Stack-based overflow in Ivanti products enables remote code execution for unauthenticated attackers.
Reporter | Title | Published | Views | Family All 31 |
---|---|---|---|---|
![]() | CVE-2025-0282 | 8 Jan 202523:15 | – | nvd |
![]() | Ivanti Buffer Overflow Proof of Concept | 16 Jan 202500:00 | – | packetstorm |
![]() | Ivanti CVE-2025-0282 Checker | 14 Jan 202500:00 | – | packetstorm |
![]() | Ivanti Connect Secure IFT TLS Stack Overflow / Remote Code Execution | 16 Jan 202500:00 | – | packetstorm |
![]() | Exploit for Stack-based Buffer Overflow in Ivanti Connect Secure | 12 Jan 202511:58 | – | githubexploit |
![]() | Exploit for Stack-based Buffer Overflow in Ivanti Connect Secure | 16 Jan 202514:45 | – | githubexploit |
![]() | Exploit for Stack-based Buffer Overflow in Ivanti Connect Secure | 11 Jan 202502:06 | – | githubexploit |
![]() | Exploit for Stack-based Buffer Overflow in Ivanti Connect Secure | 15 Jan 202518:27 | – | githubexploit |
![]() | Exploit for Stack-based Buffer Overflow in Ivanti Connect Secure | 22 Jan 202508:14 | – | githubexploit |
![]() | Exploit for Stack-based Buffer Overflow in Ivanti Connect Secure | 28 Jan 202507:56 | – | githubexploit |
[
{
"defaultStatus": "unaffected",
"product": "Connect Secure",
"vendor": "Ivanti",
"versions": [
{
"lessThanOrEqual": "22.7R2.4",
"status": "affected",
"version": "22.7R2",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "22.7R2.5",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Policy Secure",
"vendor": "Ivanti",
"versions": [
{
"lessThanOrEqual": "22.7R1.2",
"status": "affected",
"version": "22.7R1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Neurons for ZTA gateways",
"vendor": "Ivanti",
"versions": [
{
"lessThanOrEqual": "22.7R2.3",
"status": "affected",
"version": "22.7R2",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "22.7R2.5",
"versionType": "custom"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo