Nomisec Exploits

21,202 exploits tracked across all sources.

Sort: Activity Stars
CVE-2026-24061 NOMISEC CRITICAL
GNU Inetutils Telnet Authentication Bypass Exploit CVE-2026-24061
telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.
by 0p5cur
2 stars
CVSS 9.8
CVE-2015-5253 NOMISEC
Apache CXF <2.7.18, <3.0.7, <3.1.3 - Auth Bypass
The SAML Web SSO module in Apache CXF before 2.7.18, 3.0.x before 3.0.7, and 3.1.x before 3.1.3 allows remote authenticated users to bypass authentication via a crafted SAML response with a valid signed assertion, related to a "wrapping attack."
by dawetmaster
CVE-2015-5253 NOMISEC
Apache CXF <2.7.18, <3.0.7, <3.1.3 - Auth Bypass
The SAML Web SSO module in Apache CXF before 2.7.18, 3.0.x before 3.0.7, and 3.1.x before 3.1.3 allows remote authenticated users to bypass authentication via a crafted SAML response with a valid signed assertion, related to a "wrapping attack."
by andikahilmy
CVE-2019-7609 NOMISEC CRITICAL
Kibana Timelion Prototype Pollution RCE
Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
by toxxxaka
CVSS 10.0
CVE-2019-7609 NOMISEC CRITICAL
Kibana Timelion Prototype Pollution RCE
Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
by toxaker
CVSS 10.0
CVE-2019-14892 NOMISEC CRITICAL
Fasterxml Jackson-databind < 2.6.7.3 - Information Disclosure
A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
by dawetmaster
CVSS 9.8
CVE-2019-14892 NOMISEC CRITICAL
Fasterxml Jackson-databind < 2.6.7.3 - Information Disclosure
A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
by andikahilmy
CVSS 9.8
CVE-2020-11620 NOMISEC HIGH
Fasterxml Jackson-databind < 2.9.10.4 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly).
by dawetmaster
CVSS 8.1
CVE-2020-11620 NOMISEC HIGH
Fasterxml Jackson-databind < 2.9.10.4 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly).
by andikahilmy
CVSS 8.1
CVE-2024-32964 NOMISEC CRITICAL
Lobehub Lobe Chat < 0.150.6 - SSRF
Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Prior to 0.150.6, lobe-chat had an unauthorized Server-Side Request Forgery vulnerability in the /api/proxy endpoint. An attacker can construct malicious requests to cause Server-Side Request Forgery without logging in, attack intranet services, and leak sensitive information.
by StephenQSstarThomas
1 stars
CVSS 9.0
CVE-2020-9547 NOMISEC CRITICAL
Fasterxml Jackson-databind < 2.7.9.7 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
by dawetmaster
CVSS 9.8
CVE-2020-9547 NOMISEC CRITICAL
Fasterxml Jackson-databind < 2.7.9.7 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
by andikahilmy
CVSS 9.8
CVE-2017-15700 NOMISEC HIGH
Apache Sling Authentication Service < 1.4.2 - Information Disclosure
A flaw in the org.apache.sling.auth.core.AuthUtil#isRedirectValid method in Apache Sling Authentication Service 1.4.0 allows an attacker, through the Sling login form, to trick a victim to send over their credentials.
by andikahilmy
CVSS 8.8
CVE-2018-17187 NOMISEC HIGH
Apache Qpid Pro - Info Disclosure
The Apache Qpid Proton-J transport includes an optional wrapper layer to perform TLS, enabled by use of the 'transport.ssl(...)' methods. Unless a verification mode was explicitly configured, client and server modes previously defaulted as documented to not verifying a peer certificate, with options to configure this explicitly or select a certificate verification mode with or without hostname verification being performed. The latter hostname verifying mode was not implemented in Apache Qpid Proton-J versions 0.3 to 0.29.0, with attempts to use it resulting in an exception. This left only the option to verify the certificate is trusted, leaving such a client vulnerable to Man In The Middle (MITM) attack. Uses of the Proton-J protocol engine which do not utilise the optional transport TLS wrapper are not impacted, e.g. usage within Qpid JMS. Uses of Proton-J utilising the optional transport TLS wrapper layer that wish to enable hostname verification must be upgraded to version 0.30.0 or later and utilise the VerifyMode#VERIFY_PEER_NAME configuration, which is now the default for client mode usage unless configured otherwise.
by dawetmaster
CVSS 7.4
CVE-2018-17187 NOMISEC HIGH
Apache Qpid Pro - Info Disclosure
The Apache Qpid Proton-J transport includes an optional wrapper layer to perform TLS, enabled by use of the 'transport.ssl(...)' methods. Unless a verification mode was explicitly configured, client and server modes previously defaulted as documented to not verifying a peer certificate, with options to configure this explicitly or select a certificate verification mode with or without hostname verification being performed. The latter hostname verifying mode was not implemented in Apache Qpid Proton-J versions 0.3 to 0.29.0, with attempts to use it resulting in an exception. This left only the option to verify the certificate is trusted, leaving such a client vulnerable to Man In The Middle (MITM) attack. Uses of the Proton-J protocol engine which do not utilise the optional transport TLS wrapper are not impacted, e.g. usage within Qpid JMS. Uses of Proton-J utilising the optional transport TLS wrapper layer that wish to enable hostname verification must be upgraded to version 0.30.0 or later and utilise the VerifyMode#VERIFY_PEER_NAME configuration, which is now the default for client mode usage unless configured otherwise.
by andikahilmy
CVSS 7.4
CVE-2018-7489 NOMISEC CRITICAL
Fasterxml Jackson-databind < 2.7.9.3 - Remote Code Execution
FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.
by dawetmaster
CVSS 9.8
CVE-2018-7489 NOMISEC CRITICAL
Fasterxml Jackson-databind < 2.7.9.3 - Remote Code Execution
FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.
by andikahilmy
CVSS 9.8
CVE-2018-1000873 NOMISEC MEDIUM
Fasterxml Jackson <2.9.8 - DoS
Fasterxml Jackson version Before 2.9.8 contains a CWE-20: Improper Input Validation vulnerability in Jackson-Modules-Java8 that can result in Causes a denial-of-service (DoS). This attack appear to be exploitable via The victim deserializes malicious input, specifically very large values in the nanoseconds field of a time value. This vulnerability appears to have been fixed in 2.9.8.
by dawetmaster
CVSS 6.5
CVE-2018-1000873 NOMISEC MEDIUM
Fasterxml Jackson <2.9.8 - DoS
Fasterxml Jackson version Before 2.9.8 contains a CWE-20: Improper Input Validation vulnerability in Jackson-Modules-Java8 that can result in Causes a denial-of-service (DoS). This attack appear to be exploitable via The victim deserializes malicious input, specifically very large values in the nanoseconds field of a time value. This vulnerability appears to have been fixed in 2.9.8.
by andikahilmy
CVSS 6.5
CVE-2017-1000208 NOMISEC HIGH
Swagger-Parser <=1.0.30 - RCE
A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
by dawetmaster
CVSS 8.8
CVE-2017-1000208 NOMISEC HIGH
Swagger-Parser <=1.0.30 - RCE
A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
by andikahilmy
CVSS 8.8
CVE-2020-35217 NOMISEC HIGH
Eclipse Vert.x-web < 4.0.0-milestone5 - CSRF
Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.
by dawetmaster
CVSS 8.8
CVE-2020-35217 NOMISEC HIGH
Eclipse Vert.x-web < 4.0.0-milestone5 - CSRF
Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.
by andikahilmy
CVSS 8.8
CVE-2014-3651 NOMISEC HIGH
Keycloak < 1.0.3 - Denial of Service
JBoss KeyCloak before 1.0.3.Final allows remote attackers to cause a denial of service (resource consumption) via a large value in the size parameter to auth/qrcode, related to QR code generation.
by dawetmaster
CVSS 7.5
CVE-2014-3651 NOMISEC HIGH
Keycloak < 1.0.3 - Denial of Service
JBoss KeyCloak before 1.0.3.Final allows remote attackers to cause a denial of service (resource consumption) via a large value in the size parameter to auth/qrcode, related to QR code generation.
by andikahilmy
CVSS 7.5