296,733
Total vulnerabilities in the database
When a particular process flow is initiated, an attacker may be able to gain unauthorized elevated privileges on the affected system when having control over a specific file.
| Software | From | Fixed in |
|---|---|---|
| ivanti / secure_access_client | 22.2-r1 | 22.2-r1.x |
| ivanti / secure_access_client | 22.3-r1 | 22.3-r1.x |
| ivanti / secure_access_client | 22.3-r2 | 22.3-r2.x |
| ivanti / secure_access_client | 22.3-r3 | 22.3-r3.x |