Filtered by vendor 2n Subscriptions
Total 9 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-59783 1 2n 1 Access Commander 2026-03-05 N/A
API endpoint for user synchronization in 2N Access Commander version 3.4.1 did not have a sufficient input validation allowing for OS command injection. This vulnerability can only be exploited after authenticating with administrator privileges.
CVE-2025-59784 1 2n 1 Access Commander 2026-03-05 N/A
2N Access Commander version 3.4.1 and prior is vulnerable to log pollution. Certain parameters sent over API may be included in the logs without prior validation or sanitisation. This vulnerability can only be exploited after authenticating with administrator privileges.
CVE-2025-59785 1 2n 1 Access Commander 2026-03-05 N/A
Improper validation of API end-point in 2N Access Commander version 3.4.2 and prior allows attacker to bypass password policy for backup file encryption. This vulnerability can only be exploited after authenticating with administrator privileges.
CVE-2025-59786 1 2n 1 Access Commander 2026-03-05 N/A
2N Access Commander version 3.4.2 and prior improperly invalidates session tokens, allowing multiple session cookies to remain active after logout in web application.
CVE-2025-59787 1 2n 1 Access Commander 2026-03-05 N/A
2N Access Commander application version 3.4.2 and prior returns HTTP 500 Internal Server Error responses when receiving malformed or manipulated requests, indicating improper handling of invalid input and potential security or availability impacts.
CVE-2024-47253 1 2n 1 Access Commander 2026-01-09 7.2 High
In 2N Access Commander versions 3.1.1.2 and prior, a Path Traversal vulnerability could allow an attacker with administrative privileges to write files on the filesystem and potentially achieve arbitrary remote code execution. This vulnerability cannot be exploited by users with lower privilege roles.
CVE-2024-47255 1 2n 1 Access Commander 2026-01-09 4.7 Medium
In 2N Access Commander versions 3.1.1.2 and prior, a local attacker can escalate their privileges in the system which could allow for arbitrary code execution with root permissions.
CVE-2024-47254 1 2n 1 Access Commander 2026-01-09 6.3 Medium
In 2N Access Commander versions 3.1.1.2 and prior, an Insufficient Verification of Data Authenticity vulnerability could allow an attacker to escalate their privileges and gain root access to the system.
CVE-2021-31399 1 2n 2 Access Unit 2.0, Access Unit 2.0 Firmware 2025-05-30 4.6 Medium
On 2N Access Unit 2.0 2.31.0.40.5 devices, an attacker can pose as the web relay for a man-in-the-middle attack.