Nomisec Exploits

21,865 exploits tracked across all sources.

Sort: Activity Stars
CVE-2023-30533 NOMISEC HIGH
Sheetjs < 0.19.3 - Prototype Pollution
SheetJS Community Edition before 0.19.3 allows Prototype Pollution via a crafted file. In other words. 0.19.2 and earlier are affected, whereas 0.19.3 and later are unaffected.
by BenEdridge
12 stars
CVSS 7.8
CVE-2022-28171 NOMISEC HIGH
Hikvision Ds-a71024 Firmware < 2.3.8-6 - Command Injection
The web module in some Hikvision Hybrid SAN/Cluster Storage products have the following security vulnerability. Due to the insufficient input validation, attacker can exploit the vulnerability to execute restricted commands by sending messages with malicious commands to the affected device.
by NyaMeeEain
4 stars
CVSS 7.5
CVE-2023-38646 NOMISEC CRITICAL
Metabase <0.46.6.1-1.46.6.1 - RCE
Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.
by Any3ite
CVSS 9.8
CVE-2022-26965 NOMISEC HIGH
Pluck 4.7.16 - Authenticated RCE
In Pluck 4.7.16, an admin user can use the theme upload functionality at /admin.php?action=themeinstall to perform remote code execution.
by SkDevilS
CVSS 7.2
CVE-2023-26067 NOMISEC HIGH
Lexmark <2023-02-19 - Info Disclosure
Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 1 of 4).
by horizon3ai
28 stars
CVSS 8.1
CVE-2023-23638 NOMISEC MEDIUM
Apache Dubbo < 2.7.21 - Insecure Deserialization
A deserialization vulnerability existed when dubbo generic invoke, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.21 and prior versions; Apache Dubbo 3.0.x version 3.0.13 and prior versions; Apache Dubbo 3.1.x version 3.1.5 and prior versions.
by YYHYlh
231 stars
CVSS 5.0
CVE-2022-1015 NOMISEC MEDIUM
Linux Kernel < 5.16.18 - Out-of-Bounds Write
A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.
by more-kohii
1 stars
CVSS 6.6
CVE-2019-9053 NOMISEC HIGH
Cmsmadesimple Cms Made Simple - SQL Injection
An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
by kahluri
CVSS 8.1
CVE-2023-39115 NOMISEC CRITICAL
Campcodes Online Matrimonial Website System Script <3.3 - XSS
install/aiz-uploader/upload in Campcodes Online Matrimonial Website System Script 3.3 allows XSS via a crafted SVG document.
by 0xrajdip
CVSS 9.8
CVE-2023-39115 NOMISEC CRITICAL
Campcodes Online Matrimonial Website System Script <3.3 - XSS
install/aiz-uploader/upload in Campcodes Online Matrimonial Website System Script 3.3 allows XSS via a crafted SVG document.
by Raj789-sec
CVSS 9.8
CVE-2023-39144 NOMISEC HIGH
Element55 KnowMore <21 - Info Disclosure
Element55 KnowMore appliances version 21 and older was discovered to store passwords in plaintext.
by cduram
CVSS 7.5
CVE-2017-12149 NOMISEC CRITICAL
Jboss Application Server - Code Injection
In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.
by MrE-Fog
CVSS 9.8
CVE-2022-20009 NOMISEC MEDIUM
Android - Local Privilege Escalation
In various functions of the USB gadget subsystem, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-213172319References: Upstream kernel
by szymonh
3 stars
CVSS 6.8
CVE-2019-11358 NOMISEC MEDIUM
jQuery <3.4.0 - Info Disclosure
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
by isacaya
1 stars
CVSS 6.1
CVE-2023-2868 NOMISEC CRITICAL
Barracuda Email Security Gateway <9.2.0.006 - Command Injection
A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.
by cashapp323232
CVSS 9.4
CVE-2018-6789 NOMISEC CRITICAL
Exim < 4.90.1 - Buffer Overflow
An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.
by thistehneisen
2 stars
CVSS 9.8
CVE-2023-27163 NOMISEC MEDIUM
request-baskets <1.2.1 - SSRF
request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.
by HusenjanDev
2 stars
CVSS 6.5
CVE-2013-3827 NOMISEC
Oracle GlassFish Server <12.1.2 - Info Disclosure
Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2; the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.3.0, 11.1.2.4.0, and 12.1.2.0.0; and the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 and 12.1.1 allows remote attackers to affect confidentiality via unknown vectors related to Java Server Faces or Web Container.
by thistehneisen
1 stars
CVE-2023-2732 NOMISEC CRITICAL
Inspireui Mstore API < 3.9.2 - Authentication Bypass
The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.2. This is due to insufficient verification on the user being supplied during the add listing REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.
by Ap0dexMe0
2 stars
CVSS 9.8
CVE-2023-2732 NOMISEC CRITICAL
Inspireui Mstore API < 3.9.2 - Authentication Bypass
The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.2. This is due to insufficient verification on the user being supplied during the add listing REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.
by ThatNotEasy
2 stars
CVSS 9.8
CVE-2023-3519 NOMISEC CRITICAL
Unspecified Product <Version> - RCE
Unauthenticated remote code execution
by passwa11
1 stars
CVSS 9.8
CVE-2023-29489 NOMISEC MEDIUM
Cpanel < 11.102.0.31 - XSS
An issue was discovered in cPanel before 11.109.9999.116. XSS can occur on the cpsrvd error page via an invalid webcall ID, aka SEC-669. The fixed versions are 11.109.9999.116, 11.108.0.13, 11.106.0.18, and 11.102.0.31.
by ViperM4sk
CVSS 5.3
CVE-2021-31805 NOMISEC CRITICAL
Apache Struts < 2.5.29 - Remote Code Execution
The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
by nth347
CVSS 9.8
CVE-2023-34035 NOMISEC HIGH
Spring Security <5.8.5,6.0.5,6.1.2 - Info Disclosure
Spring Security versions 5.8 prior to 5.8.5, 6.0 prior to 6.0.5, and 6.1 prior to 6.1.2 could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String) and multiple servlets, one of them being Spring MVC’s DispatcherServlet. (DispatcherServlet is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.) Specifically, an application is vulnerable when all of the following are true: * Spring MVC is on the classpath * Spring Security is securing more than one servlet in a single application (one of them being Spring MVC’s DispatcherServlet) * The application uses requestMatchers(String) to refer to endpoints that are not Spring MVC endpoints An application is not vulnerable if any of the following is true: * The application does not have Spring MVC on the classpath * The application secures no servlets other than Spring MVC’s DispatcherServlet * The application uses requestMatchers(String) only for Spring MVC endpoints
by jzheaux
4 stars
CVSS 7.3
CVE-2020-17530 NOMISEC CRITICAL
Apache Struts 2 Forced Multi OGNL Evaluation
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
by nth347
CVSS 9.8