2 results (0.005 seconds)

CVSS: 9.8EPSS: 97%CPEs: 1EXPL: 3

A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration. Una vulnerabilidad de seguridad en MICS Admin Portal en Ivanti MobileIron Sentry versiones 9.18.0 y anteriores, que puede permitir a un atacante eludir los controles de autenticación en la interfaz administrativa debido a una configuración insuficientemente restrictiva de Apache HTTPD . Ivanti Sentry, formerly known as MobileIron Sentry, contains an authentication bypass vulnerability that may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration. • https://github.com/mind2hex/CVE-2023-38035 https://github.com/horizon3ai/CVE-2023-38035 http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface • CWE-863: Incorrect Authorization •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

MobileIron VSP < 5.9.1 and Sentry < 5.0 has a weak password obfuscation algorithm MobileIron VSP versiones anteriores a 5.9.1 y Sentry versiones anteriores a 5.0, poseen un algoritmo débil de ofuscación de contraseña. MobileIron VSP versions prior to 5.9.1 and Sentry versions prior to 5.0 suffer from password obfuscation and XPath injection vulnerabilities. • http://seclists.org/fulldisclosure/2014/Apr/21 https://exchange.xforce.ibmcloud.com/vulnerabilities/92352 • CWE-326: Inadequate Encryption Strength •