Loading HuntDB...

High-Impact Vulnerabilities

Critical + High Exploit High EPSS

Vulnerabilities that meet all three criteria: Critical/High severity, known exploits, and high probability of exploitation (EPSS ≥ 10%).

CVE-2024-32737 6 months, 2 weeks ago

A sql injection vulnerability exists in CyberPower PowerPanel Enterprise prior to v2.8.3. An unauthenticated remote attacker can leak sensitive information via the "query_contract_result" function within MCUDBHelper.

HIGH (7.5) EPSS: 31.3% 1 exploit
CyberPower - SQL Injection
CVE-2024-32738 6 months, 2 weeks ago

A sql injection vulnerability exists in CyberPower PowerPanel Enterprise prior to v2.8.3. An unauthenticated remote attacker can leak sensitive information via the "query_ptask_lean" function within MCUDBHelper.

HIGH (7.5) EPSS: 31.3% 1 exploit
CyberPower - SQL Injection
CVE-2024-32739 6 months, 2 weeks ago

A sql injection vulnerability exists in CyberPower PowerPanel Enterprise prior to v2.8.3. An unauthenticated remote attacker can leak sensitive information via the "query_ptask_verbose" function within MCUDBHelper.

HIGH (7.5) EPSS: 55.6% 1 exploit
CyberPower < v2.8.3 - SQL Inj…
CVE-2024-32651 6 months, 2 weeks ago

changedetection.io is an open source web page change detection, website watcher, restock monitor and notification service. There is a Server Side Template Injection (SSTI) in Jinja2 that allows Remote Command Execution on the server host. Attackers can run any system command without any restriction and they could use a reverse shell. The impact is critical as the attacker can completely takeover the server machine. This can be reduced if changedetection is behind a login page, but this isn't required by the application (not by default and not enforced).

CRITICAL (10.0) EPSS: 92.5% 1 exploit
Change Detection - Server Sid…
CVE-2024-32735 6 months, 2 weeks ago

An issue regarding missing authentication for certain utilities exists in CyberPower PowerPanel Enterprise prior to v2.8.3. An unauthenticated remote attacker can access the PDNU REST APIs, which may result in compromise of the application.

CRITICAL (9.8) EPSS: 54.1% 1 exploit
CyberPower - Missing Authenti…
CVE-2024-32736 6 months, 2 weeks ago

A sql injection vulnerability exists in CyberPower PowerPanel Enterprise prior to v2.8.3. An unauthenticated remote attacker can leak sensitive information via the "query_utask_verbose" function within MCUDBHelper.

HIGH (7.5) EPSS: 31.3% 1 exploit
CyberPower < v2.8.3 - SQL Inj…
CVE-2024-32964 6 months, 2 weeks ago

Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Prior to 0.150.6, lobe-chat had an unauthorized Server-Side Request Forgery vulnerability in the /api/proxy endpoint. An attacker can construct malicious requests to cause Server-Side Request Forgery without logging in, attack intranet services, and leak sensitive information.

CRITICAL (9.0) EPSS: 24.5% 1 exploit
Lobe Chat <= v0.150.5 - Serve…
CVE-2024-32709 6 months, 2 weeks ago

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.

CRITICAL (9.3) EPSS: 89.1% 1 exploit
WP-Recall <= 16.26.5 - SQL In…
CVE-2024-43917 6 months, 2 weeks ago

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TemplateInvaders TI WooCommerce Wishlist allows SQL Injection.This issue affects TI WooCommerce Wishlist: from n/a through 2.8.2.

CRITICAL (9.3) EPSS: 82.0% 1 exploit
WordPress TI WooCommerce Wish…
CVE-2024-43360 6 months, 2 weeks ago

ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder is affected by a time-based SQL Injection vulnerability. This vulnerability is fixed in 1.36.34 and 1.37.61.

CRITICAL (9.8) EPSS: 55.2% 1 exploit
ZoneMinder - SQL Injection
CVE-2024-43160 6 months, 2 weeks ago

Unrestricted Upload of File with Dangerous Type vulnerability in BerqWP allows Code Injection.This issue affects BerqWP: from n/a through 1.7.6.

CRITICAL (10.0) EPSS: 70.2% 1 exploit
BerqWP <= 1.7.6 - Arbitrary F…
CVE-2024-40711 6 months, 2 weeks ago

A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE).

CRITICAL (9.8) EPSS: 49.7% 1 exploit
Veeam Backup & Replication - …
CVE-2024-41667 6 months, 2 weeks ago

OpenAM is an open access management solution. In versions 15.0.3 and prior, the `getCustomLoginUrlTemplate` method in RealmOAuth2ProviderSettings.java is vulnerable to template injection due to its usage of user input. Although the developer intended to implement a custom URL for handling login to override the default OpenAM login, they did not restrict the `CustomLoginUrlTemplate`, allowing it to be set freely. Commit fcb8432aa77d5b2e147624fe954cb150c568e0b8 introduces `TemplateClassResolver.SAFER_RESOLVER` to disable the resolution of commonly exploited classes in FreeMarker template injection. As of time of publication, this fix is expected to be part of version 15.0.4.

HIGH (8.8) EPSS: 39.9% 1 exploit
OpenAM<=15.0.3 FreeMarker - T…
CVE-2024-8181 6 months, 2 weeks ago

An Authentication Bypass vulnerability exists in Flowise version 1.8.2. This could allow a remote, unauthenticated attacker to access API endpoints as an administrator and allow them to access restricted functionality.

CRITICAL (9.8) EPSS: 71.3% 1 exploit
Flowise <= 1.8.2 Authenticati…
CVE-2024-8484 6 months, 2 weeks ago

The REST API TO MiniProgram plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the /wp-json/watch-life-net/v1/comment/getcomments REST API endpoint in all versions up to, and including, 4.7.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

HIGH (7.5) EPSS: 73.7% 1 exploit
REST API TO MiniProgram <= 4.…
CVE-2024-8529 6 months, 2 weeks ago

The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to SQL Injection via the 'c_fields' parameter of the /wp-json/lp/v1/courses/archive-course REST API endpoint in all versions up to, and including, 4.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CRITICAL (10.0) EPSS: 62.6% 1 exploit
LearnPress < 4.2.7.1 - SQL In…
CVE-2024-8963 6 months, 2 weeks ago

Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality.

CRITICAL (9.4) EPSS: 94.3% 1 exploit
Ivanti Cloud Services Applian…
CVE-2024-8522 6 months, 2 weeks ago

The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to SQL Injection via the 'c_only_fields' parameter of the /wp-json/learnpress/v1/courses REST API endpoint in all versions up to, and including, 4.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CRITICAL (10.0) EPSS: 83.0% 1 exploit
LearnPress < 4.2.7.1 - SQL In…
CVE-2024-8856 6 months, 2 weeks ago

The Backup and Staging by WP Time Capsule plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the the UploadHandler.php file and no direct file access prevention in all versions up to, and including, 1.22.21. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

CRITICAL (9.8) EPSS: 91.9% 1 exploit
WP Time Capsule Plugin - Remo…
CVE-2024-4443 6 months, 2 weeks ago

The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘listingfields’ parameter in all versions up to, and including, 6.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CRITICAL (9.8) EPSS: 93.4% 1 exploit
Business Directory Plugin <= …