Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Ivanti | Endpoint Manager Mobile | 12.5.0.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | An authentication bypass in Ivanti Endpoint Manager Mobile allowing attackers to access protected resources without proper credentials. This leads to unauthenticated Remote Code Execution via unsafe userinput in one of the bean validators which is sink for Server-Side Template Injection. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-4427.yaml | POC Details |
| 2 | None | https://github.com/watchtowrlabs/watchTowr-vs-Ivanti-EPMM-CVE-2025-4427-CVE-2025-4428 | POC Details |
| 3 | Detection for CVE-2025-4427 and CVE-2025-4428 | https://github.com/rxerium/CVE-2025-4427-CVE-2025-4428 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-22462 | 9.8 CRITICAL | Ivanti Neurons for ITSM 安全漏洞 |
| CVE-2025-22460 | 7.8 HIGH | Ivanti Cloud Services Application 安全漏洞 |
| CVE-2025-4428 | 7.2 HIGH | Remote Code Execution |
No comments yet