Export limit exceeded: 324387 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (25 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2021-26725 1 Nozominetworks 2 Central Management Control, Guardian 2024-11-21 7.2 High
Path Traversal vulnerability when changing timezone using web GUI of Nozomi Networks Guardian, CMC allows an authenticated administrator to read-protected system files. This issue affects: Nozomi Networks Guardian 20.0.7.3 version 20.0.7.3 and prior versions. Nozomi Networks CMC 20.0.7.3 version 20.0.7.3 and prior versions.
CVE-2021-26724 1 Nozominetworks 2 Central Management Control, Guardian 2024-11-21 7.2 High
OS Command Injection vulnerability when changing date settings or hostname using web GUI of Nozomi Networks Guardian and CMC allows authenticated administrators to perform remote code execution. This issue affects: Nozomi Networks Guardian 20.0.7.3 version 20.0.7.3 and prior versions. Nozomi Networks CMC 20.0.7.3 version 20.0.7.3 and prior versions.
CVE-2020-7049 1 Nozominetworks 1 Guardian 2024-11-21 7.3 High
Nozomi Networks OS before 19.0.4 allows /#/network?tab=network_node_list.html CSV Injection.
CVE-2020-15307 1 Nozominetworks 1 Guardian 2024-11-21 6.1 Medium
Nozomi Guardian before 19.0.4 allows attackers to achieve stored XSS (in the web front end) by leveraging the ability to create a custom field with a crafted field name.
CVE-2024-4465 1 Nozominetworks 2 Cmc, Guardian 2024-09-20 6 Medium
An access control vulnerability was discovered in the Reports section due to a specific access restriction not being properly enforced for users with limited privileges. If a logged-in user with reporting privileges learns how to create a specific application request, they might be able to make limited changes to the reporting configuration. This could result in a partial loss of data integrity. In Guardian/CMC instances with a reporting configuration, there could be limited Denial of Service (DoS) impacts, as the reports may not reach their intended destination, and there could also be limited information disclosure impacts. Furthermore, modifying the destination SMTP server for the reports could lead to the compromise of external credentials, as they might be sent to an unauthorized server. This could expand the scope of the attack.