Common Vulnerabilities and Exposures (CVE)

CVE-2024-4465

Sep 20, 2024 12:21:58 UTC

An access control vulnerability was discovered in the Reports section due to a specific access restriction not being properly enforced for users with limited privileges. If a logged-in user with reporting privileges learns how to create ...

CVE-2023-49000

Sep 20, 2024 12:20:58 UTC

An issue in ArtistScope ArtisBrowser v.34.1.5 and before allows an attacker to bypass intended access restrictions via interaction with the com.artis.browser.IntentReceiverActivity component. NOTE: this is disputed by the vendor, who indica...

CVE-2024-0218

Sep 20, 2024 12:19:42 UTC

A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted mal...

CVE-2023-2567

Sep 20, 2024 12:17:25 UTC

A SQL Injection vulnerability has been found in Nozomi Networks Guardian and CMC, due to improper input validation in certain parameters used in the Query functionality. Authenticated users may be able to execute arbitrary SQL statements on...

CVE-2024-47085

Sep 20, 2024 12:15:03 UTC

This vulnerability exists in Apex Softcell LD DP Back Office due to improper validation of certain parameters (cCdslClicentcode and cLdClientCode) in the API endpoint. An authenticated remote attacker could exploit this vulnerability by man...

CVE-2023-24477

Sep 20, 2024 12:13:36 UTC

In certain conditions, depending on timing and the usage of the Chrome web browser, Guardian/CMC versions before 22.6.2 do not always completely invalidate the user session upon logout. Thus an authenticated local attacker may gain acces to...

CVE-2023-23903

Sep 20, 2024 12:09:31 UTC

An authenticated administrator can upload a SAML configuration file with the wrong format, with the application not checking the correct file format. Every subsequent application request will return an error. The whole application in rende...

CVE-2023-24015

Sep 20, 2024 12:07:25 UTC

A partial DoS vulnerability has been detected in the Reports section, exploitable by a malicious authenticated user forcing a report to be saved with its name set as null. The reports section will be partially unavailable for all later att...

CVE-2023-22843

Sep 20, 2024 12:04:39 UTC

An authenticated attacker with administrative access to the web management interface can inject malicious JavaScript code inside the definition of a Threat Intelligence rule, that will be stored and can later be executed by another legitima...

CVE-2023-23574

Sep 20, 2024 11:59:12 UTC

A blind SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in the alerts_count component, allows an authenticated attacker to execute arbitrary SQL statements on the DBMS used by the web applic...

CVE-2023-22378

Sep 20, 2024 11:53:39 UTC

A blind SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in the sorting parameter, allows an authenticated attacker to execute arbitrary SQL statements on the DBMS used by the web application...

CVE-2023-6916

Sep 20, 2024 11:47:45 UTC

Audit records for OpenAPI requests may include sensitive information. This could lead to unauthorized accesses and privilege escalation.

CVE-2024-8007

Sep 20, 2024 11:42:57 UTC

A flaw was found in the Red Hat OpenStack Platform (RHOSP) director. This vulnerability allows an attacker to deploy potentially compromised container images via disabling TLS certificate verification for registry mirrors, which could enabl...

CVE-2023-5253

Sep 20, 2024 11:38:34 UTC

A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication. Malicious unauthent...

CVE-2023-29245

Sep 20, 2024 10:48:14 UTC

A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, may allow an unauthenticated attacker to execute arbitrary SQL st...