Vulnerabilities > Unisys > Stealth
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-07-15 | CVE-2021-35056 | Unquoted Search Path or Element vulnerability in Unisys Stealth Unisys Stealth 5.1 before 5.1.025.0 and 6.0 before 6.0.055.0 has an unquoted Windows search path for a scheduled task. | 6.7 |
2021-04-20 | CVE-2021-28492 | Unspecified vulnerability in Unisys Stealth Unisys Stealth (core) 5.x before 5.0.048.0, 5.1.x before 5.1.017.0, and 6.x before 6.0.037.0 stores passwords in a recoverable format. | 4.9 |
2021-03-18 | CVE-2021-3141 | Insufficiently Protected Credentials vulnerability in Unisys Stealth 6.0 In Unisys Stealth (core) before 6.0.025.0, the Keycloak password is stored in a recoverable format that might be accessible by a local attacker, who could gain access to the Management Server and change the Stealth configuration. | 7.8 |
2020-10-01 | CVE-2020-24620 | Use of Hard-coded Credentials vulnerability in Unisys Stealth Unisys Stealth(core) before 4.0.134 stores passwords in a recoverable format. | 7.8 |
2020-06-22 | CVE-2020-12053 | Incorrect Authorization vulnerability in Unisys Stealth In Unisys Stealth 3.4.x, 4.x and 5.x before 5.0.026, if certificate-based authorization is used without HTTPS, an endpoint could be authorized without a private key. | 9.8 |
2020-02-03 | CVE-2019-18193 | Information Exposure Through Log Files vulnerability in Unisys Stealth In Unisys Stealth (core) 3.4.108.0, 3.4.209.x, 4.0.027.x and 4.0.114, key material inadvertently logged under certain conditions. | 7.5 |
2018-02-19 | CVE-2018-6592 | Improper Resource Shutdown or Release vulnerability in Unisys Stealth 3.3 Unisys Stealth 3.3 Windows endpoints before 3.3.016.1 allow local users to gain access to Stealth-enabled devices by leveraging improper cleanup of memory used for negotiation key storage. | 7.8 |