Zero-Day

Questa pagina contiene i riferimenti alle vulnerabilità 0day individuate dal Security Team di AlmavivA, come parte delle attività di ricerca.

La nostra Disclosure Policy La nostra Responsible Disclosure Policy

CVE-2023-38342

WSO2

Inject JavaScript code within the WSO2 Identity server application using the URL of the login.

CVE-2022-30769

ZoneMinder

Session fixation exists in ZoneMinder through 1.36.12 as an attacker can poison a session cookie to the next logged-in user.

CVE-2022-30768

ZoneMinder

A Stored Cross Site Scripting (XSS) issue in ZoneMinder 1.36.12 allows an attacker to execute HTML or JavaScript code via the Username field when an Admin (or non-Admin users that can see other users logged into the platform) clicks on Logout.

JCV-2022.11.10.02

Zscaler

This vulnerability allows the user to rename the system folders of the Zscaler Client Connector, blocking the services’ restart, configuring the agent in Turn Off and to navigate the web while avoiding the requests’ redirect through the protected tunnel.

JCV-2022.11.10.01

Zscaler

This vulnerability allows the user to rename the system folders of the Zscaler Client Connector, bypassing the password request throughout the phase of the agent removal.

CVE-2022-44023

PwnDoc

PwnDoc through 0.5.3 allows remote attackers to identify disabled user account names by leveraging response messages for authentication attempts.

CVE-2022-44022

PwnDoc

PwnDoc through 0.5.3 might allow remote attackers to identify valid user account names by leveraging response timings for authentication attempts.

JVC-2022.10.18.01

Mark of the Web (MotW)

The vulnerability allows malicious users to execute malicious code on target systems, preventing Windows from setting the “Mark of the Web” flag on files extracted from an archive

JVC-2022.06.13.01

Open Graph

Abuse of Open Graph protocol for creating previews to misleading links to the detriment of WhatsApp users

CVE-2022-2072

Name Directory – Plugin WordPress

The Name Directory WordPress plugin before 1.25.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting. Furthermore, as the payload is also saved into the database after the request, it leads to a Stored XSS as well

CVE-2022-2071

Name Directory – Plugin WordPress

The Name Directory WordPress plugin before 1.25.4 does not have CSRF check when importing names, and is also lacking sanitisation as well as escaping in some of the imported data, which could allow attackers to make a logged in admin import arbitrary names with XSS payloads in them.

JCV-2021.08.05.01

Google Bot

This authentication mechanism allows a malicious site to show legitimate content to Googlebot in order to be indexed and made reachable to users, and malicious content at the same time for users.

CVE-2021-41594

RSA Archer

RSA Archer 6.9.SP1 P3 suffer of a privilege escalation vulnerability letting administrators access presumibily inaccessible functionalities.

CVE-2021-40511

Mastro – OBDA systems

OBDA systems’ Mastro 1.0 is vulnerable to XML Entity Expansion (aka “billion laughs”) attack allowing denial of service.

CVE-2021-40510

Mastro – OBDA systems

XML eXternal Entity (XXE) in OBDA systems’ Mastro 1.0 allows remote attackers to read system files via custom DTDs.

CVE-2021-38269

Liferay Portal

Cross-site scripting (XSS) vulnerability in the Gogo Shell module in Liferay Portal 7.1.0 through 7.3.6 and 7.4.0 allows remote attackers to inject arbitrary web script or HTML via the output of a Gogo Shell command.

CVE-2021-36761

Qlik Sense

The GeoAnalytics feature in Qlik Sense April 2020 patch 4 allows remote attackers to perform internal port scanning via SSRF.

CVE-2021-36760

WSO2 Identity Server

DOM-based XSS attack in WSO2 Identity Server 5.7.0 allows remote attackers to inject arbitrary web script in password reset procedure. This vulnerability can be used to perform Open Redirection attacks too.

CVE-2020-23488

L.E.F Radio Web Streamer

Blind Command Injection in L.E.F. srl Radio Web Streamer 1.0 allows an
authenticated attacker to execute arbitrary command on the target system via specially crafted HTTP POST request.

CVE-2020-23487

L.E.F Radio Web Streamer

Arbitrary File Upload in L.E.F. srl Radio Web Streamer 1.0 allows an
authenticated attacker to upload arbitrary file on the target system, hence
executing arbitrary command by uploading a PHP file.

CVE-2020-23486

L.E.F Radio Web Streamer

 

Unauthenticated Command Injection in L.E.F. srl Radio Web Streamer 1.0 allows  an attacker to execute arbitrary command on the target system.

CVE-2020-14608

Oracle Fusion Middleware MapViewer

 

This vulnerability allows unauthenticated attacker with network access via HTTP to create, delete, edit critical data and read accessible data.

CVE-2020-14607

Oracle Fusion Middleware MapViewer

 

This vulnerability allows unauthenticated attacker with network access via HTTP to update, insert, delete and partially read accessible data.

CVE-2020-14997

ASiM – Archimista

An Insecure Direct Object Reference (IDOR) in Archimista 3.1.0 allows authenticated attacker to read and export all the reports in the application.

CVE-2020-14996

ASiM – Archimista

An arbitrary file read in Archimista 3.1.0 allows remote attacker to read arbitrary files on the file system.

CVE-2020-14995

ASiM – Archimista

A SQL injection in Archimista 3.1.0 allows remote attacker to execute arbitrary query on the database via the “term” parameter.

CVE-2020-14994

ASiM – Archimista

A SQL injection in Archimista 3.1.0 allows remote attacker to execute arbitrary query on the database via the “order” parameter.

CVE-2020-10785

Targa Telematics

 

Dettagli non pubblici

CVE-2020-10784

Targa Telematics

Dettagli non pubblici

CVE-2019-19866

Atos Unify OpenScape UC Application

Atos Unify OpenScape UC Web Client V9 before version V9 R4.31.0 and V10 before version V10 R0.6.0 allows remote attackers to obtain sensitive information. By iterating the value of conferenceId to getMailFunction in the JSON API, one can enumerate all conferences scheduled on the platform, with their numbers and access PINs.

CVE-2019-19865

Atos Unify OpenScape UC Application

 

Atos Unify OpenScape UC Application V9 before version V9 R4.31.0 and V10 before version V10 R0.6.0 allows XSS. An attacker could exploit this by convincing an authenticated user to inject arbitrary JavaScript code in the Profile Name field. A browser would execute this stored XSS payload.

CVE-2019-17227

Atos Unify OpenScape UC Application

Dettagli non pubblici