Vulnerabilities (CVE)

Filtered by vendor Resi Subscribe
Filtered by product Gemini-net
Total 3 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-29540 1 Resi 1 Gemini-net 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
resi-calltrace in RESI Gemini-Net 4.2 is affected by Multiple XSS issues. Unauthenticated remote attackers can inject arbitrary web script or HTML into an HTTP GET parameter that reflects user input without sanitization. This exists on numerous application endpoints,
CVE-2022-29539 1 Resi 1 Gemini-net 2024-11-21 10.0 HIGH 9.8 CRITICAL
resi-calltrace in RESI Gemini-Net 4.2 is affected by OS Command Injection. It does not properly check the parameters sent as input before they are processed on the server. Due to the lack of validation of user input, an unauthenticated attacker can bypass the syntax intended by the software (e.g., concatenate `&|;\r\ commands) and inject arbitrary system commands with the privileges of the application user.
CVE-2022-29538 1 Resi 1 Gemini-net 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
RESI Gemini-Net Web 4.2 is affected by Improper Access Control in authorization logic. An unauthenticated user is able to access some critical resources.