Page 23 of 264 results (0.008 seconds)

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

Allows an authenticated attacker with network access to read arbitrary files on Endpoint Manager recently discovered on 2022 SU3 and all previous versions potentially leading to the leakage of sensitive information. Permite que un atacante autenticado con acceso a la red lea archivos arbitrarios en Endpoint Manager descubierto recientemente en 2022 SU3 y todas las versiones anteriores, lo que podría provocar la fuga de información confidencial. • https://forums.ivanti.com/s/article/SA-2023-06-20-CVE-2023-35083?language=en_US •

CVSS: 9.8EPSS: 0%CPEs: 5EXPL: 0

Unsafe Deserialization of User Input could lead to Execution of Unauthorized Operations in Ivanti Endpoint Manager 2022 su3 and all previous versions, which could allow an attacker to execute commands remotely. La Deserialización Insegura de la Entrada del Usuario podría provocar la ejecución de operaciones no autorizadas en Ivanti Endpoint Manager 2022 su3 y todas las versiones anteriores, lo que podría permitir a un atacante ejecutar comandos de forma remota. • https://forums.ivanti.com/s/article/SA-2023-08-08-CVE-2023-35084?language=en_US • CWE-502: Deserialization of Untrusted Data •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

An XXE (XML external entity injection) vulnerability exists in the CSEP component of Ivanti Endpoint Manager before 2022 SU4. External entity references are enabled in the XML parser configuration. Exploitation of this vulnerability can lead to file disclosure or Server Side Request Forgery. Existe una vulnerabilidad XXE (inyección de entidad externa XML) en el componente CSEP de Ivanti Endpoint Manager antes de 2022 SU4. Las referencias a entidades externas están habilitadas en la configuración del analizador XML. • https://gist.github.com/bhyahoo/4772330b20057a271f77e690bc70f928 https://www.ivanti.com/releases • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

An issue was discovered in Ivanti Endpoint Manager before 2022 SU4. A file disclosure vulnerability exists in the GetFileContents SOAP action exposed via /landesk/managementsuite/core/core.secure/OsdScript.asmx. The application does not sufficiently restrict user-supplied paths, allowing for an authenticated attacker to read arbitrary files from a remote system, including the private key used to authenticate to agents for remote access. Se descubrió un problema en Ivanti Endpoint Manager antes de 2022 SU4. Existe una vulnerabilidad de divulgación de archivos en la acción SOAP GetFileContents expuesta a través de /landesk/managementsuite/core/core.secure/OsdScript.asmx. • https://gist.github.com/bhyahoo/76533e91840200a1d9f3fb1eb87eb0f1 https://www.ivanti.com/releases • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 97%CPEs: 1EXPL: 3

A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration. Una vulnerabilidad de seguridad en MICS Admin Portal en Ivanti MobileIron Sentry versiones 9.18.0 y anteriores, que puede permitir a un atacante eludir los controles de autenticación en la interfaz administrativa debido a una configuración insuficientemente restrictiva de Apache HTTPD . Ivanti Sentry, formerly known as MobileIron Sentry, contains an authentication bypass vulnerability that may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration. • https://github.com/mind2hex/CVE-2023-38035 https://github.com/horizon3ai/CVE-2023-38035 http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface • CWE-863: Incorrect Authorization •