Directory Transversal Vulnerability in Serv-U 15.3. This may allow access to files relating to the Serv-U installation and server files. This issue has been resolved in Serv-U 15.3 Hotfix 1.

HIGH (7.5) EPSS: 91.4% 1 exploit
SolarWinds Serv-U 15.3 - Dire…
CVE-2021-35587 6 months, 2 weeks ago

Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: OpenSSO Agent). Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in takeover of Oracle Access Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

CRITICAL (9.8) EPSS: 94.2% 1 exploit
Oracle Access Manager - Remot…
CVE-2021-39226 6 months, 2 weeks ago

Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot "public_mode" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot "public_mode" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects.

CRITICAL (9.8) EPSS: 94.4% 1 exploit
Grafana Snapshot - Authentica…
CVE-2021-39141 6 months, 2 weeks ago

XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.

HIGH (8.5) EPSS: 75.9% 1 exploit
XStream 1.4.18 - Remote Code…
CVE-2021-39316 6 months, 2 weeks ago

The Zoomsounds plugin <= 6.45 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the `dzsap_download` action using directory traversal in the `link` parameter.

HIGH (7.5) EPSS: 90.7% 1 exploit
WordPress DZS Zoomsounds <=6.…
CVE-2021-39165 6 months, 2 weeks ago

Cachet is an open source status page. With Cachet prior to and including 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. The original repository of Cachet <https://github.com/CachetHQ/Cachet> is not active, the stable version 2.3.18 and it's developing 2.4 branch is affected.

HIGH (8.1) EPSS: 89.4% 1 exploit
Cachet <=2.3.18 - SQL Injecti…
CVE-2021-39312 6 months, 2 weeks ago

The True Ranker plugin <= 2.2.2 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file.

HIGH (7.5) EPSS: 85.5% 1 exploit
WordPress True Ranker <2.2.4 …
CVE-2021-39146 6 months, 2 weeks ago

XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.

HIGH (8.5) EPSS: 44.9% 1 exploit
XStream 1.4.18 - Arbitrary Co…
CVE-2021-33544 6 months, 2 weeks ago

Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code.

HIGH (7.2) EPSS: 93.7% 1 exploit
Geutebruck - Remote Command I…
CVE-2021-33690 6 months, 2 weeks ago

Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50The SAP NetWeaver Development Infrastructure Component Build Service allows a threat actor who has access to the server to perform proxy attacks on server by sending crafted queries. Due to this, the threat actor could completely compromise sensitive data residing on the Server and impact its availability.Note: The impact of this vulnerability depends on whether SAP NetWeaver Development Infrastructure (NWDI) runs on the intranet or internet. The CVSS score reflects the impact considering the worst-case scenario that it runs on the internet.

CRITICAL (9.9) EPSS: 90.7% 1 exploit
SAP NetWeaver Development Inf…
CVE-2021-26855 6 months, 2 weeks ago

No description available

CRITICAL (9.1) EPSS: 94.4% 1 exploit
Microsoft Exchange Server SSR…
CVE-2021-1498 6 months, 2 weeks ago

Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

CRITICAL (9.8) EPSS: 94.1% 1 exploit
Cisco HyperFlex HX Data Platf…
CVE-2021-1497 6 months, 2 weeks ago

Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

CRITICAL (9.8) EPSS: 94.4% 1 exploit
Cisco HyperFlex HX Data Platf…
CVE-2021-32819 6 months, 2 weeks ago

Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. This issue is fixed in version 9.0.0. For complete details refer to the referenced GHSL-2021-023.

HIGH (8.0) EPSS: 88.9% 1 exploit
Nodejs Squirrelly - Remote Co…
CVE-2021-32789 6 months, 2 weeks ago

woocommerce-gutenberg-products-block is a feature plugin for WooCommerce Gutenberg Blocks. An SQL injection vulnerability impacts all WooCommerce sites running the WooCommerce Blocks feature plugin between version 2.5.0 and prior to version 2.5.16. Via a carefully crafted URL, an exploit can be executed against the `wc/store/products/collection-data?calculate_attribute_counts[][taxonomy]` endpoint that allows the execution of a read only sql query. There are patches for many versions of this package, starting with version 2.5.16. There are no known workarounds aside from upgrading.

HIGH (7.5) EPSS: 91.7% 1 exploit
WooCommerce Blocks 2.5 to 5.5…
CVE-2021-32682 6 months, 2 weeks ago

elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.

CRITICAL (9.8) EPSS: 93.6% 1 exploit
elFinder 2.1.58 - Remote Code…
CVE-2021-43798 6 months, 2 weeks ago

Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.

HIGH (7.5) EPSS: 94.3% 2 exploits
Grafana v8.x - Arbitrary File… Grafana 8.x - Local File Incl…
CVE-2021-43778 6 months, 2 weeks ago

Barcode is a GLPI plugin for printing barcodes and QR codes. GLPI instances version 2.x prior to version 2.6.1 with the barcode plugin installed are vulnerable to a path traversal vulnerability. This issue was patched in version 2.6.1. As a workaround, delete the `front/send.php` file.

CRITICAL (9.1) EPSS: 84.2% 1 exploit
GLPI plugin Barcode < 2.6.1 -…
CVE-2021-43810 6 months, 2 weeks ago

Admidio is a free open source user management system for websites of organizations and groups. A cross-site scripting vulnerability is present in Admidio prior to version 4.0.12. The Reflected XSS vulnerability occurs because redirect.php does not properly validate the value of the url parameter. Through this vulnerability, an attacker is capable to execute malicious scripts. This issue is patched in version 4.0.12.

HIGH (8.8) EPSS: 57.1% 1 exploit
Admidio - Cross-Site Scripting