Loading HuntDB...

High-Impact Vulnerabilities

Critical + High Exploit High EPSS

Vulnerabilities that meet all three criteria: Critical/High severity, known exploits, and high probability of exploitation (EPSS ≥ 10%).

CVE-2023-6875 6 months, 2 weeks ago

The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint in all versions up to, and including, 2.8.7. This makes it possible for unauthenticated attackers to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover.

CRITICAL (9.8) EPSS: 93.8% 1 exploit
WordPress POST SMTP Mailer <=…
CVE-2023-6021 6 months, 2 weeks ago

LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023

HIGH (7.5) EPSS: 86.4% 1 exploit
Ray API - Local File Inclusion
CVE-2023-6567 6 months, 2 weeks ago

The LearnPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order_by’ parameter in all versions up to, and including, 4.2.5.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CRITICAL (9.8) EPSS: 86.3% 1 exploit
LearnPress <= 4.2.5.7 - SQL I…
CVE-2023-6977 6 months, 2 weeks ago

This vulnerability enables malicious users to read sensitive files on the server.

CRITICAL (10.0) EPSS: 83.6% 1 exploit
Mlflow <2.8.0 - Local File In…
CVE-2023-6634 6 months, 2 weeks ago

The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.

HIGH (8.1) EPSS: 91.2% 1 exploit
LearnPress < 4.2.5.8 - Remote…
CVE-2023-6553 6 months, 2 weeks ago

The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server.

CRITICAL (9.8) EPSS: 93.1% 1 exploit
Worpress Backup Migration <= …
CVE-2023-6023 6 months, 2 weeks ago

An attacker can read any file on the filesystem on the server hosting ModelDB through an LFI in the artifact_path URL parameter.

HIGH (8.6) EPSS: 50.5% 1 exploit
VertaAI ModelDB - Path Traver…
CVE-2023-6018 6 months, 2 weeks ago

An attacker can overwrite any file on the server hosting MLflow without any authentication.

CRITICAL (10.0) EPSS: 88.4% 1 exploit
Mlflow - Arbitrary File Write
CVE-2023-6909 6 months, 2 weeks ago

Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2.

HIGH (7.5) EPSS: 86.8% 1 exploit
Mlflow <2.9.2 - Path Traversal
CVE-2023-6831 6 months, 2 weeks ago

Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2.

HIGH (8.1) EPSS: 80.4% 1 exploit
mlflow - Path Traversal
CVE-2023-6360 6 months, 2 weeks ago

The 'My Calendar' WordPress Plugin, version < 3.4.22 is affected by an unauthenticated SQL injection vulnerability in the 'from' and 'to' parameters in the '/my-calendar/v1/events' rest route.

HIGH (8.6) EPSS: 84.6% 1 exploit
WordPress My Calendar <3.4.22…
CVE-2023-6989 6 months, 2 weeks ago

The Shield Security – Smart Bot Blocking & Intrusion Prevention Security plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 18.5.9 via the render_action_template parameter. This makes it possible for unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files.

CRITICAL (9.8) EPSS: 60.9% 1 exploit
Shield Security WP Plugin <= …
CVE-2023-6038 6 months, 2 weeks ago

A Local File Inclusion (LFI) vulnerability exists in the h2o-3 REST API, allowing unauthenticated remote attackers to read arbitrary files on the server with the permissions of the user running the h2o-3 instance. This issue affects the default installation and does not require user interaction. The vulnerability can be exploited by making specific GET or POST requests to the ImportFiles and ParseSetup endpoints, respectively. This issue was identified in version 3.40.0.4 of h2o-3.

CRITICAL (9.3) EPSS: 57.4% 1 exploit
H2O ImportFiles - Local File …
CVE-2023-45136 6 months, 2 weeks ago

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. When document names are validated according to a name strategy (disabled by default), XWiki starting in version 12.0-rc-1 and prior to versions 12.10.12 and 15.5-rc-1 is vulnerable to a reflected cross-site scripting attack in the page creation form. This allows an attacker to execute arbitrary actions with the rights of the user opening the malicious link. Depending on the rights of the user, this may allow remote code execution and full read and write access to the whole XWiki installation. This has been patched in XWiki 14.10.12 and 15.5-rc-1 by adding appropriate escaping. The vulnerable template file `createinline.vm` is part of XWiki's WAR and can be patched by manually applying the changes from the fix.

CRITICAL (9.7) EPSS: 60.2% 1 exploit
XWiki < 14.10.14 - Cross-Site…
CVE-2023-29439 6 months, 2 weeks ago

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FooPlugins FooGallery plugin <= 2.2.35 versions.

HIGH (7.1) EPSS: 55.9% 1 exploit
FooGallery plugin <= 2.2.35 -…
CVE-2023-29357 6 months, 2 weeks ago

No description available

CRITICAL (9.8) EPSS: 94.4% 1 exploit
Microsoft SharePoint - Authen…
CVE-2023-0562 6 months, 2 weeks ago

A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219716.

HIGH (7.3) EPSS: 75.3% 1 exploit
Bank Locker Management System…
CVE-2023-0947 6 months, 2 weeks ago

Path Traversal in GitHub repository flatpressblog/flatpress prior to 1.3.

HIGH (8.1) EPSS: 75.9% 1 exploit
Flatpress < 1.3 - Path Traver…
CVE-2023-36845 6 months, 2 weeks ago

A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.

CRITICAL (9.8) EPSS: 94.4% 1 exploit
Juniper J-Web - Remote Code E…
CVE-2023-37979 6 months, 2 weeks ago

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Saturday Drive Ninja Forms Contact Form plugin <= 3.6.25 versions.

HIGH (7.1) EPSS: 43.5% 1 exploit
Ninja Forms < 3.6.26 - Cross-…