Loading HuntDB...

High-Impact Vulnerabilities

Critical + High Exploit High EPSS

Vulnerabilities that meet all three criteria: Critical/High severity, known exploits, and high probability of exploitation (EPSS ≥ 10%).

CVE-2024-35219 6 months, 2 weeks ago

OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Prior to version 7.6.0, attackers can exploit a path traversal vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the `outputFolder` option. The issue was fixed in version 7.6.0 by removing the usage of the `outputFolder` option. No known workarounds are available.

HIGH (8.3) EPSS: 33.8% 1 exploit
OpenAPI Generator <= 7.5.0 - …
CVE-2024-28255 6 months, 2 weeks ago

OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. The `JwtFilter` handles the API authentication by requiring and verifying JWT tokens. When a new request comes in, the request's path is checked against this list. When the request's path contains any of the excluded endpoints the filter returns without validating the JWT. Unfortunately, an attacker may use Path Parameters to make any path contain any arbitrary strings. For example, a request to `GET /api/v1;v1%2fusers%2flogin/events/subscriptions/validation/condition/111` will match the excluded endpoint condition and therefore will be processed with no JWT validation allowing an attacker to bypass the authentication mechanism and reach any arbitrary endpoint, including the ones listed above that lead to arbitrary SpEL expression injection. This bypass will not work when the endpoint uses the `SecurityContext.getUserPrincipal()` since it will return `null` and will throw an NPE. This issue may lead to authentication bypass and has been addressed in version 1.2.4. Users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as `GHSL-2023-237`.

CRITICAL (9.8) EPSS: 93.9% 1 exploit
OpenMetadata - Authentication…
CVE-2024-28987 6 months, 2 weeks ago

The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.

CRITICAL (9.1) EPSS: 94.2% 1 exploit
SolarWinds Web Help Desk - Ha…
CVE-2024-28995 6 months, 2 weeks ago

SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.

HIGH (8.6) EPSS: 94.4% 1 exploit
SolarWinds Serv-U - Directory…
CVE-2024-51482 6 months, 2 weeks ago

ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder v1.37.* <= 1.37.64 is vulnerable to boolean-based SQL Injection in function of web/ajax/event.php. This is fixed in 1.37.65.

CRITICAL (10.0) EPSS: 23.7% 1 exploit
ZoneMinder v1.37.* <= 1.37.64…
CVE-2024-51378 6 months, 2 weeks ago

getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.

CRITICAL (10.0) EPSS: 94.1% 1 exploit
CyberPanel - Command Injection
CVE-2024-51739 6 months, 2 weeks ago

Combodo iTop is a simple, web based IT Service Management tool. Unauthenticated user can perform users enumeration, which can make it easier to bruteforce a valid account. As a fix the sentence displayed after resetting password no longer shows if the user exists or not. This fix is included in versions 2.7.11, 3.0.5, 3.1.2, and 3.2.0. Users are advised to upgrade. Users unable to upgrade may overload the dictionary entry `"UI:ResetPwd-Error-WrongLogin"` through an extension and replace it with a generic message.

HIGH (7.5) EPSS: 46.9% 1 exploit
iTop - User Enumeration via R…
CVE-2024-2876 6 months, 2 weeks ago

The Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'run' function of the 'IG_ES_Subscribers_Query' class in all versions up to, and including, 5.7.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CRITICAL (9.8) EPSS: 91.6% 1 exploit
Wordpress Email Subscribers b…
CVE-2024-2667 6 months, 2 weeks ago

The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation in the /wp-json/instawp-connect/v1/config REST API endpoint in all versions up to, and including, 0.1.0.22. This makes it possible for unauthenticated attackers to upload arbitrary files.

CRITICAL (9.8) EPSS: 83.6% 1 exploit
InstaWP Connect <= 0.1.0.22 -…
CVE-2024-2928 6 months, 2 weeks ago

A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically in version 2.9.2, which was fixed in version 2.11.3. This vulnerability arises from the application's failure to properly validate URI fragments for directory traversal sequences such as '../'. An attacker can exploit this flaw by manipulating the fragment part of the URI to read arbitrary files on the local file system, including sensitive files like '/etc/passwd'. The vulnerability is a bypass to a previous patch that only addressed similar manipulation within the URI's query string, highlighting the need for comprehensive validation of all parts of a URI to prevent LFI attacks.

HIGH (7.5) EPSS: 88.3% 1 exploit
MLflow < 2.11.3 - Path Traver…
CVE-2024-2879 6 months, 2 weeks ago

The LayerSlider plugin for WordPress is vulnerable to SQL Injection via the ls_get_popup_markup action in versions 7.9.11 and 7.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CRITICAL (9.8) EPSS: 93.5% 1 exploit
WordPress Plugin LayerSlider …
CVE-2024-2389 6 months, 2 weeks ago

In Flowmon versions prior to 11.1.14 and 12.3.5, an operating system command injection vulnerability has been identified.  An unauthenticated user can gain entry to the system via the Flowmon management interface, allowing for the execution of arbitrary system commands.

CRITICAL (10.0) EPSS: 94.3% 1 exploit
Progress Kemp Flowmon - Comma…
CVE-2024-7591 6 months, 2 weeks ago

Improper Input Validation vulnerability in Progress LoadMaster allows OS Command Injection.This issue affects: * LoadMaster: 7.2.40.0 and above * ECS: All versions * Multi-Tenancy: 7.1.35.4 and above

CRITICAL (10.0) EPSS: 34.7% 1 exploit
Kemp LoadMaster Load Balancer…
CVE-2024-7854 6 months, 2 weeks ago

The Woo Inquiry plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 0.1 due to insufficient escaping on the user supplied parameter 'dbid' and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CRITICAL (10.0) EPSS: 77.1% 1 exploit
Woo Inquiry <= 0.1 - SQL Inje…
CVE-2024-7314 6 months, 2 weeks ago

anji-plus AJ-Report is affected by an authentication bypass vulnerability. A remote and unauthenticated attacker can append ";swagger-ui" to HTTP requests to bypass authentication and execute arbitrary Java on the victim server.

CRITICAL (9.8) EPSS: 79.4% 1 exploit
AJ-Report < 1.4.1 - Remote Co…
CVE-2024-7593 6 months, 2 weeks ago

Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel.

CRITICAL (9.8) EPSS: 94.4% 1 exploit
Ivanti vTM - Authentication B…
CVE-2024-7954 6 months, 2 weeks ago

The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.

CRITICAL (9.8) EPSS: 93.8% 1 exploit
SPIP Porte Plume Plugin - Rem…
CVE-2024-7399 6 months, 2 weeks ago

Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1050 allows attackers to write arbitrary file as system authority.

HIGH (8.8) EPSS: 66.0% 1 exploit
Samsung MagicINFO 9 Server 21…
CVE-2024-39713 6 months, 2 weeks ago

A Server-Side Request Forgery (SSRF) affects Rocket.Chat's Twilio webhook endpoint before version 6.10.1.

HIGH (8.6) EPSS: 81.5% 1 exploit
Rocket.Chat - Server-Side Req…
CVE-2024-39914 6 months, 2 weeks ago

FOG is a cloning/imaging/rescue suite/inventory management system. Prior to 1.5.10.34, packages/web/lib/fog/reportmaker.class.php in FOG was affected by a command injection via the filename parameter to /fog/management/export.php. This vulnerability is fixed in 1.5.10.34.

CRITICAL (9.8) EPSS: 92.7% 1 exploit
FOG Project < 1.5.10.34 - Rem…