Loading HuntDB...

High-Impact Vulnerabilities

Critical + High Exploit High EPSS

Vulnerabilities that meet all three criteria: Critical/High severity, known exploits, and high probability of exploitation (EPSS ≥ 10%).

CVE-2024-38514 6 months, 2 weeks ago

NextChat is a cross-platform ChatGPT/Gemini UI. There is a Server-Side Request Forgery (SSRF) vulnerability due to a lack of validation of the `endpoint` GET parameter on the WebDav API endpoint. This SSRF can be used to perform arbitrary HTTPS request from the vulnerable instance (MKCOL, PUT and GET methods supported), or to target NextChat users and make them execute arbitrary JavaScript code in their browser. This vulnerability has been patched in version 2.12.4.

HIGH (7.4) EPSS: 38.5% 1 exploit
NextChat - Server-Side Reques…
CVE-2024-21644 6 months, 2 weeks ago

pyLoad is the free and open-source Download Manager written in pure Python. Any unauthenticated user can browse to a specific URL to expose the Flask config, including the `SECRET_KEY` variable. This issue has been patched in version 0.5.0b3.dev77.

HIGH (7.5) EPSS: 90.3% 1 exploit
pyLoad Flask Config - Access …
CVE-2024-21650 6 months, 2 weeks ago

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki is vulnerable to a remote code execution (RCE) attack through its user registration feature. This issue allows an attacker to execute arbitrary code by crafting malicious payloads in the "first name" or "last name" fields during user registration. This impacts all installations that have user registration enabled for guests. This vulnerability has been patched in XWiki 14.10.17, 15.5.3 and 15.8 RC1.

CRITICAL (10.0) EPSS: 93.4% 1 exploit
XWiki < 4.10.20 - Remote code…
CVE-2024-21136 6 months, 2 weeks ago

No description available

HIGH (8.6) EPSS: 31.2% 1 exploit
Oracle Retail Xstore Suite - …
CVE-2024-21683 6 months, 2 weeks ago

This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.  Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.html You can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives. This vulnerability was found internally.

HIGH (7.2) EPSS: 94.0% 1 exploit
Atlassian Confluence Data Cen…
CVE-2024-21633 6 months, 2 weeks ago

Apktool is a tool for reverse engineering Android APK files. In versions 2.9.1 and prior, Apktool infers resource files' output path according to their resource names which can be manipulated by attacker to place files at desired location on the system Apktool runs on. Affected environments are those in which an attacker may write/overwrite any file that user has write access, and either user name is known or cwd is under user folder. Commit d348c43b24a9de350ff6e5bd610545a10c1fc712 contains a patch for this issue.

HIGH (7.8) EPSS: 72.5% 2 exploits
MobSF - Path Traversal MobSF - Path Traversal
CVE-2024-21887 6 months, 2 weeks ago

A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.

CRITICAL (9.1) EPSS: 94.4% 1 exploit
Ivanti Connect Secure (9.x, 2…
CVE-2024-54385 6 months, 2 weeks ago

Server-Side Request Forgery (SSRF) vulnerability in SoftLab Radio Player allows Server Side Request Forgery.This issue affects Radio Player: from n/a through 2.0.82.

HIGH (7.2) EPSS: 86.1% 1 exploit
Radio Player <= 2.0.82 - Serv…
CVE-2024-54330 6 months, 2 weeks ago

Server-Side Request Forgery (SSRF) vulnerability in Hep Hep Hurra (HHH) Hurrakify allows Server Side Request Forgery.This issue affects Hurrakify: from n/a through 2.4.

HIGH (7.2) EPSS: 57.4% 1 exploit
Hurrakify <= 2.4 - Server-Sid…
CVE-2024-3400 6 months, 2 weeks ago

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

CRITICAL (10.0) EPSS: 94.3% 1 exploit
GlobalProtect - OS Command In…
CVE-2024-3848 6 months, 2 weeks ago

A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a bypass for the previously addressed CVE-2023-6909. The vulnerability arises from the application's handling of artifact URLs, where a '#' character can be used to insert a path into the fragment, effectively skipping validation. This allows an attacker to construct a URL that, when processed, ignores the protocol scheme and uses the provided path for filesystem access. As a result, an attacker can read arbitrary files, including sensitive information such as SSH and cloud keys, by exploiting the way the application converts the URL into a filesystem path. The issue stems from insufficient validation of the fragment portion of the URL, leading to arbitrary file read through path traversal.

HIGH (7.5) EPSS: 67.3% 1 exploit
Mlflow < 2.11.0 - Path Traver…
CVE-2024-3922 6 months, 2 weeks ago

The Dokan Pro plugin for WordPress is vulnerable to SQL Injection via the 'code' parameter in all versions up to, and including, 3.10.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CRITICAL (10.0) EPSS: 89.7% 1 exploit
Dokan Pro <= 3.10.3 - SQL Inj…
CVE-2024-3495 6 months, 2 weeks ago

The Country State City Dropdown CF7 plugin for WordPress is vulnerable to SQL Injection via the ‘cnt’ and 'sid' parameters in versions up to, and including, 2.7.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CRITICAL (9.8) EPSS: 93.4% 1 exploit
Wordpress Country State City …
CVE-2024-9989 6 months, 2 weeks ago

The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.15. This is due a to limited arbitrary method call to 'crypto_connect_ajax_process::log_in' function in the 'crypto_connect_ajax_process' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.

CRITICAL (9.8) EPSS: 91.2% 1 exploit
Crypto <= 2.15 - Authenticati…
CVE-2024-9014 6 months, 2 weeks ago

pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.

CRITICAL (9.9) EPSS: 92.3% 1 exploit
pgAdmin 4 - Authentication By…
CVE-2024-9593 6 months, 2 weeks ago

The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to Remote Code Execution in versions up to, and including, 1.2.2 (for Time Clock) and 1.1.4 (for Time Clock Pro) via the 'etimeclockwp_load_function_callback' function. This allows unauthenticated attackers to execute code on the server. The invoked function's parameters cannot be specified.

HIGH (8.3) EPSS: 73.7% 1 exploit
Time Clock <= 1.2.2 & Time Cl…
CVE-2024-9234 6 months, 2 weeks ago

The GutenKit – Page Builder Blocks, Patterns, and Templates for Gutenberg Block Editor plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the install_and_activate_plugin_from_external() function (install-active-plugin REST API endpoint) in all versions up to, and including, 2.1.0. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins, or utilize the functionality to upload arbitrary files spoofed like plugins.

CRITICAL (9.8) EPSS: 92.5% 1 exploit
GutenKit <= 2.1.0 - Arbitrary…
CVE-2024-9061 6 months, 2 weeks ago

The The WP Popup Builder – Popup Forms and Marketing Lead Generation plugin for WordPress is vulnerable to arbitrary shortcode execution via the wp_ajax_nopriv_shortcode_Api_Add AJAX action in all versions up to, and including, 1.3.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. NOTE: This vulnerability was partially fixed in version 1.3.5 with a nonce check, which effectively prevented access to the affected function. However, version 1.3.6 incorporates the correct authorization check to prevent unauthorized access.

HIGH (7.3) EPSS: 78.4% 1 exploit
WP Popup Builder Popup Forms …
CVE-2024-9707 6 months, 2 weeks ago

The Hunk Companion plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the /wp-json/hc/v1/themehunk-import REST API endpoint in all versions up to, and including, 1.8.4. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.

CRITICAL (9.8) EPSS: 86.9% 1 exploit
Hunk Companion <= 1.8.4 - Arb…
CVE-2024-9935 6 months, 2 weeks ago

The PDF Generator Addon for Elementor Page Builder plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.7.5 via the rtw_pgaepb_dwnld_pdf() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.

HIGH (7.5) EPSS: 92.8% 1 exploit
PDF Generator Addon for Eleme…