Nomisec Exploits

21,936 exploits tracked across all sources.

Sort: Activity Stars
CVE-2021-35042 NOMISEC CRITICAL
Django <3.1.13, <3.2.5 - SQL Injection
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
by r4vi
5 stars
CVSS 9.8
CVE-2021-26855 NOMISEC CRITICAL
Microsoft Exchange ProxyLogon RCE
Microsoft Exchange Server Remote Code Execution Vulnerability
by thau0x01
8 stars
CVSS 9.1
CVE-2022-20699 NOMISEC CRITICAL
Cisco Rv340 Firmware < 1.0.03.24 - Denial of Service
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
by puckiestyle
CVSS 10.0
CVE-2022-24348 NOMISEC HIGH
Argo CD <2.1.9 & <2.2.4 - Path Traversal
Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal related to Helm charts because of an error in helmTemplate in repository.go. For example, an attacker may be able to discover credentials stored in a YAML file.
by DeveloperOl
CVSS 7.7
CVE-2021-26084 NOMISEC CRITICAL
Atlassian Confluence Server and Data Center - OGNL Injection
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.
by 0xf4n9x
72 stars
CVSS 9.8
CVE-2019-7609 NOMISEC CRITICAL
Kibana Timelion Prototype Pollution RCE
Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
by wolf1892
CVSS 10.0
CVE-2020-7980 NOMISEC CRITICAL
Intellian Aptus Web 1.24 - OS Command Injection via Q Field in JSON Data
Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS commands via the Q field within JSON data to the cgi-bin/libagent.cgi URI. NOTE: a valid sid cookie for a login to the intellian default account might be needed.
by Xh4H
73 stars
CVSS 9.8
CVE-2021-42013 NOMISEC CRITICAL
Apache HTTP Server < 9.2.6.0 - Path Traversal
It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.
by twseptian
2 stars
CVSS 9.8
CVE-2022-21999 NOMISEC HIGH
Windows Print Spooler - Privilege Escalation
Windows Print Spooler Elevation of Privilege Vulnerability
by ly4k
797 stars
CVSS 7.8
CVE-2019-2205 NOMISEC CRITICAL
Android -<8.0, 8.1, 9, 10 - Memory Corruption
In ProxyResolverV8::SetPacScript of proxy_resolver_v8.cc, there is a possible memory corruption due to a use after free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-139806216
by aemmitt-ns
4 stars
CVSS 9.8
CVE-2022-21877 NOMISEC MEDIUM
Microsoft Windows 10 - Out-of-Bounds Read
Storage Spaces Controller Information Disclosure Vulnerability
by Big5-sec
5 stars
CVSS 5.5
CVE-2012-1876 NOMISEC
Microsoft Internet Explorer - Code Injection
Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
by ExploitCN
CVE-2021-44228 NOMISEC CRITICAL
Log4Shell HTTP Header Injection
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
by LemonCraftRu
CVSS 10.0
CVE-2022-20699 NOMISEC CRITICAL
Cisco Rv340 Firmware < 1.0.03.24 - Denial of Service
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
by Audiobahn
238 stars
CVSS 10.0
CVE-2020-35749 NOMISEC HIGH
Presstigers Simple Board Job < 2.9.3 - Path Traversal
Directory traversal vulnerability in class-simple_job_board_resume_download_handler.php in the Simple Board Job plugin 2.9.3 and earlier for WordPress allows remote attackers to read arbitrary files via the sjb_file parameter to wp-admin/post.php.
by M4xSec
5 stars
CVSS 7.7
CVE-2022-21882 NOMISEC HIGH
Win32k ConsoleControl Offset Confusion
Win32k Elevation of Privilege Vulnerability
by sailay1996
49 stars
CVSS 7.0
CVE-2017-0505 NOMISEC HIGH
Android < 7.1.1 - Privilege Escalation in MediaTek Components
An elevation of privilege vulnerability in MediaTek components, including the M4U driver, sound driver, touchscreen driver, GPU driver, and Command Queue driver, could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: N/A. Android ID: A-31822282. References: M-ALPS02992041.
by R0rt1z2
6 stars
CVSS 7.8
CVE-2020-7934 NOMISEC MEDIUM
Liferay Portal 7.1.0-7.2.1 GA2 - Stored Cross-Site Scripting in User Account Name Fields
In LifeRay Portal CE 7.1.0 through 7.2.1 GA2, the First Name, Middle Name, and Last Name fields for user accounts in MyAccountPortlet are all vulnerable to a persistent XSS issue. Any user can modify these fields with a particular XSS payload, and it will be stored in the database. The payload will then be rendered when a user utilizes the search feature to search for other users (i.e., if a user with modified fields occurs in the search results). This issue was fixed in Liferay Portal CE version 7.3.0 GA1.
by giardinas-dev
CVSS 5.4
CVE-2022-21882 NOMISEC HIGH
Win32k ConsoleControl Offset Confusion
Win32k Elevation of Privilege Vulnerability
by L4ys
200 stars
CVSS 7.0
CVE-2019-16516 NOMISEC MEDIUM
ConnectWise Control <19.3.25270.7185 - Info Disclosure
An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. There is a user enumeration vulnerability, allowing an unauthenticated attacker to determine with certainty if an account exists for a given username.
by czz
CVSS 5.3
CVE-2019-18276 NOMISEC HIGH
GNU Bash <5.0.11 - Privilege Escalation
An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.
by SABI-Ensimag
CVSS 7.8
CVE-2020-14321 NOMISEC HIGH
Moodle Teacher Enrollment Privilege Escalation to RCE
In Moodle before 3.9.1, 3.8.4, 3.7.7 and 3.5.13, teachers of a course were able to assign themselves the manager role within that course.
by f0ns1
2 stars
CVSS 8.8
CVE-2022-21882 NOMISEC HIGH
Win32k ConsoleControl Offset Confusion
Win32k Elevation of Privilege Vulnerability
by David-Honisch
8 stars
CVSS 7.0
CVE-2014-3153 NOMISEC HIGH
Linux Kernel <=3.14.5 - Privilege Escalation
The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
by c4mx
CVSS 7.8
CVE-2019-17497 NOMISEC MEDIUM
Pdf-xchange Editor < 8.0.330.0 - Insufficiently Protected Credentials
Tracker PDF-XChange Editor before 8.0.330.0 has an NTLM SSO hash theft vulnerability using crafted FDF or XFDF files (a related issue to CVE-2018-4993). For example, an NTLM hash is sent for a link to \\192.168.0.2\C$\file.pdf without user interaction.
by JM-Lemmi
CVSS 6.5