Nomisec Exploits

21,443 exploits tracked across all sources.

Sort: Activity Stars
CVE-2025-32463 NOMISEC CRITICAL
Sudo <1.9.17p1 - Privilege Escalation
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
by KaiHT-Ladiant
2 stars
CVSS 9.3
CVE-2024-55555 NOMISEC HIGH
Invoice Ninja <5.10.43 - RCE
Invoice Ninja before 5.10.43 allows remote code execution from a pre-authenticated route when an attacker knows the APP_KEY. This is exacerbated by .env files, available from the product's repository, that have default APP_KEY values. The route/{hash} route defined in the invoiceninja/routes/client.php file can be accessed without authentication. The parameter {hash} is passed to the function decrypt that expects a Laravel ciphered value containing a serialized object. (Furthermore, Laravel contains several gadget chains usable to trigger remote command execution from arbitrary deserialization.) Therefore, an attacker in possession of the APP_KEY is able to fully control a string passed to an unserialize function.
by Yucaerin
2 stars
CVSS 8.8
CVE-2016-5195 NOMISEC HIGH
Canonical Ubuntu Linux < 3.2.83 - Race Condition
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
by mohammadamin382
CVSS 7.0
CVE-2025-30406 NOMISEC CRITICAL
Gladinet CentreStack < 16.4.10315.56368 Use of Hard-coded Key Leads to Unauthenticated RCE
Gladinet CentreStack through 16.1.10296.56315 (fixed in 16.4.10315.56368) has a deserialization vulnerability due to the CentreStack portal's hardcoded machineKey use, as exploited in the wild in March 2025. This enables threat actors (who know the machineKey) to serialize a payload for server-side deserialization to achieve remote code execution. NOTE: a CentreStack admin can manually delete the machineKey defined in portal\web.config.
by mchklt
88 stars
CVSS 9.0
CVE-2016-4631 NOMISEC HIGH
Apple Iphone OS < 9.3.3 - Memory Corruption
ImageIO in Apple iOS before 9.3.3, OS X before 10.11.6, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted TIFF file.
by l3onkers
1 stars
CVSS 8.8
CVE-2022-34155 NOMISEC HIGH
miniOrange OAuth Single Sign On - Auth Bypass
Improper Authentication vulnerability in miniOrange OAuth Single Sign On – SSO (OAuth Client) plugin allows Authentication Bypass.This issue affects OAuth Single Sign On – SSO (OAuth Client): from n/a through 6.23.3.
by vanh-88
CVSS 8.8
CVE-2023-22894 NOMISEC MEDIUM
Strapi < 4.8.0 - Cleartext Storage
Strapi through 4.5.5 allows attackers (with access to the admin panel) to discover sensitive user details by exploiting the query filter. The attacker can filter users by columns that contain sensitive information and infer a value from API responses. If the attacker has super admin access, then this can be exploited to discover the password hash and password reset token of all users. If the attacker has admin panel access to an account with permission to access the username and email of API users with a lower privileged role (e.g., Editor or Author), then this can be exploited to discover sensitive information for all API users but not other admin accounts.
by maxntv
CVSS 4.9
CVE-2025-52289 NOMISEC HIGH
Magnussolution Magnusbilling - Improper Access Control
A Broken Access Control vulnerability in MagnusBilling v7.8.5.3 allows newly registered users to gain escalated privileges by sending a crafted request to /mbilling/index.php/user/save to set their account status fom "pending" to "active" without requiring administrator approval.
by Madhav-Bhardwaj
1 stars
CVSS 8.0
CVE-2025-52289 NOMISEC HIGH
Magnussolution Magnusbilling - Improper Access Control
A Broken Access Control vulnerability in MagnusBilling v7.8.5.3 allows newly registered users to gain escalated privileges by sending a crafted request to /mbilling/index.php/user/save to set their account status fom "pending" to "active" without requiring administrator approval.
by Whit3-d3viL-hacker
CVSS 8.0
CVE-2025-29556 NOMISEC HIGH
ExaGrid EX10 <7.0.1.P08 - Privilege Escalation
ExaGrid EX10 6.3 - 7.0.1.P08 is vulnerable to Incorrect Access Control. Since version 6.3, ExaGrid enforces restrictions preventing users with the Admin role from creating or modifying users with the Security Officer role without approval. However, a flaw in the account creation process allows an attacker to bypass these restrictions via API request manipulation. An attacker with an Admin access can intercept and modify the API request during user creation, altering the parameters to assign the new account to the ExaGrid Security Officers group without the required approval.
by 0xsu3ks
CVSS 7.3
CVE-2024-34327 NOMISEC MEDIUM
Sielox AnyWare <2.1.2 - SQL Injection
Sielox AnyWare v2.1.2 was discovered to contain a SQL injection vulnerability via the email address field of the password reset form.
by 0xsu3ks
CVSS 6.5
CVE-2025-5394 NOMISEC CRITICAL
Alone - Charity Multipurpose Non-profit WordPress Theme <7.8.3 - RCE
The Alone – Charity Multipurpose Non-profit WordPress Theme theme for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the alone_import_pack_install_plugin() function in all versions up to, and including, 7.8.3. This makes it possible for unauthenticated attackers to upload zip files containing webshells disguised as plugins from remote locations to achieve remote code execution. CVE-2025-54019 is likely a duplicate of this.
by fokda-prodz
3 stars
CVSS 9.8
CVE-2022-44268 NOMISEC MEDIUM
ImageMagick 7.1.0-49 - Info Disclosure
ImageMagick 7.1.0-49 is vulnerable to Information Disclosure. When it parses a PNG image (e.g., for resize), the resulting image could have embedded the content of an arbitrary. file (if the magick binary has permissions to read it).
by mouftan
CVSS 6.5
CVE-2023-0159 NOMISEC HIGH
Extensive VC Addons for WPBakery <1.9.1 - Info Disclosure
The Extensive VC Addons for WPBakery page builder WordPress plugin before 1.9.1 does not validate a parameter passed to the php extract function when loading templates, allowing an unauthenticated attacker to override the template path to read arbitrary files from the hosts file system. This may be escalated to RCE using PHP filter chains.
by Sn20393873
CVSS 7.5
CVE-2025-27591 NOMISEC MEDIUM
Facebook Below < 0.9.0 - Incorrect Permission Assignment
A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.
by Cythonic1
3 stars
CVSS 6.8
CVE-2024-45352 NOMISEC HIGH
Xiaomi smarthome - RCE
An code execution vulnerability exists in the Xiaomi smarthome application product. The vulnerability is caused by improper input validation and can be exploited by attackers to execute malicious code.
by Edwins907
1 stars
CVSS 8.8
CVE-2025-33073 NOMISEC HIGH
Windows SMB - Privilege Escalation
Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.
by matejsmycka
CVSS 8.8
CVE-2025-51482 NOMISEC HIGH
Letta <0.7.12 - RCE
Remote Code Execution in letta.server.rest_api.routers.v1.tools.run_tool_from_source in letta-ai Letta 0.7.12 allows remote attackers to execute arbitrary Python code and system commands via crafted payloads to the /v1/tools/run endpoint, bypassing intended sandbox restrictions.
by Kai-One001
CVSS 8.8
CVE-2025-50340 NOMISEC MEDIUM
SOGo Webmail <5.6.0 - Privilege Escalation
An Insecure Direct Object Reference (IDOR) vulnerability was discovered in SOGo Webmail thru 5.6.0, allowing an authenticated user to send emails on behalf of other users by manipulating a user-controlled identifier in the email-sending request. The server fails to verify whether the authenticated user is authorized to use the specified sender identity, resulting in unauthorized message delivery as another user. This can lead to impersonation, phishing, or unauthorized communication within the system. NOTE: this is disputed by the Supplier because the only effective way to prevent this sender spoofing is on the SMTP server, not within a client such as SOGo.
by millad7
CVSS 4.3
CVE-2025-50341 NOMISEC CRITICAL
Axelor 5.2.4 - SQL Injection
A Boolean-based SQL injection vulnerability was discovered in Axelor 5.2.4 via the _domain parameter. An attacker can manipulate the SQL query logic and determine true/false conditions, potentially leading to data exposure or further exploitation.
by millad7
CVSS 9.8
CVE-2024-3552 NOMISEC CRITICAL
Web Directory Free WP <1.7.0 - SQL Injection
The Web Directory Free WordPress plugin before 1.7.0 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection with different techniques like UNION, Time-Based and Error-Based.
by KiPhuong
CVSS 9.8
CVE-2023-42931 NOMISEC HIGH
macOS < Ventura 13.6.3 - Privilege Escalation
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.2, macOS Monterey 12.7.2. A process may gain admin privileges without proper authentication.
by tageniu
5 stars
CVSS 7.8
CVE-2023-22493 NOMISEC HIGH
Rsshub < 2023-01-10 - SSRF
RSSHub is an open source RSS feed generator. RSSHub is vulnerable to Server-Side Request Forgery (SSRF) attacks. This vulnerability allows an attacker to send arbitrary HTTP requests from the server to other servers or resources on the network. An attacker can exploit this vulnerability by sending a request to the affected routes with a malicious URL. An attacker could also use this vulnerability to send requests to internal or any other servers or resources on the network, potentially gain access to sensitive information that would not normally be accessible and amplifying the impact of the attack. The patch for this issue can be found in commit a66cbcf.
by buitanhung144
CVSS 8.8
CVE-2025-27581 NOMISEC MEDIUM
NIH BRICS <14.0.0-67 - Info Disclosure
NIH BRICS (aka Biomedical Research Informatics Computing System) through 14.0.0-67 allows users who lack the InET role to access the InET module via direct requests to known endpoints.
by Henryisnotavailable
CVSS 4.3
CVE-2025-45346 NOMISEC HIGH
Bacula-web < 9.7.1 - SQL Injection
SQL Injection vulnerability in Bacula-web before v.9.7.1 allows a remote attacker to execute arbitrary code via a crafted HTTP GET request.
by 0xsu3ks
CVSS 8.1