Questa pagina contiene i riferimenti alle vulnerabilità 0day individuate dal Security Team di AlmavivA, come parte delle attività di ricerca.
CVC-2504-334
Lucy CybeRisk Vision
Denial of Service via insufficient input lenght validation
CVE-2023-38342
WSO2
Inject JavaScript code within the WSO2 Identity server application using the URL of the login.
CVE-2022-30769
ZoneMinder
Session fixation exists in ZoneMinder through 1.36.12 as an attacker can poison a session cookie to the next logged-in user.
CVE-2022-30768
ZoneMinder
A Stored Cross Site Scripting (XSS) issue in ZoneMinder 1.36.12 allows an attacker to execute HTML or JavaScript code via the Username field when an Admin (or non-Admin users that can see other users logged into the platform) clicks on Logout.
JCV-2022.11.10.02
Zscaler
This vulnerability allows the user to rename the system folders of the Zscaler Client Connector, blocking the services’ restart, configuring the agent in Turn Off and to navigate the web while avoiding the requests’ redirect through the protected tunnel.
JCV-2022.11.10.01
Zscaler
This vulnerability allows the user to rename the system folders of the Zscaler Client Connector, bypassing the password request throughout the phase of the agent removal.
CVE-2022-44023
PwnDoc
PwnDoc through 0.5.3 allows remote attackers to identify disabled user account names by leveraging response messages for authentication attempts.
CVE-2022-44022
PwnDoc
PwnDoc through 0.5.3 might allow remote attackers to identify valid user account names by leveraging response timings for authentication attempts.
JVC-2022.10.18.01
Mark of the Web (MotW)
The vulnerability allows malicious users to execute malicious code on target systems, preventing Windows from setting the “Mark of the Web” flag on files extracted from an archive
JVC-2022.06.13.01
Open Graph
Abuse of Open Graph protocol for creating previews to misleading links to the detriment of WhatsApp users
CVE-2022-2072
Name Directory – Plugin WordPress
The Name Directory WordPress plugin before 1.25.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting. Furthermore, as the payload is also saved into the database after the request, it leads to a Stored XSS as well
CVE-2022-2071
Name Directory – Plugin WordPress
The Name Directory WordPress plugin before 1.25.4 does not have CSRF check when importing names, and is also lacking sanitisation as well as escaping in some of the imported data, which could allow attackers to make a logged in admin import arbitrary names with XSS payloads in them.
JCV-2021.08.05.01
Google Bot
This authentication mechanism allows a malicious site to show legitimate content to Googlebot in order to be indexed and made reachable to users, and malicious content at the same time for users.
CVE-2021-41594
RSA Archer
RSA Archer 6.9.SP1 P3 suffer of a privilege escalation vulnerability letting administrators access presumibily inaccessible functionalities.
CVE-2021-40511
Mastro – OBDA systems
OBDA systems’ Mastro 1.0 is vulnerable to XML Entity Expansion (aka “billion laughs”) attack allowing denial of service.
CVE-2021-40510
Mastro – OBDA systems
XML eXternal Entity (XXE) in OBDA systems’ Mastro 1.0 allows remote attackers to read system files via custom DTDs.
CVE-2021-38269
Liferay Portal
Cross-site scripting (XSS) vulnerability in the Gogo Shell module in Liferay Portal 7.1.0 through 7.3.6 and 7.4.0 allows remote attackers to inject arbitrary web script or HTML via the output of a Gogo Shell command.
CVE-2021-36761
Qlik Sense
The GeoAnalytics feature in Qlik Sense April 2020 patch 4 allows remote attackers to perform internal port scanning via SSRF.
CVE-2021-36760
WSO2 Identity Server
DOM-based XSS attack in WSO2 Identity Server 5.7.0 allows remote attackers to inject arbitrary web script in password reset procedure. This vulnerability can be used to perform Open Redirection attacks too.
CVE-2020-23488
L.E.F Radio Web Streamer
Blind Command Injection in L.E.F. srl Radio Web Streamer 1.0 allows an
authenticated attacker to execute arbitrary command on the target system via specially crafted HTTP POST request.
CVE-2020-23487
L.E.F Radio Web Streamer
Arbitrary File Upload in L.E.F. srl Radio Web Streamer 1.0 allows an
authenticated attacker to upload arbitrary file on the target system, hence
executing arbitrary command by uploading a PHP file.
CVE-2020-23486
L.E.F Radio Web Streamer
Unauthenticated Command Injection in L.E.F. srl Radio Web Streamer 1.0 allows an attacker to execute arbitrary command on the target system.
CVE-2020-14608
Oracle Fusion Middleware MapViewer
This vulnerability allows unauthenticated attacker with network access via HTTP to create, delete, edit critical data and read accessible data.
CVE-2020-14607
Oracle Fusion Middleware MapViewer
This vulnerability allows unauthenticated attacker with network access via HTTP to update, insert, delete and partially read accessible data.
CVE-2020-14997
ASiM – Archimista
An Insecure Direct Object Reference (IDOR) in Archimista 3.1.0 allows authenticated attacker to read and export all the reports in the application.
CVE-2020-14996
ASiM – Archimista
An arbitrary file read in Archimista 3.1.0 allows remote attacker to read arbitrary files on the file system.
CVE-2020-14995
ASiM – Archimista
A SQL injection in Archimista 3.1.0 allows remote attacker to execute arbitrary query on the database via the “term” parameter.
CVE-2020-14994
ASiM – Archimista
A SQL injection in Archimista 3.1.0 allows remote attacker to execute arbitrary query on the database via the “order” parameter.
CVE-2019-19866
Atos Unify OpenScape UC Application
Atos Unify OpenScape UC Web Client V9 before version V9 R4.31.0 and V10 before version V10 R0.6.0 allows remote attackers to obtain sensitive information. By iterating the value of conferenceId to getMailFunction in the JSON API, one can enumerate all conferences scheduled on the platform, with their numbers and access PINs.
CVE-2019-19865
Atos Unify OpenScape UC Application
Atos Unify OpenScape UC Application V9 before version V9 R4.31.0 and V10 before version V10 R0.6.0 allows XSS. An attacker could exploit this by convincing an authenticated user to inject arbitrary JavaScript code in the Profile Name field. A browser would execute this stored XSS payload.