EPSS CVE Percentile Date
0.945840000 CVE-2023-42793 1.000000000 2025-06-25
In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible Reference: http://packetstormsecurity.com/files/174860/JetBrains-TeamCity-Unauthenticated-Remote-Code-Execution.html
0.945770000 CVE-2024-27198 1.000000000 2025-06-25
In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible Reference: https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive
0.945320000 CVE-2023-23752 1.000000000 2025-06-25
An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints. Reference: https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html
0.945160000 CVE-2023-44487 0.999990000 2025-06-25
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. Reference: http://www.openwall.com/lists/oss-security/2023/10/10/6
0.944890000 CVE-2024-27199 0.999990000 2025-06-25
In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible Reference: https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive
0.944890000 CVE-2018-7600 0.999990000 2025-06-25
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations. Reference: http://www.securityfocus.com/bid/103534
0.944870000 CVE-2022-22965 0.999980000 2025-06-25
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. Reference: http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html
0.944870000 CVE-2018-1000861 0.999980000 2025-06-25
A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way. Reference: http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html
0.944860000 CVE-2019-3396 0.999980000 2025-06-25
The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection. Reference: http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html
0.944850000 CVE-2023-35078 0.999970000 2025-06-25
An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication. Reference: https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability