Lucene search

K

6 matches found

CVE
CVE
added 2021/03/18 5:15 a.m.74 views

CVE-2021-3141

In Unisys Stealth (core) before 6.0.025.0, the Keycloak password is stored in a recoverable format that might be accessible by a local attacker, who could gain access to the Management Server and change the Stealth configuration.

7.8CVSS7.6AI score0.00042EPSS
CVE
CVE
added 2021/07/15 7:15 p.m.51 views

CVE-2021-35056

Unisys Stealth 5.1 before 5.1.025.0 and 6.0 before 6.0.055.0 has an unquoted Windows search path for a scheduled task. An unintended executable might run.

6.7CVSS6.6AI score0.00057EPSS
CVE
CVE
added 2018/02/19 7:29 p.m.36 views

CVE-2018-6592

Unisys Stealth 3.3 Windows endpoints before 3.3.016.1 allow local users to gain access to Stealth-enabled devices by leveraging improper cleanup of memory used for negotiation key storage.

7.8CVSS7.7AI score0.00051EPSS
CVE
CVE
added 2020/06/22 8:15 p.m.33 views

CVE-2020-12053

In Unisys Stealth 3.4.x, 4.x and 5.x before 5.0.026, if certificate-based authorization is used without HTTPS, an endpoint could be authorized without a private key.

9.8CVSS9.3AI score0.0022EPSS
CVE
CVE
added 2020/10/01 5:15 p.m.28 views

CVE-2020-24620

Unisys Stealth(core) before 4.0.134 stores passwords in a recoverable format. Therefore, a search of Enterprise Manager can potentially reveal credentials.

7.8CVSS7.5AI score0.00041EPSS
CVE
CVE
added 2021/04/20 4:15 p.m.26 views

CVE-2021-28492

Unisys Stealth (core) 5.x before 5.0.048.0, 5.1.x before 5.1.017.0, and 6.x before 6.0.037.0 stores passwords in a recoverable format.

4.9CVSS5.2AI score0.00258EPSS