Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
connectwise automate vulnerabilities and exploits
(subscribe to this query)
10
CVSSv3
CVE-2024-1709
ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
Connectwise Screenconnect
1 Metasploit module
6 Github repositories
11 Articles
9.8
CVSSv3
CVE-2023-22518
All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated malicious user to reset Confluence and create a Confluence instance administrator account. Using this account, an ...
Atlassian Confluence Data Center
Atlassian Confluence Data Center 8.6.0
Atlassian Confluence Server
Atlassian Confluence Server 8.6.0
1 Metasploit module
11 Github repositories
4 Articles
9.8
CVSSv3
CVE-2023-46747
Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. Note: Software versions which have reached End of Techni...
F5 Big-ip Access Policy Manager
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Advanced Web Application Firewall
F5 Big-ip Carrier-grade Nat
F5 Big-ip Ddos Hybrid Defender
F5 Big-ip Ssl Orchestrator
F5 Big-ip Domain Name System
F5 Big-ip Local Traffic Manager
F5 Big-ip Policy Enforcement Manager
F5 Big-ip Automation Toolchain
F5 Big-ip Container Ingress Services
F5 Big-ip Application Security Manager
F5 Big-ip Analytics
F5 Big-ip Application Acceleration Manager
F5 Big-ip Application Visibility And Reporting
F5 Big-ip Fraud Protection Services
F5 Big-ip Global Traffic Manager
F5 Big-ip Link Controller
F5 Big-ip Webaccelerator
F5 Big-ip Websafe
1 Metasploit module
12 Github repositories
4 Articles
9.8
CVSSv3
CVE-2021-35066
An XXE vulnerability exists in ConnectWise Automate prior to 2021.0.6.132.
Connectwise Automate
9.8
CVSSv3
CVE-2020-15027
ConnectWise Automate up to and including 2020.x has insufficient validation on certain authentication paths, allowing authentication bypass via a series of attempts. This was patched in 2020.7 and in a hotfix for 2019.12.
Connectwise Automate
8.8
CVSSv3
CVE-2020-15838
The Agent Update System in ConnectWise Automate prior to 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions.
Connectwise Automate
8.8
CVSSv3
CVE-2020-14159
By using an Automate API in ConnectWise Automate prior to 2020.5.178, a remote authenticated user could execute commands and/or modifications within an individual Automate instance by triggering an SQL injection vulnerability in /LabTech/agent.aspx. This affects versions prior to...
Connectwise Automate Api
8.1
CVSSv3
CVE-2023-47257
ConnectWise ScreenConnect up to and including 23.8.4 allows man-in-the-middle malicious users to achieve remote code execution via crafted messages.
Connectwise Screenconnect
Connectwise Automate -
7.5
CVSSv3
CVE-2021-32582
An issue exists in ConnectWise Automate prior to 2021.5. A blind SQL injection vulnerability exists in core agent inventory communication that can enable an malicious user to extract database information or administrative credentials from an instance via crafted monitor status re...
Connectwise Connectwise Automate
7.5
CVSSv3
CVE-2020-15008
A SQLi exists in the probe code of all Connectwise Automate versions prior to 2020.7 or 2019.12. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation. As the code creates dynamic SQL for the insert statement an...
Connectwise Connectwise Automate 2019.12
Connectwise Connectwise Automate
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »