Show filters
423 Total Results
Displaying 301-310 of 423
Sort by:
Attacker Value
Unknown
CVE-2022-36971
Disclosure Date: March 29, 2023 (last updated February 24, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Avalanche 6.3.2.3490. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the JwtTokenUtility class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15301.
0
Attacker Value
Unknown
CVE-2022-44574
Disclosure Date: March 10, 2023 (last updated February 24, 2025)
An improper authentication vulnerability exists in Avalanche version 6.3.x and below allows unauthenticated attacker to modify properties on specific port.
0
Attacker Value
Unknown
CVE-2022-35259
Disclosure Date: December 05, 2022 (last updated February 24, 2025)
XML Injection with Endpoint Manager 2022. 3 and below causing a download of a malicious file to run and possibly execute to gain unauthorized privileges.
0
Attacker Value
Unknown
CVE-2022-35258
Disclosure Date: December 05, 2022 (last updated February 24, 2025)
An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1.
0
Attacker Value
Unknown
CVE-2022-35254
Disclosure Date: December 05, 2022 (last updated February 24, 2025)
An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1.
0
Attacker Value
Unknown
CVE-2022-27773
Disclosure Date: December 05, 2022 (last updated October 08, 2023)
A privilege escalation vulnerability is identified in Ivanti EPM (LANDesk Management Suite) that allows a user to execute commands with elevated privileges.
0
Attacker Value
Unknown
CVE-2022-21826
Disclosure Date: September 30, 2022 (last updated February 24, 2025)
Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.
0
Attacker Value
Unknown
CVE-2022-30121
Disclosure Date: September 23, 2022 (last updated October 08, 2023)
The “LANDesk(R) Management Agent” service exposes a socket and once connected, it is possible to launch commands only for signed executables. This is a security bug that allows a limited user to get escalated admin privileges on their system.
0
Attacker Value
Unknown
CVE-2021-44720
Disclosure Date: August 12, 2022 (last updated February 24, 2025)
In Ivanti Pulse Secure Pulse Connect Secure (PCS) before 9.1R12, the administrator password is stored in the HTML source code of the "Maintenance > Push Configuration > Targets > Target Name" targets.cgi screen. A read-only administrative user can escalate to a read-write administrative role.
0
Attacker Value
Unknown
CVE-2022-22572
Disclosure Date: April 11, 2022 (last updated October 07, 2023)
A non-admin user with user management permission can escalate his privilege to admin user via password reset functionality. The vulnerability affects Incapptic Connect version < 1.40.1.
0