ly1g3

3 exploits Active since May 2022
CVE-2022-31245 NOMISEC HIGH WORKING POC
mailcow <2022-05d - Command Injection
mailcow before 2022-05d allows a remote authenticated user to inject OS commands and escalate privileges to domain admin via the --debug option in conjunction with the ---PIPEMESS option in Sync Jobs.
12 stars
CVSS 8.8
CVE-2022-35131 NOMISEC CRITICAL WORKING POC
Joplin < 2.9.1 - XSS
Joplin v2.8.8 allows attackers to execute arbitrary commands via a crafted payload injected into the Node titles.
3 stars
CVSS 9.0
CVE-2022-31138 NOMISEC HIGH WORKING POC
mailcow <2022-06a - Privilege Escalation
mailcow is a mailserver suite. Prior to mailcow-dockerized version 2022-06a, an extended privilege vulnerability can be exploited by manipulating the custom parameters regexmess, skipmess, regexflag, delete2foldersonly, delete2foldersbutnot, regextrans2, pipemess, or maxlinelengthcmd to execute arbitrary code. Users should update their mailcow instances with the `update.sh` script in the mailcow root directory to 2022-06a or newer to receive a patch for this issue. As a temporary workaround, the Syncjob ACL can be removed from all mailbox users, preventing changes to those settings.
2 stars
CVSS 8.8