Filtered by vendor Resi
Subscriptions
Filtered by product Gemini-net
Subscriptions
Total
3 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-29540 | 1 Resi | 1 Gemini-net | 2024-11-21 | 6.1 Medium |
resi-calltrace in RESI Gemini-Net 4.2 is affected by Multiple XSS issues. Unauthenticated remote attackers can inject arbitrary web script or HTML into an HTTP GET parameter that reflects user input without sanitization. This exists on numerous application endpoints, | ||||
CVE-2022-29539 | 1 Resi | 1 Gemini-net | 2024-11-21 | 9.8 Critical |
resi-calltrace in RESI Gemini-Net 4.2 is affected by OS Command Injection. It does not properly check the parameters sent as input before they are processed on the server. Due to the lack of validation of user input, an unauthenticated attacker can bypass the syntax intended by the software (e.g., concatenate `&|;\r\ commands) and inject arbitrary system commands with the privileges of the application user. | ||||
CVE-2022-29538 | 1 Resi | 1 Gemini-net | 2024-11-21 | 5.3 Medium |
RESI Gemini-Net Web 4.2 is affected by Improper Access Control in authorization logic. An unauthenticated user is able to access some critical resources. |
Page 1 of 1.