Filtered by vendor Devolutions
Subscriptions
Total
87 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-3781 | 1 Devolutions | 2 Devolutions Server, Remote Desktop Manager | 2025-05-05 | 6.5 Medium |
Dashlane password and Keepass Server password in My Account SettingsĀ are not encrypted in the database in Devolutions Remote Desktop Manager 2022.2.26 and prior versions and Devolutions Server 2022.3.1 and prior versions which allows database users to read the data. This issue affects : Remote Desktop Manager 2022.2.26 and prior versions. Devolutions Server 2022.3.1 and prior versions. | ||||
CVE-2022-3780 | 1 Devolutions | 1 Remote Desktop Manager | 2025-05-05 | 7.5 High |
Database connections on deleted users could stay active on MySQL data sources in Remote Desktop Manager 2022.3.7 and below which allow deleted users to access unauthorized data. This issue affects : Remote Desktop Manager 2022.3.7 and prior versions. | ||||
CVE-2022-3641 | 1 Devolutions | 1 Remote Desktop Manager | 2025-04-23 | 8.8 High |
Elevation of privilege in the Azure SQL Data Source in Devolutions Remote Desktop Manager 2022.3.13 to 2022.3.24 allows an authenticated user to spoof a privileged account. | ||||
CVE-2022-4287 | 1 Devolutions | 1 Remote Desktop Manager | 2025-04-14 | 8.8 High |
Authentication bypass in local application lock feature in Devolutions Remote Desktop ManagerĀ 2022.3.26 and earlier on Windows allows malicious user to access the application. | ||||
CVE-2022-26964 | 1 Devolutions | 1 Remote Desktop Manager | 2025-04-14 | 7.4 High |
Weak password derivation for export in Devolutions Remote Desktop Manager before 2022.1 allows information disclosure via a password brute-force attack. An error caused base64 to be decoded. | ||||
CVE-2023-0463 | 1 Devolutions | 1 Remote Desktop Manager | 2025-04-02 | 7.8 High |
The force offline MFA prompt setting is not respected when switching to offline mode in Devolutions Remote Desktop Manager 2022.3.29 to 2022.3.30 allows a user to save sensitive data on disk. | ||||
CVE-2024-6057 | 1 Devolutions | 1 Remote Desktop Manager | 2025-03-28 | 9.8 Critical |
Improper authentication in the vault password feature in Devolutions Remote Desktop Manager 2024.1.31.0 and earlier allows an attacker that has compromised an access to an RDM instance to bypass the vault master password via the offline mode feature. | ||||
CVE-2024-6055 | 1 Devolutions | 1 Remote Desktop Manager | 2025-03-28 | 4.7 Medium |
Improper removal of sensitive information in data source export feature in Devolutions Remote Desktop Manager 2024.1.32.0 and earlier on Windows allows an attacker that obtains the exported settings to recover powershell credentials configured on the data source via stealing the configuration file. | ||||
CVE-2025-2280 | 1 Devolutions | 1 Devolutions Server | 2025-03-28 | 8.1 High |
Improper access control in web extension restriction feature in Devolutions Server 2024.3.4.0 and earlier allows an authenticated user to bypass the browser extension restriction feature. | ||||
CVE-2025-2278 | 1 Devolutions | 1 Devolutions Server | 2025-03-28 | 6.5 Medium |
Improper access control in temporary access requests and checkout requests endpoints in Devolutions Server 2024.3.13 and earlier allows an authenticated user to access information about these requests via a known request ID. | ||||
CVE-2025-2277 | 1 Devolutions | 1 Devolutions Server | 2025-03-28 | 7.5 High |
Exposure of password in web-based SSH authentication component in Devolutions Server 2024.3.13 and earlier allows a user to unadvertently leak his SSH password due to missing password masking. | ||||
CVE-2025-2003 | 1 Devolutions | 1 Devolutions Server | 2025-03-28 | 7.1 High |
Incorrect authorization in PAM vaults in Devolutions Server 2024.3.12 and earlier allows an authenticated user to bypass the 'add in root' permission. | ||||
CVE-2024-5072 | 1 Devolutions | 1 Devolutions Server | 2025-03-28 | 6.5 Medium |
Improper input validation in PAM JIT elevation feature in Devolutions Server 2024.1.11.0 and earlier allows an authenticated user with access to the PAM JIT elevation feature to manipulate the LDAP filter query via a specially crafted request. | ||||
CVE-2024-4846 | 1 Devolutions | 1 Devolutions Server | 2025-03-28 | 6.3 Medium |
Authentication bypass in the 2FA feature in Devolutions Server 2024.1.14.0 and earlier allows an authenticated attacker to authenticate to another user without being asked for the 2FA via another browser tab. | ||||
CVE-2024-12148 | 1 Devolutions | 1 Devolutions Server | 2025-03-28 | 4.3 Medium |
Incorrect authorization in permission validation component in Devolutions Server 2024.3.6.0 and earlier allows an authenticated user to access some reporting endpoints. | ||||
CVE-2024-12151 | 1 Devolutions | 1 Devolutions Server | 2025-03-28 | 5 Medium |
Incorrect permission assignment in the user migration feature in Devolutions Server 2024.3.8.0 and earlier allows users to retain their old permission sets. | ||||
CVE-2024-12196 | 1 Devolutions | 1 Devolutions Server | 2025-03-28 | 6.5 Medium |
Incorrect authorization in the permission component in Devolutions Server 2024.3.7.0 and earlier allows an authenticated user to view the password history of an entry without the view password permission. | ||||
CVE-2025-1231 | 1 Devolutions | 1 Devolutions Server | 2025-03-28 | 5.4 Medium |
Improper password reset in PAM Module in Devolutions Server 2024.3.10.0 and earlier allows an authenticated user to reuse the oracle user password after check-in due to crash in the password reset functionality. | ||||
CVE-2024-6492 | 1 Devolutions | 1 Remote Desktop Manager | 2025-03-28 | 7.4 High |
Exposure of Sensitive Information in edge browser session proxy feature in Devolutions Remote Desktop Manager 2024.2.14.0 and earlier on Windows allows an attacker to intercept proxy credentials via a specially crafted website. | ||||
CVE-2024-11670 | 1 Devolutions | 1 Remote Desktop Manager | 2025-03-28 | 5.4 Medium |
Incorrect authorization in the permission validation component of Devolutions Remote Desktop Manager 2024.2.21 and earlier on Windows allows a malicious authenticated user to bypass the "View Password" permission via specific actions. |