Show filters
26 Total Results
Displaying 11-20 of 26
Sort by:
Attacker Value
Unknown
CVE-2022-36781
Disclosure Date: September 28, 2022 (last updated September 17, 2024)
ConnectWise ScreenConnect versions 22.6 and below contained a flaw allowing potential brute force attacks on custom access tokens due to inadequate rate-limiting controls in the default configuration. Attackers could exploit this vulnerability to gain unauthorized access by repeatedly attempting access code combinations. ConnectWise has addressed this issue in later versions by implementing rate-limiting controls as a preventive measure against brute force attacks.
0
Attacker Value
Unknown
CVE-2021-35066
Disclosure Date: June 21, 2021 (last updated November 28, 2024)
An XXE vulnerability exists in ConnectWise Automate before 2021.0.6.132.
0
Attacker Value
Unknown
CVE-2021-32582
Disclosure Date: June 17, 2021 (last updated November 28, 2024)
An issue was discovered in ConnectWise Automate before 2021.5. A blind SQL injection vulnerability exists in core agent inventory communication that can enable an attacker to extract database information or administrative credentials from an instance via crafted monitor status responses.
0
Attacker Value
Unknown
CVE-2020-15838
Disclosure Date: October 09, 2020 (last updated February 22, 2025)
The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions.
0
Attacker Value
Unknown
CVE-2020-15027
Disclosure Date: July 16, 2020 (last updated February 21, 2025)
ConnectWise Automate through 2020.x has insufficient validation on certain authentication paths, allowing authentication bypass via a series of attempts. This was patched in 2020.7 and in a hotfix for 2019.12.
0
Attacker Value
Unknown
CVE-2020-15008
Disclosure Date: July 07, 2020 (last updated February 21, 2025)
A SQLi exists in the probe code of all Connectwise Automate versions before 2020.7 or 2019.12. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation. As the code creates dynamic SQL for the insert statement and utilizes the user supplied table name with little validation, the table name can be modified to allow arbitrary update commands to be run. Usage of other SQL injection techniques such as timing attacks, it is possible to perform full data extraction as well. Patched in 2020.7 and in a hotfix for 2019.12.
0
Attacker Value
Unknown
CVE-2020-14159
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
By using an Automate API in ConnectWise Automate before 2020.5.178, a remote authenticated user could execute commands and/or modifications within an individual Automate instance by triggering an SQL injection vulnerability in /LabTech/agent.aspx. This affects versions before 2019.12.337, 2020 before 2020.1.53, 2020.2 before 2020.2.85, 2020.3 before 2020.3.114, 2020.4 before 2020.4.143, and 2020.5 before 2020.5.178.
0
Attacker Value
Unknown
CVE-2019-16516
Disclosure Date: January 23, 2020 (last updated February 21, 2025)
An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. There is a user enumeration vulnerability, allowing an unauthenticated attacker to determine with certainty if an account exists for a given username.
0
Attacker Value
Unknown
CVE-2019-16513
Disclosure Date: January 23, 2020 (last updated February 21, 2025)
An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. CSRF can be used to send API requests.
0
Attacker Value
Unknown
CVE-2019-16512
Disclosure Date: January 23, 2020 (last updated February 21, 2025)
An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. There is stored XSS in the Appearance modifier.
0