Page 3 of 12 results (0.001 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Ivanti Workspace Control before 10.3.10.0 and RES One Workspace. A local authenticated user can decrypt the encrypted datastore or relay server password by leveraging an unspecified attack vector. Se ha descubierto un problema en Ivanti Workspace Control en versiones anteriores a la 10.3.10.0 y RES One Workspace. Un usuario local autenticado puede descifrar el almacén de datos o reproducir las contraseñas del servidor aprovechando un vector de ataque sin especificar. • http://packetstormsecurity.com/files/149616/Ivanti-Workspace-Control-Registry-Stored-Credentials.html http://seclists.org/fulldisclosure/2018/Oct/3 https://community.ivanti.com/docs/DOC-69693 https://seclists.org/bugtraq/2018/Oct/5 https://www.securify.nl/en/advisory/SFY20180804/stored-credentials-ivanti-workspace-control-can-be-retrieved-from-registry.html •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Ivanti Workspace Control before 10.3.0.0 and RES One Workspace, when file and folder security are configured. A local authenticated user can bypass file and folder security restriction by leveraging an unspecified attack vector. Se ha descubierto un problema en Ivanti Workspace Control en versiones anteriores a la 10.3.0.0 y RES One Workspace, cuando se configura la seguridad en archivos y carpetas. Un usuario local autenticado puede omitir las restricciones de seguridad en archivos y carpetas aprovechando un vector de ataque sin especificar. • http://packetstormsecurity.com/files/149617/Ivanti-Workspace-Control-UNC-Path-Data-Security-Bypass.html http://seclists.org/fulldisclosure/2018/Oct/2 https://community.ivanti.com/docs/DOC-69682 https://seclists.org/bugtraq/2018/Oct/10 https://www.securify.nl/en/advisory/SFY20180803/ivanti-workspace-control-data-security-bypass-via-localhost-unc-path.html •