Nomisec Exploits

21,904 exploits tracked across all sources.

Sort: Activity Stars
CVE-2021-3130 NOMISEC MEDIUM
Open-AudIT <3.5.3 - Info Disclosure
Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible.
by lusterx
CVSS 5.9
CVE-2018-15473 NOMISEC MEDIUM
Openbsd Openssh < 7.7 - Race Condition
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
by 0xrobiul
1 stars
CVSS 5.3
CVE-2022-0543 NOMISEC CRITICAL
Redis Lua Sandbox Escape
It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.
by JacobEbben
9 stars
CVSS 10.0
CVE-2022-0543 NOMISEC CRITICAL
Redis Lua Sandbox Escape
It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.
by abramas
CVSS 10.0
CVE-2022-23779 NOMISEC MEDIUM
Zohocorp Manageengine Desktop Central - Information Disclosure
Zoho ManageEngine Desktop Central before 10.1.2137.8 exposes the installed server name to anyone. The internal hostname can be discovered by reading HTTP redirect responses.
by Vulnmachines
4 stars
CVSS 5.3
CVE-2020-1472 NOMISEC MEDIUM
Netlogon Weak Cryptographic Authentication
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.
by Rvn0xsy
84 stars
CVSS 5.5
CVE-2022-23131 NOMISEC CRITICAL
Zabbix < 5.4.8 - Authentication Bypass by Spoofing
In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).
by Vulnmachines
2 stars
CVSS 9.1
CVE-2022-25845 NOMISEC HIGH
Alibaba Fastjson < 1.2.83 - Insecure Deserialization
The package com.alibaba:fastjson before 1.2.83 are vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable [safeMode](https://github.com/alibaba/fastjson/wiki/fastjson_safemode).
by hosch3n
91 stars
CVSS 8.1
CVE-2021-31956 NOMISEC HIGH
Microsoft Windows 10 1507 < 10.0.10240.18967 - Integer Underflow
Windows NTFS Elevation of Privilege Vulnerability
by Y3A
5 stars
CVSS 7.8
CVE-2021-31800 NOMISEC CRITICAL
Secureauth Impacket < 0.9.22 - Path Traversal
Multiple path traversal vulnerabilities exist in smbserver.py in Impacket through 0.9.22. An attacker that connects to a running smbserver instance can list and write to arbitrary files via ../ directory traversal. This could potentially be abused to achieve arbitrary code execution by replacing /etc/shadow or an SSH authorized key.
by Louzogh
2 stars
CVSS 9.8
CVE-2022-39196 NOMISEC MEDIUM
Blackboard Learn 1.10.1 - Info Disclosure
Blackboard Learn 1.10.1 allows remote authenticated users to read unintended files by entering student credentials and then directly visiting a certain webapps/bbcms/execute/ URL. Note: The vendor disputes this stating this cannot be reproduced.
by DayiliWaseem
CVSS 6.5
CVE-2022-24780 NOMISEC HIGH
Combodo Itop < 2.7.6 - Code Injection
Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.6 and 3.0.0, users of the iTop user portal can send TWIG code to the server by forging specific http queries, and execute arbitrary code on the server using http server user privileges. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.
by Acceis
6 stars
CVSS 8.8
CVE-2022-33174 NOMISEC CRITICAL
Powertek firmware <3.30.30 - Auth Bypass
Power Distribution Units running on Powertek firmware (multiple brands) before 3.30.30 allows remote authorization bypass in the web interface. To exploit the vulnerability, an attacker must send an HTTP packet to the data retrieval interface (/cgi/get_param.cgi) with the tmpToken cookie set to an empty string followed by a semicolon. This bypasses an active session authorization check. This can be then used to fetch the values of protected sys.passwd and sys.su.name fields that contain the username and password in cleartext.
by Henry4E36
4 stars
CVSS 9.8
CVE-2022-25260 NOMISEC CRITICAL
Jetbrains Hub < 2021.1.14276 - SSRF
JetBrains Hub before 2021.1.14276 was vulnerable to blind Server-Side Request Forgery (SSRF).
by yuriisanin
4 stars
CVSS 9.1
CVE-2022-36271 NOMISEC HIGH
Outbyte PC Repair Installation File <1.7.112.7856 - Code Injection
Outbyte PC Repair Installation File 1.7.112.7856 is vulnerable to Dll Hijacking. iertutil.dll is missing so an attacker can use a malicious dll with same name and can get admin privileges.
by SaumyajeetDas
9 stars
CVSS 7.8
CVE-2022-34169 NOMISEC HIGH
Apache Xalan <2.7.3 - Code Injection
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
by bor8
CVSS 7.5
CVE-2022-22963 NOMISEC CRITICAL
Vmware Spring Cloud Function < 3.1.6 - Remote Code Execution
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
by 75ACOL
CVSS 9.8
CVE-2022-30526 NOMISEC HIGH
Zyxel Usg Flex 100w Firmware < 5.30 - Improper Privilege Management
A privilege escalation vulnerability was identified in the CLI command of Zyxel USG FLEX 100(W) firmware versions 4.50 through 5.30, USG FLEX 200 firmware versions 4.50 through 5.30, USG FLEX 500 firmware versions 4.50 through 5.30, USG FLEX 700 firmware versions 4.50 through 5.30, USG FLEX 50(W) firmware versions 4.16 through 5.30, USG20(W)-VPN firmware versions 4.16 through 5.30, ATP series firmware versions 4.32 through 5.30, VPN series firmware versions 4.30 through 5.30, USG/ZyWALL series firmware versions 4.09 through 4.72, which could allow a local attacker to execute some OS commands with root privileges in some directories on a vulnerable device.
by greek0x0
1 stars
CVSS 7.8
CVE-2022-1292 NOMISEC HIGH
Siemens Brownfield Connectivity Gateway < 2.15 - OS Command Injection
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).
by greek0x0
6 stars
CVSS 7.3
CVE-2020-17087 NOMISEC HIGH
Windows Kernel - Privilege Escalation
Windows Kernel Local Elevation of Privilege Vulnerability
by vp777
258 stars
CVSS 7.8
CVE-2022-0847 NOMISEC HIGH
Dirty Pipe Local Privilege Escalation via CVE-2022-0847
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
by notl0cal
CVSS 7.8
CVE-2022-21371 NOMISEC HIGH
Oracle Weblogic Server - Path Traversal
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
by Vulnmachines
19 stars
CVSS 7.5
CVE-2022-23222 NOMISEC HIGH
Linux Kernel < 5.15.37 - NULL Pointer Dereference
kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.
by FridayOrtiz
1 stars
CVSS 7.8
CVE-2022-24637 NOMISEC CRITICAL
Open Web Analytics <1.7.4 - Info Disclosure
Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter.
by Lay0us
5 stars
CVSS 9.8
CVE-2018-1042 NOMISEC MEDIUM
Moodle < 3.1.9 - SSRF
Moodle 3.x has Server Side Request Forgery in the filepicker.
by UDPsycho
2 stars
CVSS 6.5