Total vulnerabilities in the database
A logged in user can modify specific files that may lead to unauthorized changes in system-wide configuration settings. This vulnerability could be exploited to compromise the integrity and security of the network on the affected system.
Software | From | Fixed in |
---|---|---|
ivanti / secure_access_client | 22.2-r1 | 22.2-r1.x |
ivanti / secure_access_client | 22.3-r1 | 22.3-r1.x |
ivanti / secure_access_client | 22.3-r2 | 22.3-r2.x |
ivanti / secure_access_client | 22.3-r3 | 22.3-r3.x |