Filtered by vendor Jamf
Subscribe
Total
9 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-29564 | 1 Jamf | 1 Private Access | 2022-06-14 | 5.0 MEDIUM | 7.5 HIGH |
Jamf Private Access before 2022-05-16 has Incorrect Access Control, in which an unauthorized user can reach a system in the internal infrastructure, aka WND-44801. | |||||
CVE-2021-39303 | 1 Jamf | 1 Jamf | 2021-12-16 | 7.5 HIGH | 9.8 CRITICAL |
The server in Jamf Pro before 10.32.0 has an SSRF vulnerability, aka PI-006352. NOTE: Jamf Nation will also publish an article about this vulnerability. | |||||
CVE-2021-40809 | 1 Jamf | 1 Jamf | 2021-12-01 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in Jamf Pro before 10.32.0, aka PI-009921. An account can be granted incorrect privileges in response to authentication that uses specific sign-on workflows. | |||||
CVE-2021-35037 | 1 Jamf | 1 Jamf | 2021-07-22 | 5.8 MEDIUM | 6.1 MEDIUM |
Jamf Pro before 10.30.1 allows for an unvalidated URL redirect vulnerability affecting Jamf Pro customers who host their environments on-premises. An attacker may craft a URL that appears to be for a customer's Jamf Pro instance, but when clicked will forward a user to an arbitrary URL that may be malicious. This is tracked via Jamf with the following ID: PI-009822 | |||||
CVE-2021-30125 | 1 Jamf | 1 Jamf | 2021-04-08 | 4.3 MEDIUM | 6.1 MEDIUM |
Jamf Pro before 10.28.0 allows XSS related to inventory history, aka PI-009376. | |||||
CVE-2019-9146 | 1 Jamf | 1 Self Service | 2020-08-24 | 7.9 HIGH | 7.5 HIGH |
Jamf Self Service 10.9.0 allows man-in-the-middle attackers to obtain a root shell by leveraging the "publish Bash shell scripts" feature to insert "/Applications/Utilities/Terminal app/Contents/MacOS/Terminal" into the TCP data stream. | |||||
CVE-2018-10465 | 1 Jamf | 1 Jamf | 2020-08-24 | 6.5 MEDIUM | 8.8 HIGH |
Jamf Pro 10.x before 10.3.0 has Incorrect Access Control. Jamf Pro user accounts and groups with access to log in to Jamf Pro had full access to endpoints in the Universal API (UAPI), regardless of account privileges or privilege sets. An authenticated Jamf Pro account without required privileges could be used to perform CRUD actions (GET, POST, PUT, DELETE) on UAPI endpoints, which could result in unauthorized information disclosure, compromised data integrity, and data loss. For a full listing of available UAPI endpoints and associated CRUD actions you can navigate to /uapi/doc in your instance of Jamf Pro. | |||||
CVE-2019-17076 | 1 Jamf | 1 Jamf | 2020-01-13 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in Jamf Pro 9.x and 10.x before 10.15.1. Deserialization of untrusted data when parsing JSON in several APIs may cause Denial of Service (DoS), remote code execution (RCE), and/or deletion of files on the Jamf Pro server. | |||||
CVE-2012-4051 | 1 Jamf | 1 Casper Suite | 2012-09-28 | 6.8 MEDIUM | N/A |
Multiple cross-site request forgery (CSRF) vulnerabilities in editAccount.html in the JAMF Software Server (JSS) interface in JAMF Casper Suite before 8.61 allow remote attackers to hijack the authentication of administrators for requests that (1) create user accounts or (2) change passwords via a Save action. |