A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to delete specific type of files and/or cause denial of service.
Max CVSS
7.1
EPSS Score
0.04%
Published
2024-04-19
Updated
2024-04-19
A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to delete arbitrary files, thereby leading to Denial-of-Service.
Max CVSS
7.1
EPSS Score
0.04%
Published
2024-04-19
Updated
2024-04-19
A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
Max CVSS
8.8
EPSS Score
0.04%
Published
2024-04-19
Updated
2024-04-19
A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
Max CVSS
8.8
EPSS Score
0.04%
Published
2024-04-19
Updated
2024-04-19
A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
Max CVSS
8.8
EPSS Score
0.04%
Published
2024-04-19
Updated
2024-04-19
A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
Max CVSS
8.8
EPSS Score
0.04%
Published
2024-04-19
Updated
2024-04-19
A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
Max CVSS
8.8
EPSS Score
0.04%
Published
2024-04-19
Updated
2024-04-19
A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
Max CVSS
8.8
EPSS Score
0.04%
Published
2024-04-19
Updated
2024-04-19
A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
Max CVSS
8.8
EPSS Score
0.04%
Published
2024-04-19
Updated
2024-04-19
A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
Max CVSS
8.8
EPSS Score
0.04%
Published
2024-04-19
Updated
2024-04-19
Directory Traversal vulnerability in Ivanti Avalanche 6.3.4.153 allows a remote authenticated attacker to obtain sensitive information via the javax.faces.resource component.
Max CVSS
6.5
EPSS Score
0.09%
Published
2024-01-25
Updated
2024-01-31

CVE-2023-35081

Known exploited
A path traversal vulnerability in Ivanti EPMM versions (11.10.x < 11.10.0.3, 11.9.x < 11.9.1.2 and 11.8.x < 11.8.1.2) allows an authenticated administrator to write arbitrary files onto the appliance.
Max CVSS
7.2
EPSS Score
67.23%
Published
2023-08-03
Updated
2023-08-08
CISA KEV Added
2023-07-31
An unauthenticated attacker could achieve the code execution through a RemoteControl server.
Max CVSS
9.8
EPSS Score
45.69%
Published
2023-08-10
Updated
2023-08-28
A path traversal vulnerability exists in Avalanche version 6.3.x and below that when exploited could result in possible information disclosure.
Max CVSS
7.5
EPSS Score
0.95%
Published
2023-05-09
Updated
2023-05-16
This vulnerability allows remote attackers to read arbitrary files on affected installations of Ivanti Avalanche 6.3.3.101. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the AgentTaskHandler class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose stored session cookies, leading to further compromise. Was ZDI-CAN-15967.
Max CVSS
7.5
EPSS Score
1.05%
Published
2023-03-29
Updated
2023-04-06
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Avalanche 6.3.3.101. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the DeviceLogResource class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15966.
Max CVSS
9.8
EPSS Score
9.13%
Published
2023-03-29
Updated
2023-04-06
Ivanti Avalanche (Premise) 6.3.2 allows remote unauthenticated users to read arbitrary files via Absolute Path Traversal. The imageFilePath parameter processed by the /AvalancheWeb/image endpoint is not verified to be within the scope of the image folder, e.g., the attacker can obtain sensitive information via the C:/Windows/system32/config/system.sav value.
Max CVSS
7.5
EPSS Score
95.08%
Published
2022-04-06
Updated
2022-04-13
A vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to perform an arbitrary file delete via a maliciously crafted web request.
Max CVSS
6.5
EPSS Score
0.08%
Published
2021-08-16
Updated
2024-02-27
A path traversal vulnerability exists in Pulse Connect Secure <9.1R8 that allowed an authenticated attacker via the administrator web interface to perform an arbitrary file reading vulnerability through Meeting.
Max CVSS
6.8
EPSS Score
0.09%
Published
2020-07-30
Updated
2024-02-27
A path traversal vulnerability exists in Pulse Connect Secure <9.1R8 which allows an authenticated attacker to read arbitrary files via the administrator web interface.
Max CVSS
4.9
EPSS Score
0.09%
Published
2020-07-30
Updated
2024-02-27

CVE-2019-11510

Known exploited
Public exploit
Used for ransomware
In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability .
Max CVSS
10.0
EPSS Score
97.30%
Published
2019-05-08
Updated
2024-02-27
CISA KEV Added
2021-11-03
In Pulse Secure Pulse Connect Secure (PCS) before 8.1R15.1, 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an authenticated attacker (via the admin web interface) can exploit Directory Traversal to execute arbitrary code on the appliance.
Max CVSS
8.6
EPSS Score
6.23%
Published
2019-05-08
Updated
2024-02-27
22 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!