漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
HTML injection in Schedule Restore Archive in Guardian/CMC before 26.1.0
Vulnerability Description
A Stored HTML Injection vulnerability was discovered in the Schedule Restore Archive functionality due to improper validation of an input parameter. An authenticated user with administrative privileges can define a malicious restore schedule containing HTML tags. When a victim views the affected schedule, the injected HTML renders in their browser, enabling phishing and possibly open redirect attacks. Full XSS exploitation and direct information disclosure are prevented by the existing input validation and Content Security Policy configuration.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
Nozomi Networks Guardian和Nozomi Networks CMC 跨站脚本漏洞
Vulnerability Description
Nozomi Networks Guardian和Nozomi Networks CMC都是美国Nozomi Networks公司的产品。Nozomi Networks Guardian是一款物联网设备和软件检查系统。Nozomi Networks CMC是一个应用软件。提供集中的OT和IoT安全管理。 Nozomi Networks Guardian和Nozomi Networks CMC存在跨站脚本漏洞,该漏洞源于对输入参数验证不当导致的存储型HTML注入问题,允许具有管理权限的认证用户定义包含HTM
CVSS Information
N/A
Vulnerability Type
N/A