Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Ivanti | Endpoint Manager Mobile | 12.5.0.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | An authentication bypass in Ivanti Endpoint Manager Mobile allowing attackers to access protected resources without proper credentials. This leads to unauthenticated Remote Code Execution via unsafe userinput in one of the bean validators which is sink for Server-Side Template Injection. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-4427.yaml | POC Details |
| 2 | None | https://github.com/watchtowrlabs/watchTowr-vs-Ivanti-EPMM-CVE-2025-4427-CVE-2025-4428 | POC Details |
| 3 | Detection for CVE-2025-4427 and CVE-2025-4428 | https://github.com/rxerium/CVE-2025-4427-CVE-2025-4428 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet