Filtered by vendor Ivanti
Subscriptions
Total
320 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-38041 | 2 Ivanti, Microsoft | 2 Secure Access Client, Windows | 2024-08-02 | 7.0 High |
A logged in user may elevate its permissions by abusing a Time-of-Check to Time-of-Use (TOCTOU) race condition. When a particular process flow is initiated, an attacker can exploit this condition to gain unauthorized elevated privileges on the affected system. | ||||
CVE-2023-35082 | 1 Ivanti | 1 Endpoint Manager Mobile | 2024-08-02 | 9.8 Critical |
An authentication bypass vulnerability in Ivanti EPMM 11.10 and older, allows unauthorized users to access restricted functionality or resources of the application without proper authentication. This vulnerability is unique to CVE-2023-35078 announced earlier. | ||||
CVE-2023-35080 | 2 Ivanti, Microsoft | 2 Secure Access Client, Windows | 2024-08-02 | 7.8 High |
A vulnerability has been identified in the Ivanti Secure Access Windows client, which could allow a locally authenticated attacker to exploit a vulnerable configuration, potentially leading to various security risks, including the escalation of privileges, denial of service, or information disclosure. | ||||
CVE-2023-32562 | 1 Ivanti | 1 Avalanche | 2024-08-02 | 9.8 Critical |
An unrestricted upload of file with dangerous type vulnerability exists in Avalanche versions 6.3.x and below that could allow an attacker to achieve a remove code execution. Fixed in version 6.4.1. | ||||
CVE-2023-32560 | 1 Ivanti | 1 Avalanche | 2024-08-02 | 9.8 Critical |
An attacker can send a specially crafted message to the Wavelink Avalanche Manager, which could result in service disruption or arbitrary code execution. Thanks to a Researcher at Tenable for finding and reporting. Fixed in version 6.4.1. | ||||
CVE-2023-32561 | 1 Ivanti | 1 Avalanche | 2024-08-02 | 7.5 High |
A previously generated artifact by an administrator could be accessed by an attacker. The contents of this artifact could lead to authentication bypass. Fixed in version 6.4.1. | ||||
CVE-2023-28323 | 1 Ivanti | 1 Endpoint Manager | 2024-08-02 | 9.8 Critical |
A deserialization of untrusted data exists in EPM 2022 Su3 and all prior versions that allows an unauthenticated user to elevate rights. This exploit could potentially be used in conjunction with other OS (Operating System) vulnerabilities to escalate privileges on the machine or be used as a stepping stone to get to other network attached machines. | ||||
CVE-2023-28127 | 1 Ivanti | 1 Avalanche | 2024-08-02 | 7.5 High |
A path traversal vulnerability exists in Avalanche version 6.3.x and below that when exploited could result in possible information disclosure. | ||||
CVE-2023-28126 | 1 Ivanti | 1 Avalanche | 2024-08-02 | 5.9 Medium |
An authentication bypass vulnerability exists in Avalanche versions 6.3.x and below that could allow an attacker to gain access by exploiting the SetUser method or can exploit the Race Condition in the authentication message. | ||||
CVE-2023-28128 | 1 Ivanti | 1 Avalanche | 2024-08-02 | 7.2 High |
An unrestricted upload of file with dangerous type vulnerability exists in Avalanche versions 6.3.x and below that could allow an attacker to achieve a remove code execution. | ||||
CVE-2023-28125 | 1 Ivanti | 1 Avalanche | 2024-08-02 | 5.9 Medium |
An improper authentication vulnerability exists in Avalanche Premise versions 6.3.x and below that could allow an attacker to gain access to the server by registering to receive messages from the server and perform an authentication bypass. | ||||
CVE-2024-37381 | 1 Ivanti | 1 Endpoint Manager | 2024-08-02 | N/A |
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2024 flat allows an authenticated attacker within the same network to execute arbitrary code. | ||||
CVE-2024-27978 | 1 Ivanti | 1 Avalanche | 2024-08-02 | N/A |
A Null Pointer Dereference vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows an authenticated remote attacker to perform denial of service attacks. | ||||
CVE-2024-27977 | 1 Ivanti | 1 Avalanche | 2024-08-02 | N/A |
A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to delete arbitrary files, thereby leading to Denial-of-Service. | ||||
CVE-2024-27975 | 1 Ivanti | 1 Avalanche | 2024-08-02 | N/A |
An Use-after-free vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM. | ||||
CVE-2024-27976 | 1 Ivanti | 1 Avalanche | 2024-08-02 | N/A |
A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM. | ||||
CVE-2024-22024 | 1 Ivanti | 3 Connect Secure, Policy Secure, Zero Trust Access | 2024-08-01 | 8.3 High |
An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and ZTA gateways which allows an attacker to access certain restricted resources without authentication. | ||||
CVE-2024-22026 | 1 Ivanti | 1 Endpoint Manager Mobile | 2024-08-01 | 6.7 Medium |
A local privilege escalation vulnerability in EPMM before 12.1.0.0 allows an authenticated local user to bypass shell restriction and execute arbitrary commands on the appliance. | ||||
CVE-2024-21887 | 1 Ivanti | 2 Connect Secure, Policy Secure | 2024-08-01 | 9.1 Critical |
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. | ||||
CVE-2024-21888 | 1 Ivanti | 2 Connect Secure, Policy Secure | 2024-08-01 | 8.8 High |
A privilege escalation vulnerability in web component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows a user to elevate privileges to that of an administrator. |