Filtered by vendor Securepoint
                        
                        Subscribe
                        
                        
                    
                    
                
                    Total
                    4 CVE
                
            | CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 | 
|---|---|---|---|---|---|
| CVE-2023-22620 | 1 Securepoint | 1 Unified Threat Management | 2025-02-10 | N/A | 7.5 HIGH | 
| An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall's endpoint at /spcgi.cgi allows sessionid information disclosure via an invalid authentication attempt. This can afterwards be used to bypass the device's authentication and get access to the administrative interface. | |||||
| CVE-2023-22897 | 1 Securepoint | 1 Unified Threat Management | 2025-02-10 | N/A | 6.5 MEDIUM | 
| An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall's endpoint at /spcgi.cgi allows information disclosure of memory contents to be achieved by an authenticated user. Essentially, uninitialized data can be retrieved via an approach in which a sessionid is obtained but not used. | |||||
| CVE-2023-47101 | 1 Securepoint | 1 Openvpn-client | 2024-11-21 | N/A | 7.8 HIGH | 
| The installer (aka openvpn-client-installer) in Securepoint SSL VPN Client before 2.0.40 allows local privilege escalation during installation or repair. | |||||
| CVE-2021-35523 | 1 Securepoint | 1 Openvpn-client | 2024-11-21 | 7.2 HIGH | 7.8 HIGH | 
| Securepoint SSL VPN Client v2 before 2.0.32 on Windows has unsafe configuration handling that enables local privilege escalation to NT AUTHORITY\SYSTEM. A non-privileged local user can modify the OpenVPN configuration stored under "%APPDATA%\Securepoint SSL VPN" and add a external script file that is executed as privileged user. | |||||
