Loading HuntDB...

High-Impact Vulnerabilities

Critical + High Exploit High EPSS

Vulnerabilities that meet all three criteria: Critical/High severity, known exploits, and high probability of exploitation (EPSS ≥ 10%).

CVE-2024-4885 6 months, 2 weeks ago

In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold.  The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges.

CRITICAL (9.8) EPSS: 94.3% 1 exploit
Progress Software WhatsUp Gol…
CVE-2024-4956 6 months, 2 weeks ago

Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1.

HIGH (7.5) EPSS: 93.9% 1 exploit
Sonatype Nexus Repository Man…
CVE-2024-4434 6 months, 2 weeks ago

The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the ‘term_id’ parameter in versions up to, and including, 4.2.6.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CRITICAL (9.8) EPSS: 73.2% 1 exploit
LearnPress WordPress LMS Plug…
CVE-2024-4836 6 months, 2 weeks ago

Web services managed by Edito CMS (Content Management System) in versions from 3.5 through 3.25 leak sensitive data as they allow downloading configuration files by an unauthenticated user. The issue in versions 3.5 - 3.25 was removed in releases which dates from 10th of January 2014. Higher versions were never affected.

HIGH (7.5) EPSS: 28.6% 1 exploit
Edito CMS - Sensitive Data Le…
CVE-2024-4295 6 months, 2 weeks ago

The Email Subscribers by Icegram Express plugin for WordPress is vulnerable to SQL Injection via the ‘hash’ parameter in all versions up to, and including, 5.7.20 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CRITICAL (9.8) EPSS: 84.4% 1 exploit
Email Subscribers by Icegram …
CVE-2024-4439 6 months, 2 weeks ago

WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar.

HIGH (7.2) EPSS: 90.8% 1 exploit
WordPress Core <6.5.2 - Cross…
CVE-2024-4358 6 months, 2 weeks ago

In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.

CRITICAL (9.8) EPSS: 94.3% 1 exploit
Progress Telerik Report Serve…
CVE-2024-4340 6 months, 2 weeks ago

Passing a heavily nested list to sqlparse.parse() leads to a Denial of Service due to RecursionError.

HIGH (7.5) EPSS: 12.8% 1 exploit
sqlparse - Denial of Service
CVE-2024-25600 6 months, 2 weeks ago

Improper Control of Generation of Code ('Code Injection') vulnerability in Codeer Limited Bricks Builder allows Code Injection.This issue affects Bricks Builder: from n/a through 1.9.6.

CRITICAL (10.0) EPSS: 93.9% 1 exploit
Unauthenticated Remote Code E…
CVE-2023-44353 6 months, 2 weeks ago

Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.

CRITICAL (9.8) EPSS: 92.1% 1 exploit
Adobe ColdFusion WDDX Deseria…
CVE-2023-34039 6 months, 2 weeks ago

Aria Operations for Networks contains an Authentication Bypass vulnerability due to a lack of unique cryptographic key generation. A malicious actor with network access to Aria Operations for Networks could bypass SSH authentication to gain access to the Aria Operations for Networks CLI.

CRITICAL (9.8) EPSS: 93.2% 1 exploit
VMWare Aria Operations - Remo…
CVE-2023-30777 6 months, 2 weeks ago

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WP Engine Advanced Custom Fields Pro, WP Engine Advanced Custom Fields plugins <= 6.1.5 versions.

HIGH (7.1) EPSS: 88.7% 1 exploit
Advanced Custom Fields < 6.1.…
CVE-2023-30868 6 months, 2 weeks ago

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Jon Christopher CMS Tree Page View plugin <= 1.6.7 versions.

HIGH (7.1) EPSS: 56.9% 1 exploit
Tree Page View Plugin < 1.6.7…
CVE-2023-30625 6 months, 2 weeks ago

rudder-server is part of RudderStack, an open source Customer Data Platform (CDP). Versions of rudder-server prior to 1.3.0-rc.1 are vulnerable to SQL injection. This issue may lead to Remote Code Execution (RCE) due to the `rudder` role in PostgresSQL having superuser permissions by default. Version 1.3.0-rc.1 contains patches for this issue.

HIGH (8.8) EPSS: 89.9% 1 exploit
Rudder Server < 1.3.0-rc.1 -…
CVE-2023-27482 6 months, 2 weeks ago

homeassistant is an open source home automation tool. A remotely exploitable vulnerability bypassing authentication for accessing the Supervisor API through Home Assistant has been discovered. This impacts all Home Assistant installation types that use the Supervisor 2023.01.1 or older. Installation types, like Home Assistant Container (for example Docker), or Home Assistant Core manually in a Python environment, are not affected. The issue has been mitigated and closed in Supervisor version 2023.03.1, which has been rolled out to all affected installations via the auto-update feature of the Supervisor. This rollout has been completed at the time of publication of this advisory. Home Assistant Core 2023.3.0 included mitigation for this vulnerability. Upgrading to at least that version is thus advised. In case one is not able to upgrade the Home Assistant Supervisor or the Home Assistant Core application at this time, it is advised to not expose your Home Assistant instance to the internet.

CRITICAL (10.0) EPSS: 87.3% 1 exploit
Home Assistant Supervisor - A…
CVE-2023-27587 6 months, 2 weeks ago

ReadtoMyShoe, a web app that lets users upload articles and listen to them later, generates an error message containing sensitive information prior to commit 8533b01. If an error occurs when adding an article, the website shows the user an error message. If the error originates from the Google Cloud TTS request, then it will include the full URL of the request. The request URL contains the Google Cloud API key. This has been patched in commit 8533b01. Upgrading should be accompanied by deleting the current GCP API key and issuing a new one. There are no known workarounds.

HIGH (7.4) EPSS: 84.3% 1 exploit
ReadToMyShoe - Generation of …
CVE-2023-27034 6 months, 2 weeks ago

PrestaShop jmsblog 2.5.5 was discovered to contain a SQL injection vulnerability.

CRITICAL (9.8) EPSS: 89.8% 1 exploit
Jms Blog - SQL Injection
CVE-2023-27350 6 months, 2 weeks ago

This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.

CRITICAL (9.8) EPSS: 94.3% 1 exploit
PaperCut - Unauthenticated Re…
CVE-2023-27524 6 months, 2 weeks ago

Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config. All superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database. Add a strong SECRET_KEY to your `superset_config.py` file like: SECRET_KEY = <YOUR_OWN_RANDOM_GENERATED_SECRET_KEY> Alternatively you can set it with `SUPERSET_SECRET_KEY` environment variable.

HIGH (8.9) EPSS: 80.3% 2 exploits
Apache Superset - Authenticat… Piwigo 13.7.0 - SQL Injection
CVE-2023-6020 6 months, 2 weeks ago

LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication.

HIGH (7.5) EPSS: 83.5% 1 exploit
Ray Static File - Local File …