Page 3 of 18 results (0.008 seconds)

CVSS: 7.0EPSS: 0%CPEs: 2EXPL: 0

In certain conditions, depending on timing and the usage of the Chrome web browser, Guardian/CMC versions before 22.6.2 do not always completely invalidate the user session upon logout. Thus an authenticated local attacker may gain acces to the original user's session. • https://security.nozominetworks.com/NN-2023:8-01 • CWE-384: Session Fixation •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

Due to improper input validation in the Alerts controller, a SQL injection vulnerability in Nozomi Networks Guardian and CMC allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application. • https://security.nozominetworks.com/NN-2023:1-01 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.6EPSS: 0%CPEs: 2EXPL: 0

Improper Input Validation vulnerability in project file upload in Nozomi Networks Guardian and CMC allows an authenticated attacker with admin or import manager roles to execute unattended commands on the appliance using web server user privileges. This issue affects: Nozomi Networks Guardian versions prior to 22.0.0. Nozomi Networks CMC versions prior to 22.0.0. Una vulnerabilidad de comprobación de entrada inapropiada en la carga de archivos de proyectos en Nozomi Networks Guardian y CMC permite a un atacante autenticado con roles de administrador o administrador de importaciones ejecutar comandos desatendidos en el dispositivo usando privilegios de usuario del servidor web. Este problema afecta a: Nozomi Networks Guardian versiones anteriores a 22.0.0. • https://security.nozominetworks.com/NN-2022:2-02 • CWE-20: Improper Input Validation •

CVSS: 8.6EPSS: 0%CPEs: 2EXPL: 0

Improper Input Validation vulnerability in custom report logo upload in Nozomi Networks Guardian, and CMC allows an authenticated attacker with admin or report manager roles to execute unattended commands on the appliance using web server user privileges. This issue affects: Nozomi Networks Guardian versions prior to 22.0.0. Nozomi Networks CMC versions prior to 22.0.0. Una vulnerabilidad de comprobación de entrada inapropiada en la carga de logotipos de informes personalizados en Nozomi Networks Guardian y CMC permite a un atacante autenticado con funciones de administrador o administrador de informes ejecutar comandos desatendidos en el dispositivo usando privilegios de usuario del servidor web. Este problema afecta a: Nozomi Networks Guardian versiones anteriores a 22.0.0. • https://security.nozominetworks.com/NN-2022:2-01 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 0%CPEs: 4EXPL: 0

OS Command Injection vulnerability when changing date settings or hostname using web GUI of Nozomi Networks Guardian and CMC allows authenticated administrators to perform remote code execution. This issue affects: Nozomi Networks Guardian 20.0.7.3 version 20.0.7.3 and prior versions. Nozomi Networks CMC 20.0.7.3 version 20.0.7.3 and prior versions. Una vulnerabilidad de inyección de comandos del Sistema Operativo cuando se cambia la configuración de fecha o el nombre de host usando la GUI web de Nozomi Networks Guardian y CMC, permite a administradores autenticados llevar a cabo una ejecución de código remota . Este problema afecta a: Nozomi Networks Guardian versión 20.0.7.3 versión 20.0.7.3 y versiones anteriores. • https://security.nozominetworks.com/NN-2021:1-01 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •