Nomisec Exploits

21,798 exploits tracked across all sources.

Sort: Activity Stars
CVE-2023-51385 NOMISEC MEDIUM
OpenSSH <9.6 - Command Injection
In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
by watarium
CVSS 6.5
CVE-2023-42468 NOMISEC MEDIUM
Azmobileapps Color Phone < 2.1.8-2 - Improper Privilege Management
The com.cutestudio.colordialer application through 2.1.8-2 for Android allows a remote attacker to initiate phone calls without user consent, because of improper export of the com.cutestudio.dialer.activities.DialerActivity component. A third-party application (without any permissions) can craft an intent targeting com.cutestudio.dialer.activities.DialerActivity via the android.intent.action.CALL action in conjunction with a tel: URI, thereby placing a phone call.
by actuator
1 stars
CVSS 5.3
CVE-2023-41892 NOMISEC CRITICAL
Craft CMS unauthenticated Remote Code Execution (RCE)
Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector. Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.
by 0xfalafel
11 stars
CVSS 10.0
CVE-2023-42469 NOMISEC LOW
Fulldive Full Dialer - Missing Authorization
The com.full.dialer.top.secure.encrypted application through 1.0.1 for Android enables any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.full.dialer.top.secure.encrypted.activities.DialerActivity component.
by actuator
1 stars
CVSS 3.3
CVE-2021-32305 NOMISEC CRITICAL
Websvn < 2.6.1 - OS Command Injection
WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
by FredBrave
1 stars
CVSS 9.8
CVE-2023-51764 NOMISEC MEDIUM
Postfix <3.8.5 - Info Disclosure
Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.
by duy-31
22 stars
CVSS 5.3
CVE-2021-41349 NOMISEC MEDIUM
Microsoft Exchange Server - SSRF
Microsoft Exchange Server Spoofing Vulnerability
by 0xrobiul
5 stars
CVSS 6.5
CVE-2022-22965 NOMISEC CRITICAL
Vmware Spring Framework < 5.2.20 - Code Injection
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
by 0xrobiul
3 stars
CVSS 9.8
CVE-2023-49070 NOMISEC CRITICAL
Apache Ofbiz <18.12.10 - RCE
Pre-auth RCE in Apache Ofbiz 18.12.09. It's due to XML-RPC no longer maintained still present. This issue affects Apache OFBiz: before 18.12.10.  Users are recommended to upgrade to version 18.12.10
by 0xrobiul
1 stars
CVSS 9.8
CVE-2023-43115 NOMISEC HIGH
Artifex Ghostscript <10.01.2 - RCE
In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).
by jostaub
8 stars
CVSS 8.8
CVE-2018-20250 NOMISEC HIGH
WinRAR <5.61 - Path Traversal
In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.
by tannlh
CVSS 7.8
CVE-2023-51385 NOMISEC MEDIUM
OpenSSH <9.6 - Command Injection
In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
by Le1a
5 stars
CVSS 6.5
CVE-2022-28117 NOMISEC MEDIUM
Naviwebs Navigate Cms - SSRF
A Server-Side Request Forgery (SSRF) in feed_parser class of Navigate CMS v2.9.4 allows remote attackers to force the application to make arbitrary requests via injection of arbitrary URLs into the feed parameter.
by kimstars
CVSS 4.9
CVE-2023-46604 NOMISEC CRITICAL
Java OpenWire - Deserialization RCE
The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.
by Mudoleto
CVSS 10.0
CVE-2019-17382 NOMISEC CRITICAL
Zabbix < 4.4 - IDOR
An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin.
by K3ysTr0K3R
3 stars
CVSS 9.1
CVE-2022-40032 NOMISEC CRITICAL
Simple Task Managing System - SQL Injection
SQL Injection vulnerability in Simple Task Managing System version 1.0 in login.php in 'username' and 'password' parameters, allows attackers to execute arbitrary code and gain sensitive information.
by h4md153v63n
5 stars
CVSS 9.8
CVE-2022-40348 NOMISEC MEDIUM
Intern Record System - XSS
Cross Site Scripting (XSS) vulnerability in Intern Record System version 1.0 in /intern/controller.php in 'name' and 'email' parameters, allows attackers to execute arbitrary code.
by h4md153v63n
3 stars
CVSS 5.4
CVE-2022-40347 NOMISEC CRITICAL
Intern Record System - SQL Injection
SQL Injection vulnerability in Intern Record System version 1.0 in /intern/controller.php in 'phone', 'email', 'deptType' and 'name' parameters, allows attackers to execute arbitrary code and gain sensitive information.
by h4md153v63n
3 stars
CVSS 9.8
CVE-2020-13405 NOMISEC HIGH
Microweber <1.1.20 - Info Disclosure
userfiles/modules/users/controller/controller.php in Microweber before 1.1.20 allows an unauthenticated user to disclose the users database via a /modules/ POST request.
by mrnazu
1 stars
CVSS 7.5
CVE-2023-23752 NOMISEC MEDIUM
Joomla! < 4.2.8 - Improper Access Control
An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.
by C1ph3rX13
CVSS 5.3
CVE-2023-28432 NOMISEC HIGH
Minio <RELEASE.2023-03-20T20-16-18Z - Info Disclosure
Minio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including `MINIO_SECRET_KEY` and `MINIO_ROOT_PASSWORD`, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.
by C1ph3rX13
1 stars
CVSS 7.5
CVE-2023-51385 NOMISEC MEDIUM
OpenSSH <9.6 - Command Injection
In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
by FeatherStark
CVSS 6.5
CVE-2023-40362 NOMISEC MEDIUM
Centralsquare Click2gov Building Permit - Missing Authorization
An issue was discovered in CentralSquare Click2Gov Building Permit before October 2023. Lack of access control protections allows remote attackers to arbitrarily delete the contractors from any user's account when the user ID and contractor information is known.
by ally-petitt
1 stars
CVSS 4.3
CVE-2023-49471 NOMISEC HIGH
Barassistant Bar Assistant < 3.2.0 - SSRF
Blind Server-Side Request Forgery (SSRF) vulnerability in karlomikus Bar Assistant before version 3.2.0 does not validate a parameter before making a request through Image::make(), which could allow authenticated remote attackers to execute arbitrary code.
by zunak
CVSS 8.8
CVE-2019-16784 NOMISEC HIGH
PyInstaller <3.6 - Privilege Escalation
In PyInstaller before version 3.6, only on Windows, a local privilege escalation vulnerability is present in this particular case: If a software using PyInstaller in "onefile" mode is launched by a privileged user (at least more than the current one) which have his "TempPath" resolving to a world writable directory. This is the case for example if the software is launched as a service or as a scheduled task using a system account (TempPath will be C:\Windows\Temp). In order to be exploitable the software has to be (re)started after the attacker launch the exploit program, so for a service launched at startup, a service restart is needed (e.g. after a crash or an upgrade).
by Ckrielle
CVSS 7.0