Vulnerabilities
Vulnerable Software
Netscout:  >> Ngeniusone  >> 6.3.2  Security Vulnerabilities
NETSCOUT nGeniusONE before 6.4.0 b2350 allows local users to leverage Insecure Permissions for the nGeniusCLI File.
CVSS Score
7.1
EPSS Score
0.0
Published
2025-04-25
NETSCOUT nGeniusONE before 6.4.0 b2350 has a Broken Authorization Schema for the report module.
CVSS Score
7.5
EPSS Score
0.0
Published
2025-04-25
NETSCOUT nGeniusONE before 6.4.0 b2350 allows Technical Information Disclosure via a Stack Trace.
CVSS Score
7.5
EPSS Score
0.0
Published
2025-04-25
NETSCOUT nGeniusONE before 6.4.0 b2350 allows Stored Cross-Site Scripting (XSS) via a certain POST parameter.
CVSS Score
6.1
EPSS Score
0.0
Published
2025-04-25
NETSCOUT nGeniusONE before 6.4.0 b2350 has Hardcoded Credentials that can be obtained from JAR files.
CVSS Score
9.8
EPSS Score
0.001
Published
2025-04-25
NETSCOUT nGeniusONE before 6.4.0 b2350 has a Sensitive File Accessible Without Proper Authentication to an endpoint.
CVSS Score
7.5
EPSS Score
0.0
Published
2025-04-25
NETSCOUT nGeniusONE before 6.4.0 b2350 allows Arbitrary File Creation by authenticated users.
CVSS Score
6.5
EPSS Score
0.0
Published
2025-04-25
Improper File Permissions in NetScout nGeniusONE 6.3.2 build 904 allows authenticated remote users to gain permissions via a crafted payload.
CVSS Score
8.8
EPSS Score
0.011
Published
2023-01-27
An issue was discovered in NetScout nGeniusONE 6.3.2 build 904. Open Redirection can occur (issue 1 of 2). After successful login, an attacker must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host. The attack vector is Network, and the Attack Complexity required is High. Privileges required are administrator, User Interaction is required, and Scope is unchanged. The user must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host.
CVSS Score
3.1
EPSS Score
0.002
Published
2023-01-27
An issue was discovered in NetScout nGeniusONE 6.3.2 build 904. Open Redirection can occur (issue 2 of 2). After successful login, an attacker must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host. The attack vector is Network, and the Attack Complexity required is High. Privileges required are administrator, User Interaction is required, and Scope is unchanged. The user must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host.
CVSS Score
3.5
EPSS Score
0.002
Published
2023-01-27


Contact Us

Shodan ® - All rights reserved