Nomisec Exploits

21,883 exploits tracked across all sources.

Sort: Activity Stars
CVE-2022-22274 NOMISEC CRITICAL
SonicOS - Buffer Overflow
A Stack-based buffer overflow vulnerability in the SonicOS via HTTP request allows a remote unauthenticated attacker to cause Denial of Service (DoS) or potentially results in code execution in the firewall.
by 4lucardSec
6 stars
CVSS 9.8
CVE-2023-0297 NOMISEC CRITICAL
pyLoad js2py Python Execution
Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31.
by bAuh0lz
28 stars
CVSS 9.8
CVE-2022-46485 NOMISEC HIGH
Data Illusion Survey Software Solutions ngSurvey <2.4.28 - DoS
Data Illusion Survey Software Solutions ngSurvey version 2.4.28 and below is vulnerable to Denial of Service if a survey contains a "Text Field", "Comment Field" or "Contact Details".
by NevaSec
CVSS 7.5
CVE-2023-21752 NOMISEC HIGH
Windows Backup Service - Privilege Escalation
Windows Backup Service Elevation of Privilege Vulnerability
by Wh04m1001
323 stars
CVSS 7.1
CVE-2022-28944 NOMISEC HIGH
EMCO Software products < various - RCE
Certain EMCO Software products are affected by: CWE-494: Download of Code Without Integrity Check. This affects MSI Package Builder for Windows 9.1.4 and Remote Installer for Windows 6.0.13 and Ping Monitor for Windows 8.0.18 and Remote Shutdown for Windows 7.2.2 and WakeOnLan 2.0.8 and Network Inventory for Windows 5.8.22 and Network Software Scanner for Windows 2.0.8 and UnLock IT for Windows 6.1.1. The impact is: execute arbitrary code (remote). The component is: Updater. The attack vector is: To exploit this vulnerability, a user must trigger an update of an affected installation of EMCO Software. ¶¶ Multiple products from EMCO Software are affected by a remote code execution vulnerability during the update process.
by gar-re
4 stars
CVSS 8.8
CVE-2022-27438 NOMISEC HIGH
Caphyon Advanced Installer < 19.4 - Download Without Integrity Check
Caphyon Ltd Advanced Installer 19.3 and earlier and many products that use the updater from Advanced Installer (Advanced Updater) are affected by a remote code execution vulnerability via the CustomDetection parameter in the update check function. To exploit this vulnerability, a user must start an affected installation to trigger the update check.
by gar-re
CVSS 8.1
CVE-2022-24644 NOMISEC HIGH
ZZ Inc. KeyMouse <3.08 - RCE
ZZ Inc. KeyMouse Windows 3.08 and prior is affected by a remote code execution vulnerability during an unauthenticated update. To exploit this vulnerability, a user must trigger an update of an affected installation of KeyMouse.
by gar-re
1 stars
CVSS 8.8
CVE-2022-3317 NOMISEC MEDIUM
Google Chrome <106.0.5249.62 - CSRF
Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 106.0.5249.62 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)
by hfh86
CVSS 4.3
CVE-2022-46505 NOMISEC HIGH
MatrixSSL <4.5.1-open - Info Disclosure
An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check the SessionID field, resulting in the misuse of an all-zero MasterSecret that can decrypt secret data.
by SmallTown123
CVSS 7.5
CVE-2022-3656 NOMISEC HIGH
Google Chrome < 107.0.5304.62 - Improper Input Validation
Insufficient data validation in File System in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Medium)
by momika233
38 stars
CVSS 8.8
CVE-2021-4034 NOMISEC HIGH
Local Privilege Escalation in polkits pkexec
A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.
by PwnFunction
346 stars
CVSS 7.8
CVE-2022-21449 NOMISEC HIGH
Oracle Java SE <18 - Unauth RCE
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.2 and 18; Oracle GraalVM Enterprise Edition: 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
by davwwwx
CVSS 7.5
CVE-2007-4559 NOMISEC CRITICAL
Python - Path Traversal
Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
by Ooscaar
CVSS 9.8
CVE-2021-42287 NOMISEC HIGH
Active Directory Domain Services - Privilege Escalation
Active Directory Domain Services Elevation of Privilege Vulnerability
by TryA9ain
13 stars
CVSS 7.5
CVE-2022-3786 NOMISEC HIGH
Openssl < 3.0.7 - Buffer Overflow
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
by WhatTheFuzz
5 stars
CVSS 7.5
CVE-2022-46689 NOMISEC HIGH
macOS Dirty Cow Arbitrary File Write Local Privilege Escalation
A race condition was addressed with additional validation. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.
by 69camau
CVSS 7.0
CVE-2021-41773 NOMISEC CRITICAL
Apache 2.4.49/2.4.50 Traversal RCE
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
by walnutsecurity
2 stars
CVSS 9.8
CVE-2022-46175 NOMISEC HIGH
JSON5 <2.2.1 - Prototype Pollution
JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 versions 1.0.2, 2.2.2, and later.
by giz-berlin
CVSS 7.1
CVE-2022-46484 NOMISEC HIGH
Data Illusion Survey Software Solutions NGSurvey - Information Disclosure
Information disclosure in password protected surveys in Data Illusion Survey Software Solutions NGSurvey v2.4.28 and below allows attackers to view the password to access and arbitrarily submit surveys.
by NevaSec
2 stars
CVSS 7.5
CVE-2022-46164 NOMISEC CRITICAL
NodeBB <2.6.1 - RCE
NodeBB is an open source Node.js based forum software. Due to a plain object with a prototype being used in socket.io message handling a specially crafted payload can be used to impersonate other users and takeover accounts. This vulnerability has been patched in version 2.6.1. Users are advised to upgrade. Users unable to upgrade may cherry-pick commit `48d143921753914da45926cca6370a92ed0c46b8` into their codebase to patch the exploit.
by stephenbradshaw
12 stars
CVSS 9.4
CVE-2022-21839 NOMISEC MEDIUM
Microsoft Windows 10 - Denial of Service
Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability
by lolin19
CVSS 6.1
CVE-2022-41082 NOMISEC HIGH
Microsoft Exchange Server - RCE
Microsoft Exchange Server Remote Code Execution Vulnerability
by balki97
95 stars
CVSS 8.0
CVE-2020-13259 NOMISEC HIGH
RAD SecFlow-1v os-image SF_0290_2.3.01.26 - CSRF
A vulnerability in the web-based management interface of RAD SecFlow-1v os-image SF_0290_2.3.01.26 could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web UI on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. This could be exploited in conjunction with CVE-2020-13260.
by UrielYochpaz
3 stars
CVSS 8.8
CVE-2022-2602 NOMISEC MEDIUM
io_uring - Use After Free
io_uring UAF, Unix SCM garbage collection
by th3-5had0w
1 stars
CVSS 5.3
CVE-2022-2602 NOMISEC MEDIUM
io_uring - Use After Free
io_uring UAF, Unix SCM garbage collection
by kiks7
86 stars
CVSS 5.3