Nomisec Exploits

21,896 exploits tracked across all sources.

Sort: Activity Stars
CVE-2022-31629 NOMISEC MEDIUM
PHP <7.4.31, 8.0.24, 8.1.11 - Info Disclosure
In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
by silnex
3 stars
CVSS 6.5
CVE-2021-4045 NOMISEC CRITICAL
TP-Link Tapo C200 <1.1.15 - RCE
TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an attacker to take full control of the camera.
by jeffbezosispogg
1 stars
CVSS 9.8
CVE-2021-41773 NOMISEC CRITICAL
Apache 2.4.49/2.4.50 Traversal RCE
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
by itsecurityco
12 stars
CVSS 9.8
CVE-2022-26937 NOMISEC CRITICAL
Windows Network File System < - RCE
Windows Network File System Remote Code Execution Vulnerability
by Malwareman007
14 stars
CVSS 9.8
CVE-2022-21971 NOMISEC HIGH
Windows Runtime - RCE
Windows Runtime Remote Code Execution Vulnerability
by Malwareman007
11 stars
CVSS 7.8
CVE-2022-38766 NOMISEC HIGH
Renault ZOE 2021 - Replay Attack
The remote keyless system on Renault ZOE 2021 vehicles sends 433.92 MHz RF signals from the same Rolling Codes set for each door-open request, which allows for a replay attack.
by MalHyuk
4 stars
CVSS 8.1
CVE-2022-43143 NOMISEC CRITICAL
Beekeeper Studio <3.6.6 - XSS
A cross-site scripting (XSS) vulnerability in Beekeeper Studio v3.6.6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error modal container.
by goseungduk
CVSS 9.6
CVE-2022-39959 NOMISEC HIGH
Panini Everest Engine - Privilege Escalation
Panini Everest Engine 2.0.4 allows unprivileged users to create a file named Everest.exe in the %PROGRAMDATA%\Panini folder. This leads to privilege escalation because a service, running as SYSTEM, uses the unquoted path of %PROGRAMDATA%\Panini\Everest Engine\EverestEngine.exe and therefore a Trojan horse %PROGRAMDATA%\Panini\Everest.exe may be executed instead of the intended vendor-supplied EverestEngine.exe file.
by usmarine2141
1 stars
CVSS 7.8
CVE-2021-4154 NOMISEC HIGH
Linux Kernel < 5.4.134 - Use After Free
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.
by Markakd
67 stars
CVSS 8.8
CVE-2022-30190 NOMISEC HIGH
Microsoft Office Word MSDTJS
A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability.
by Imeneallouche
CVSS 7.8
CVE-2022-30190 NOMISEC HIGH
Microsoft Office Word MSDTJS
A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability.
by Malwareman007
38 stars
CVSS 7.8
CVE-2022-41040 NOMISEC HIGH
Microsoft Exchange ProxyNotShell RCE
Microsoft Exchange Server Elevation of Privilege Vulnerability
by d3duct1v
5 stars
CVSS 8.8
CVE-2013-6490 NOMISEC
Pidgin < 2.10.7 - Memory Corruption
The SIMPLE protocol functionality in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a negative Content-Length header, which triggers a buffer overflow.
by Everdoh
CVE-2017-12561 NOMISEC CRITICAL
HP Intelligent Management Center < 7.3 - Remote Code Execution
A remote code execution vulnerability in HPE intelligent Management Center (iMC) PLAT version Plat 7.3 E0504P4 and earlier was found.
by Everdoh
CVSS 9.8
CVE-2021-44228 NOMISEC CRITICAL
Log4Shell HTTP Header Injection
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
by Joefreedy
3 stars
CVSS 10.0
CVE-2022-41040 NOMISEC HIGH
Microsoft Exchange ProxyNotShell RCE
Microsoft Exchange Server Elevation of Privilege Vulnerability
by r3dcl1ff
5 stars
CVSS 8.8
CVE-2022-36804 NOMISEC HIGH
Atlassian Bitbucket Server/Data Center <7.6.17/<7.17.10/<7.21.4/<8....
Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew.
by ColdFusionX
7 stars
CVSS 8.8
CVE-2017-9805 NOMISEC HIGH
Apache Struts 2 REST Plugin XStream RCE
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
by Shakun8
3 stars
CVSS 8.1
CVE-2021-44077 NOMISEC CRITICAL
ManageEngine ServiceDesk Plus CVE-2021-44077
Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 10530, and SupportCenter Plus before 11014 are vulnerable to unauthenticated remote code execution. This is related to /RestAPI URLs in a servlet, and ImportTechnicians in the Struts configuration.
by pizza-power
2 stars
CVSS 9.8
CVE-2022-40140 NOMISEC MEDIUM
Trendmicro Apex One - Origin Validation Error
An origin validation error vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to cause a denial-of-service on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
by mr-r3b00t
26 stars
CVSS 5.5
CVE-2022-41040 NOMISEC HIGH
Microsoft Exchange ProxyNotShell RCE
Microsoft Exchange Server Elevation of Privilege Vulnerability
by numanturle
19 stars
CVSS 8.8
CVE-2022-24086 NOMISEC CRITICAL
Adobe Commerce <2.4.3-p1, <2.3.7-p2 - RCE
Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution.
by akr3ch
2 stars
CVSS 9.8
CVE-2022-41218 NOMISEC MEDIUM
Linux kernel <5.19.10 - Use After Free
In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.
by Tobey123
CVSS 5.5
CVE-2020-8825 NOMISEC MEDIUM
Vanilla 2.6.3 - XSS
index.php?p=/dashboard/settings/branding in Vanilla 2.6.3 allows stored XSS.
by hacky1997
3 stars
CVSS 5.4
CVE-2020-35314 NOMISEC CRITICAL
Wondercms - OS Command Injection
A remote code execution vulnerability in the installUpdateThemePluginAction function in index.php in WonderCMS 3.1.3, allows remote attackers to upload a custom plugin which can contain arbitrary code and obtain a webshell via the theme/plugin installer.
by AkashLingayat
CVSS 9.8