Page 3 of 19 results (0.007 seconds)

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

A blind SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in the sorting parameter, allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application. Authenticated users can extract arbitrary information from the DBMS in an uncontrolled way. Una vulnerabilidad de inyección blind SQL en Guardian y CMC de Nozomi Networks, debido a una validación de entrada incorrecta en el parámetro de ordenación, permite a un atacante autenticado ejecutar consultas SQL arbitrarias en el DBMS utilizado por la aplicación web. Los usuarios autenticados pueden extraer información arbitraria del DBMS de forma incontrolada. A blind SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in the sorting parameter, allows an authenticated attacker to execute arbitrary SQL statements on the DBMS used by the web application. Authenticated users may be able to extract arbitrary information from the DBMS in an uncontrolled way, alter its structure and data, and/or affect its availability. • https://security.nozominetworks.com/NN-2023:2-01 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.0EPSS: 0%CPEs: 2EXPL: 0

In certain conditions, depending on timing and the usage of the Chrome web browser, Guardian/CMC versions before 22.6.2 do not always completely invalidate the user session upon logout. Thus an authenticated local attacker may gain acces to the original user's session. • https://security.nozominetworks.com/NN-2023:8-01 • CWE-384: Session Fixation •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

Due to improper input validation in the Alerts controller, a SQL injection vulnerability in Nozomi Networks Guardian and CMC allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application. • https://security.nozominetworks.com/NN-2023:1-01 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.6EPSS: 0%CPEs: 2EXPL: 0

Improper Input Validation vulnerability in project file upload in Nozomi Networks Guardian and CMC allows an authenticated attacker with admin or import manager roles to execute unattended commands on the appliance using web server user privileges. This issue affects: Nozomi Networks Guardian versions prior to 22.0.0. Nozomi Networks CMC versions prior to 22.0.0. Una vulnerabilidad de comprobación de entrada inapropiada en la carga de archivos de proyectos en Nozomi Networks Guardian y CMC permite a un atacante autenticado con roles de administrador o administrador de importaciones ejecutar comandos desatendidos en el dispositivo usando privilegios de usuario del servidor web. Este problema afecta a: Nozomi Networks Guardian versiones anteriores a 22.0.0. • https://security.nozominetworks.com/NN-2022:2-02 • CWE-20: Improper Input Validation •

CVSS: 8.6EPSS: 0%CPEs: 2EXPL: 0

Improper Input Validation vulnerability in custom report logo upload in Nozomi Networks Guardian, and CMC allows an authenticated attacker with admin or report manager roles to execute unattended commands on the appliance using web server user privileges. This issue affects: Nozomi Networks Guardian versions prior to 22.0.0. Nozomi Networks CMC versions prior to 22.0.0. Una vulnerabilidad de comprobación de entrada inapropiada en la carga de logotipos de informes personalizados en Nozomi Networks Guardian y CMC permite a un atacante autenticado con funciones de administrador o administrador de informes ejecutar comandos desatendidos en el dispositivo usando privilegios de usuario del servidor web. Este problema afecta a: Nozomi Networks Guardian versiones anteriores a 22.0.0. • https://security.nozominetworks.com/NN-2022:2-01 • CWE-20: Improper Input Validation •