Loading HuntDB...

High-Impact Vulnerabilities

Critical + High Exploit High EPSS

Vulnerabilities that meet all three criteria: Critical/High severity, known exploits, and high probability of exploitation (EPSS ≥ 10%).

CVE-2024-39903 6 months, 2 weeks ago

Solara is a pure Python, React-style framework for scaling Jupyter and web apps. A Local File Inclusion (LFI) vulnerability was identified in widgetti/solara, in version <1.35.1, which was fixed in version 1.35.1. This vulnerability arises from the application's failure to properly validate URI fragments for directory traversal sequences such as '../' when serving static files. An attacker can exploit this flaw by manipulating the fragment part of the URI to read arbitrary files on the local file system.

HIGH (8.6) EPSS: 19.2% 1 exploit
Solara <1.35.1 - Local File I…
CVE-2024-52433 6 months, 2 weeks ago

Deserialization of Untrusted Data vulnerability in Mindstien Technologies My Geo Posts Free allows Object Injection.This issue affects My Geo Posts Free: from n/a through 1.2.

CRITICAL (9.8) EPSS: 77.3% 1 exploit
My Geo Posts Free <= 1.2 - PH…
CVE-2024-50603 6 months, 2 weeks ago

An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.

CRITICAL (10.0) EPSS: 94.4% 1 exploit
Aviatrix Controller - Remote …
CVE-2024-50340 6 months, 2 weeks ago

symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the `register_argv_argc` php directive is set to `on` , and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request. As of versions 5.4.46, 6.4.14, and 7.1.7 the `SymfonyRuntime` now ignores the `argv` values for non-SAPI PHP runtimes. All users are advised to upgrade. There are no known workarounds for this vulnerability.

HIGH (7.3) EPSS: 85.5% 1 exploit
Symfony Profiler - Remote Acc…
CVE-2024-50498 6 months, 2 weeks ago

Improper Control of Generation of Code ('Code Injection') vulnerability in LUBUS WP Query Console allows Code Injection.This issue affects WP Query Console: from n/a through 1.0.

CRITICAL (10.0) EPSS: 92.6% 1 exploit
WP Query Console <= 1.0 - Rem…
CVE-2024-5827 6 months, 2 weeks ago

Vanna v0.3.4 is vulnerable to SQL injection in its DuckDB integration exposed to its Flask Web APIs. Attackers can inject malicious SQL training data and generate corresponding queries to write arbitrary files on the victim's file system, such as backdoor.php with contents `<?php system($_GET[0]); ?>`. This can lead to command execution or the creation of backdoors.

CRITICAL (9.8) EPSS: 46.2% 1 exploit
Vanna - SQL injection
CVE-2024-5276 6 months, 2 weeks ago

A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data.  Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required. This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier.

CRITICAL (9.8) EPSS: 87.3% 1 exploit
Fortra FileCatalyst Workflow …
CVE-2024-5084 6 months, 2 weeks ago

The Hash Form – Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

CRITICAL (9.8) EPSS: 90.8% 1 exploit
Hash Form <= 1.1.0 - Arbitrar…
CVE-2024-5315 6 months, 2 weeks ago

Vulnerabilities in Dolibarr ERP - CRM that affect version 9.0.1 and allow SQL injection. These vulnerabilities could allow a remote attacker to send a specially crafted SQL query to the system and retrieve all the information stored in the database through the parameters viewstatut in /dolibarr/commande/list.php.

CRITICAL (9.1) EPSS: 36.0% 1 exploit
Dolibarr ERP CMS `list.php` -…
CVE-2024-11728 6 months, 2 weeks ago

The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'visit_type[service_id]' parameter of the tax_calculated_data AJAX action in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

HIGH (7.5) EPSS: 49.9% 1 exploit
KiviCare Clinic & Patient Man…
CVE-2024-1483 6 months, 2 weeks ago

A path traversal vulnerability exists in mlflow/mlflow version 2.9.2, allowing attackers to access arbitrary files on the server. By crafting a series of HTTP POST requests with specially crafted 'artifact_location' and 'source' parameters, using a local URI with '#' instead of '?', an attacker can traverse the server's directory structure. The issue occurs due to insufficient validation of user-supplied input in the server's handlers.

HIGH (7.5) EPSS: 73.3% 1 exploit
Mlflow < 2.9.2 - Path Travers…
CVE-2024-1061 6 months, 2 weeks ago

The 'HTML5 Video Player' WordPress Plugin, version < 2.5.25 is affected by an unauthenticated SQL injection vulnerability in the 'id' parameter in the  'get_view' function.

HIGH (8.6) EPSS: 84.5% 1 exploit
WordPress HTML5 Video Player …
CVE-2024-1698 6 months, 2 weeks ago

The NotificationX – Best FOMO, Social Proof, WooCommerce Sales Popup & Notification Bar Plugin With Elementor plugin for WordPress is vulnerable to SQL Injection via the 'type' parameter in all versions up to, and including, 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CRITICAL (9.8) EPSS: 93.9% 1 exploit
NotificationX <= 2.8.2 - SQL …
CVE-2024-1212 6 months, 2 weeks ago

Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.

CRITICAL (10.0) EPSS: 94.3% 1 exploit
Progress Kemp LoadMaster - Co…
CVE-2024-1512 6 months, 2 weeks ago

The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to union based SQL Injection via the 'user' parameter of the /lms/stm-lms/order/items REST route in all versions up to, and including, 3.2.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CRITICAL (9.8) EPSS: 93.9% 1 exploit
MasterStudy LMS WordPress Plu…
CVE-2024-1709 6 months, 2 weeks ago

ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.

CRITICAL (10.0) EPSS: 94.3% 1 exploit
ConnectWise ScreenConnect 23.…
CVE-2024-1728 6 months, 2 weeks ago

gradio-app/gradio is vulnerable to a local file inclusion vulnerability due to improper validation of user-supplied input in the UploadButton component. Attackers can exploit this vulnerability to read arbitrary files on the filesystem, such as private SSH keys, by manipulating the file path in the request to the `/queue/join` endpoint. This issue could potentially lead to remote code execution. The vulnerability is present in the handling of file upload paths, allowing attackers to redirect file uploads to unintended locations on the server.

HIGH (7.5) EPSS: 68.1% 1 exploit
Gradio > 4.19.1 UploadButton …
CVE-2024-1561 6 months, 2 weeks ago

An issue was discovered in gradio-app/gradio, where the `/component_server` endpoint improperly allows the invocation of any method on a `Component` class with attacker-controlled arguments. Specifically, by exploiting the `move_resource_to_block_cache()` method of the `Block` class, an attacker can copy any file on the filesystem to a temporary directory and subsequently retrieve it. This vulnerability enables unauthorized local file read access, posing a significant risk especially when the application is exposed to the internet via `launch(share=True)`, thereby allowing remote attackers to read files on the host machine. Furthermore, gradio apps hosted on `huggingface.co` are also affected, potentially leading to the exposure of sensitive information such as API keys and credentials stored in environment variables.

HIGH (7.5) EPSS: 93.8% 1 exploit
Gradio 4.3-4.12 - Local File …
CVE-2024-24809 6 months, 2 weeks ago

Traccar is an open source GPS tracking system. Versions prior to 6.0 are vulnerable to path traversal and unrestricted upload of file with dangerous type. Since the system allows registration by default, attackers can acquire ordinary user permissions by registering an account and exploit this vulnerability to upload files with the prefix `device.` under any folder. Attackers can use this vulnerability for phishing, cross-site scripting attacks, and potentially execute arbitrary commands on the server. Version 6.0 contains a patch for the issue.

HIGH (8.5) EPSS: 89.2% 1 exploit
Traccar - Unrestricted File U…
CVE-2024-24759 6 months, 2 weeks ago

MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 23.12.4.2, a threat actor can bypass the server-side request forgery protection on the whole website with DNS Rebinding. The vulnerability can also lead to denial of service. Version 23.12.4.2 contains a patch.

CRITICAL (9.3) EPSS: 44.2% 1 exploit
MindsDB -DNS Rebinding SSRF P…