Zach Hanley, a security researcher from Horizon3.ai, is credited for identifying and reporting these issues.

These flaws could allow attackers to bypass authentication mechanisms, access sensitive data, or disable program blocking.

These flaws could let authenticated attackers bypass authentication checks, escalate privileges, and gain access to restricted information.

ivanti

spot_img

source: www.techworm.net