Nomisec Exploits

21,865 exploits tracked across all sources.

Sort: Activity Stars
CVE-2023-28467 NOMISEC MEDIUM
MyBB <1.8.34 - XSS
In MyBB before 1.8.34, there is XSS in the User CP module via the user email field.
by ahmetaltuntas
4 stars
CVSS 6.1
CVE-2023-32681 NOMISEC MEDIUM
Python Requests < 2.31.0 - Information Disclosure
Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTTP connections sent through the tunnel, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the `Proxy-Authorization` header must be sent in the CONNECT request as the proxy has no visibility into the tunneled request. This results in Requests forwarding proxy credentials to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information. This issue has been patched in version 2.31.0.
by hardikmodha
4 stars
CVSS 6.1
CVE-2023-27163 NOMISEC MEDIUM
request-baskets <1.2.1 - SSRF
request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.
by seanrdev
4 stars
CVSS 6.5
CVE-2023-3519 NOMISEC CRITICAL
Unspecified Product <Version> - RCE
Unauthenticated remote code execution
by KR0N-SECURITY
1 stars
CVSS 9.8
CVE-2023-3519 NOMISEC CRITICAL
Unspecified Product <Version> - RCE
Unauthenticated remote code execution
by SalehLardhi
11 stars
CVSS 9.8
CVE-2021-44228 NOMISEC CRITICAL
Log4Shell HTTP Header Injection
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
by Muhammad-Ali007
CVSS 10.0
CVE-2023-3519 NOMISEC CRITICAL
Unspecified Product <Version> - RCE
Unauthenticated remote code execution
by d0rb
CVSS 9.8
CVE-2023-3519 NOMISEC CRITICAL
Unspecified Product <Version> - RCE
Unauthenticated remote code execution
by mr-r3b00t
14 stars
CVSS 9.8
CVE-2023-36884 NOMISEC HIGH
Windows Search - RCE
Windows Search Remote Code Execution Vulnerability
by Maxwitat
27 stars
CVSS 7.5
CVE-2023-36884 NOMISEC HIGH
Windows Search - RCE
Windows Search Remote Code Execution Vulnerability
by ToddMaxey
CVSS 7.5
CVE-2023-31753 NOMISEC CRITICAL
eNdonesia 8.7 - SQL Injection
SQL injection vulnerability in diskusi.php in eNdonesia 8.7, allows an attacker to execute arbitrary SQL commands via the "rid=" parameter.
by KIL0BYT3X
CVSS 9.8
CVE-2022-22822 NOMISEC CRITICAL
Libexpat < 2.4.3 - Integer Overflow
addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
by nanopathi
CVSS 9.8
CVE-2021-4034 NOMISEC HIGH
Local Privilege Escalation in polkits pkexec
A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.
by Y3A
4 stars
CVSS 7.8
CVE-2021-23017 NOMISEC HIGH
nginx - Memory Corruption
A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
by lakshit1212
1 stars
CVSS 7.7
CVE-2023-27163 NOMISEC MEDIUM
request-baskets <1.2.1 - SSRF
request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.
by overgrowncarrot1
CVSS 6.5
CVE-2023-34362 NOMISEC CRITICAL
MOVEit SQL Injection vulnerability
In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions.
by toorandom
1 stars
CVSS 9.8
CVE-2022-36234 NOMISEC HIGH
SimpleNetwork TCP Server - Memory Corruption
SimpleNetwork TCP Server commit 29bc615f0d9910eb2f59aa8dff1f54f0e3af4496 was discovered to contain a double free vulnerability which is exploited via crafted TCP packets.
by Halcy0nic
2 stars
CVSS 7.5
CVE-2023-37771 NOMISEC CRITICAL
Phpgurukul Art Gallery Management System - SQL Injection
Art Gallery Management System v1.0 contains a SQL injection vulnerability via the cid parameter at /agms/product.php.
by anky-123
CVSS 9.8
CVE-2023-30765 NOMISEC HIGH
Deltaww Infrasuite Device Master - Improper Privilege Management
​Delta Electronics InfraSuite Device Master versions prior to 1.0.7 contain improper access controls that could allow an attacker to alter privilege management configurations, resulting in privilege escalation.
by 0xfml
CVSS 8.8
CVE-2023-37582 NOMISEC CRITICAL
Apache RocketMQ - Remote Command Execution
The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1. When NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function on the NameServer component to execute commands as the system users that RocketMQ is running as. It is recommended for users to upgrade their NameServer version to 5.1.2 or above for RocketMQ 5.x or 4.9.7 or above for RocketMQ 4.x to prevent these attacks.
by Malayke
45 stars
CVSS 9.8
CVE-2022-30190 NOMISEC HIGH
Microsoft Office Word MSDTJS
A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability.
by Muhammad-Ali007
1 stars
CVSS 7.8
CVE-2022-33980 NOMISEC CRITICAL
Apache Commons Configuration <2.8 - RCE
Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Configuration 2.8.0, which disables the problematic interpolators by default.
by joseluisinigo
1 stars
CVSS 9.8
CVE-2023-38434 NOMISEC HIGH
xHTTP <72f812d - Use After Free
xHTTP 72f812d has a double free in close_connection in xhttp.c via a malformed HTTP request method.
by Halcy0nic
1 stars
CVSS 7.5
CVE-2018-7600 NOMISEC CRITICAL
Drupal Drupalgeddon 2 Forms API Property Injection
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.
by thehappydinoa
7 stars
CVSS 9.8
CVE-2017-0148 NOMISEC HIGH
Microsoft Server Message Block < 4.0e - Improper Input Validation
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0146.
by HakaKali
CVSS 8.1