Nomisec Exploits

21,871 exploits tracked across all sources.

Sort: Activity Stars
CVE-2021-41773 NOMISEC CRITICAL
Apache 2.4.49/2.4.50 Traversal RCE
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
by 0xGabe
CVSS 9.8
CVE-2023-31606 NOMISEC HIGH
redcloth gem <4.0.0 - DoS
A Regular Expression Denial of Service (ReDoS) issue was discovered in the sanitize_html function of redcloth gem v4.0.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload.
by merbinr
2 stars
CVSS 7.5
CVE-2023-33781 NOMISEC HIGH
D-Link DIR-842V2 <1.0.3 - Command Injection
An issue in D-Link DIR-842V2 v1.0.3 allows attackers to execute arbitrary commands via importing a crafted file.
by s0tr
1 stars
CVSS 8.8
CVE-2023-33782 NOMISEC HIGH
D-Link DIR-842V2 v1.0.3 - Command Injection
D-Link DIR-842V2 v1.0.3 was discovered to contain a command injection vulnerability via the iperf3 diagnostics function.
by s0tr
2 stars
CVSS 8.8
CVE-2021-3129 NOMISEC CRITICAL
Ignition <2.5.2 - RCE
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
by Zoo1sondv
CVSS 9.8
CVE-2023-33243 NOMISEC HIGH
STARFACE - Auth Bypass
RedTeam Pentesting discovered that the web interface of STARFACE as well as its REST API allows authentication using the SHA512 hash of the password instead of the cleartext password. While storing password hashes instead of cleartext passwords in an application's database generally has become best practice to protect users' passwords in case of a database compromise, this is rendered ineffective when allowing to authenticate using the password hash.
by RedTeamPentesting
1 stars
CVSS 8.1
CVE-2023-2825 NOMISEC CRITICAL
GitLab Authenticated File Read
An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
by Occamsec
140 stars
CVSS 10.0
CVE-2023-33410 NOMISEC HIGH
Minical <1.0.0 - Code Injection
Minical 1.0.0 and earlier contains a CSV injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on the Customer Name field in the Accounting module that is used to construct a CSV file.
by Thirukrishnan
CVSS 8.8
CVE-2023-33409 NOMISEC MEDIUM
Minical 1.0.0 - CSRF
Minical 1.0.0 is vulnerable to Cross Site Request Forgery (CSRF) via minical/public/application/controllers/settings/company.php.
by Thirukrishnan
CVSS 6.5
CVE-2023-33408 NOMISEC MEDIUM
Minical 1.0.0 - XSS
Minical 1.0.0 is vulnerable to Cross Site Scripting (XSS). The vulnerability exists due to insufficient input validation in the application's user input handling in the security_helper.php file.
by Thirukrishnan
CVSS 5.4
CVE-2022-22818 NOMISEC MEDIUM
Django < 2.2.27 - XSS
The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS.
by Prikalel
3 stars
CVSS 6.1
CVE-2020-13995 NOMISEC CRITICAL
Airforce Nitf Extract Utility - Out-of-Bounds Write
U.S. Air Force Sensor Data Management System extract75 has a buffer overflow that leads to code execution. An overflow in a global variable (sBuffer) leads to a Write-What-Where outcome. Writing beyond sBuffer will clobber most global variables until reaching a pointer such as DES_info or image_info. By controlling that pointer, one achieves an arbitrary write when its fields are assigned. The data written is from a potentially untrusted NITF file in the form of an integer. The attacker can gain control of the instruction pointer.
by dbrumley
CVSS 9.8
CVE-2022-0441 NOMISEC CRITICAL
MasterStudy LMS <2.7.6 - Info Disclosure
The MasterStudy LMS WordPress plugin before 2.7.6 does to validate some parameters given when registering a new account, allowing unauthenticated users to register as an admin
by tegal1337
1 stars
CVSS 9.8
CVE-2023-33246 NOMISEC CRITICAL
Apache RocketMQ update config RCE
For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.  To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .
by P4x1s
3 stars
CVSS 9.8
CVE-2023-33381 NOMISEC HIGH
MitraStar GPT-2741GNAC - Command Injection
A command injection vulnerability was found in the ping functionality of the MitraStar GPT-2741GNAC router (firmware version AR_g5.8_110WVN0b7_2). The vulnerability allows an authenticated user to execute arbitrary OS commands by sending specially crafted input to the router via the ping function.
by duality084
13 stars
CVSS 7.2
CVE-2023-28218 NOMISEC HIGH
Microsoft Windows 10 1507 < 10.0.10240.19869 - Heap Buffer Overflow
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
by h1bAna
1 stars
CVSS 7.0
CVE-2020-11890 NOMISEC MEDIUM
Joomla! < 3.9.17 - Improper Input Validation
An issue was discovered in Joomla! before 3.9.17. Improper input validations in the usergroup table class could lead to a broken ACL configuration.
by HoangKien1020
62 stars
CVSS 5.3
CVE-2021-33690 NOMISEC CRITICAL
SAP Netweaver Development Infrastructure - SSRF
Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50The SAP NetWeaver Development Infrastructure Component Build Service allows a threat actor who has access to the server to perform proxy attacks on server by sending crafted queries. Due to this, the threat actor could completely compromise sensitive data residing on the Server and impact its availability.Note: The impact of this vulnerability depends on whether SAP NetWeaver Development Infrastructure (NWDI) runs on the intranet or internet. The CVSS score reflects the impact considering the worst-case scenario that it runs on the internet.
by redrays-io
CVSS 9.9
CVE-2020-17087 NOMISEC HIGH
Windows Kernel - Privilege Escalation
Windows Kernel Local Elevation of Privilege Vulnerability
by raiden757
CVSS 7.8
CVE-2019-0708 NOMISEC CRITICAL
CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
by davidfortytwo
CVSS 9.8
CVE-2023-33246 NOMISEC CRITICAL
Apache RocketMQ update config RCE
For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.  To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .
by SuperZero
112 stars
CVSS 9.8
CVE-2023-33732 NOMISEC MEDIUM
Microworld Technologies eScan mgmt console 14.0.1400.2281 - XSS
Cross Site Scripting (XSS) in the New Policy form in Microworld Technologies eScan management console 14.0.1400.2281 allows a remote attacker to inject arbitrary code via the vulnerable parameters type, txtPolicyType, and Deletefileval.
by sahiloj
1 stars
CVSS 6.1
CVE-2023-33246 NOMISEC CRITICAL
Apache RocketMQ update config RCE
For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.  To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .
by 4mazing
2 stars
CVSS 9.8
CVE-2022-29455 NOMISEC MEDIUM
Elementor Website Builder < 3.5.5 - XSS
DOM-based Reflected Cross-Site Scripting (XSS) vulnerability in Elementor's Elementor Website Builder plugin <= 3.5.5 versions.
by tucommenceapousser
CVSS 4.7
CVE-2022-29455 NOMISEC MEDIUM
Elementor Website Builder < 3.5.5 - XSS
DOM-based Reflected Cross-Site Scripting (XSS) vulnerability in Elementor's Elementor Website Builder plugin <= 3.5.5 versions.
by tucommenceapousser
CVSS 4.7