Vulnerabilities (CVE)

Filtered by vendor Pega Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-32090 1 Pega 1 Pega Platform 2023-08-10 N/A 9.8 CRITICAL
Pega platform clients who are using versions 6.1 through 7.3.1 may be utilizing default credentials
CVE-2023-28094 1 Pega 1 Pega Platform 2023-08-05 N/A 9.8 CRITICAL
Pega platform clients who are using versions 7.4 through 8.8.x and have upgraded from a version prior to 8.x may be utilizing default credentials.
CVE-2021-27651 1 Pega 1 Infinity 2022-07-29 7.5 HIGH 9.8 CRITICAL
In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionality for local accounts can be used to bypass local authentication checks.
CVE-2022-24082 1 Pega 1 Infinity 2022-07-27 N/A 9.8 CRITICAL
If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads to attack the underlying system. This does not affect systems running on PegaCloud due to its design and architecture.
CVE-2020-15390 1 Pega 1 Pega Platform 2021-04-23 7.5 HIGH 9.8 CRITICAL
pyActivity in Pega Platform 8.4.0.237 has a security misconfiguration that leads to an improper access control vulnerability via =GetWebInfo.
CVE-2019-16374 1 Pega 1 Platform 2020-08-19 7.5 HIGH 9.8 CRITICAL
Pega Platform 8.2.1 allows LDAP injection because a username can contain a * character and can be of unlimited length. An attacker can specify four characters of a username, followed by the * character, to bypass access control.