Nomisec Exploits

21,591 exploits tracked across all sources.

Sort: Activity Stars
CVE-2023-39362 NOMISEC HIGH
Cacti < 1.2.25 - Command Injection
Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, under certain conditions, an authenticated privileged user, can use a malicious string in the SNMP options of a Device, performing command injection and obtaining remote code execution on the underlying server. The `lib/snmp.php` file has a set of functions, with similar behavior, that accept in input some variables and place them into an `exec` call without a proper escape or validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
by m3ssap0
CVSS 7.2
CVE-2024-40457 NOMISEC CRITICAL
No-IP DUC v3.x - Info Disclosure
No-IP Dynamic Update Client (DUC) v3.x uses cleartext credentials that may occur on a command line or in a file. NOTE: the vendor's position is that cleartext in /etc/default/noip-duc is recommended and is the intentional behavior.
by jeppojeps
1 stars
CVSS 9.1
CVE-2024-0311 NOMISEC MEDIUM
Skyhigh Client Proxy - Privilege Escalation
A malicious insider can bypass the existing policy of Skyhigh Client Proxy without a valid release code.
by calligraf0
9 stars
CVSS 5.5
CVE-2023-40297 NOMISEC HIGH
Stakater Forecastle - Path Traversal
Stakater Forecastle 1.0.139 and before allows %5C../ directory traversal in the website component.
by sahar042
CVSS 7.5
CVE-2022-29380 NOMISEC MEDIUM
Academy-LMS v4.3 - XSS
Academy-LMS v4.3 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the SEO panel.
by OpenXP-Research
CVSS 4.8
CVE-2023-41425 NOMISEC MEDIUM
WonderCMS Remote Code Execution
Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component.
by h3athen
CVSS 6.1
CVE-2024-38821 NOMISEC CRITICAL
Org.springframework.security Spring-s... - Resource Allocation Without Limits
Spring WebFlux applications that have Spring Security authorization rules on static resources can be bypassed under certain circumstances. For this to impact an application, all of the following must be true: * It must be a WebFlux application * It must be using Spring's static resources support * It must have a non-permitAll authorization rule applied to the static resources support
by mouadk
3 stars
CVSS 9.1
CVE-2023-47253 NOMISEC CRITICAL
Qualitor < 8.20 - Command Injection
Qualitor through 8.20 allows remote attackers to execute arbitrary code via PHP code in the html/ad/adpesquisasql/request/processVariavel.php gridValoresPopHidden parameter.
by OpenXP-Research
CVSS 9.8
CVE-2024-48359 NOMISEC CRITICAL
Qualitor - Code Injection
Qualitor v8.24 was discovered to contain a remote code execution (RCE) vulnerability via the gridValoresPopHidden parameter.
by OpenXP-Research
1 stars
CVSS 9.8
CVE-2024-48360 NOMISEC HIGH
Qualitor - SSRF
Qualitor v8.24 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /request/viewValidacao.php.
by OpenXP-Research
CVSS 7.5
CVE-2024-27954 NOMISEC CRITICAL
WP Automatic <3.92.0 - Path Traversal
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WP Automatic Automatic allows Path Traversal, Server Side Request Forgery.This issue affects Automatic: from n/a through 3.92.0.
by chsxthwik
1 stars
CVSS 9.3
CVE-2024-21320 NOMISEC MEDIUM
Microsoft Windows 10 1507 < 10.0.10240.20402 - Information Disclosure
Windows Themes Spoofing Vulnerability
by sxyrxyy
2 stars
CVSS 6.5
CVE-2024-51430 NOMISEC MEDIUM
PHP 1.0 - XSS
Cross Site Scripting vulnerability in online diagnostic lab management system using php v.1.0 allows a remote attacker to execute arbitrary code via the Test Name parameter on the diagnostic/add-test.php component.
by BLACK-SCORP10
1 stars
CVSS 6.4
CVE-2024-48955 NOMISEC HIGH
NetAdmin 4.030319 - Info Disclosure
Broken access control in NetAdmin 4.030319 returns data with functionalities on the endpoint that "assembles" the functionalities menus, the return of this call is not encrypted and as the system does not validate the session authorization, an attacker can copy the content of the browser of a user with greater privileges having access to the functionalities of the user that the code was copied.
by BrotherOfJhonny
CVSS 8.1
CVE-2019-19842 NOMISEC CRITICAL
Ruckuswireless Unleashed < 200.7.10.202.94 - OS Command Injection
emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=spectra-analysis to admin/_cmdstat.jsp via the mac attribute.
by bdunlap9
CVSS 9.8
CVE-2022-38029 NOMISEC HIGH
Windows ALPC - Privilege Escalation
Windows ALPC Elevation of Privilege Vulnerability
by SpiralBL0CK
1 stars
CVSS 7.0
CVE-2024-27954 NOMISEC CRITICAL
WP Automatic <3.92.0 - Path Traversal
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WP Automatic Automatic allows Path Traversal, Server Side Request Forgery.This issue affects Automatic: from n/a through 3.92.0.
by gh-ost00
4 stars
CVSS 9.3
CVE-2024-24919 NOMISEC HIGH
Check Point Quantum Gateway - Information Disclosure
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
by sar-3mar
CVSS 8.6
CVE-2024-23897 NOMISEC CRITICAL
Jenkins cli Ampersand Replacement Arbitrary File Read
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
by cc3305
CVSS 9.8
CVE-2024-10557 NOMISEC MEDIUM
Fabian Blood Bank Management System - CSRF
A vulnerability has been found in code-projects Blood Bank Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /file/updateprofile.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
by bevennyamande
CVSS 4.3
CVE-2021-36782 NOMISEC CRITICAL
Suse Rancher < 2.5.16 - Cleartext Storage
A Cleartext Storage of Sensitive Information vulnerability in SUSE Rancher allows authenticated Cluster Owners, Cluster Members, Project Owners, Project Members and User Base to use the Kubernetes API to retrieve plaintext version of sensitive data. This issue affects: SUSE Rancher Rancher versions prior to 2.5.16; Rancher versions prior to 2.6.7.
by fe-ax
CVSS 9.9
CVE-2022-48565 NOMISEC CRITICAL
Python < 3.6.13 - XXE
An XML External Entity (XXE) issue was discovered in Python through 3.9.1. The plistlib module no longer accepts entity declarations in XML plist files to avoid XML vulnerabilities.
by Einstein2150
3 stars
CVSS 9.8
CVE-2023-33669 NOMISEC CRITICAL
Tenda AC8V4.0-V16.03.34.06 - Buffer Overflow
Tenda AC8V4.0-V16.03.34.06 was discovered to contain a stack overflow via the timeZone parameter in the sub_44db3c function.
by dhammerg
2 stars
CVSS 9.8
CVE-2021-41773 NOMISEC CRITICAL
Apache 2.4.49/2.4.50 Traversal RCE
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
by skentagon
CVSS 9.8
CVE-2022-2639 NOMISEC HIGH
Openvswitch kernel module - Memory Corruption
An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.
by devetop
CVSS 7.8