Vulnerabilities (CVE)

Filtered by vendor Unisys Subscribe
Filtered by product Stealth
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-35056 1 Unisys 1 Stealth 2023-12-10 4.6 MEDIUM 6.7 MEDIUM
Unisys Stealth 5.1 before 5.1.025.0 and 6.0 before 6.0.055.0 has an unquoted Windows search path for a scheduled task. An unintended executable might run.
CVE-2021-28492 1 Unisys 1 Stealth 2023-12-10 4.0 MEDIUM 4.9 MEDIUM
Unisys Stealth (core) 5.x before 5.0.048.0, 5.1.x before 5.1.017.0, and 6.x before 6.0.037.0 stores passwords in a recoverable format.
CVE-2021-3141 1 Unisys 1 Stealth 2023-12-10 2.1 LOW 7.8 HIGH
In Unisys Stealth (core) before 6.0.025.0, the Keycloak password is stored in a recoverable format that might be accessible by a local attacker, who could gain access to the Management Server and change the Stealth configuration.
CVE-2020-24620 1 Unisys 1 Stealth 2023-12-10 2.1 LOW 7.8 HIGH
Unisys Stealth(core) before 4.0.134 stores passwords in a recoverable format. Therefore, a search of Enterprise Manager can potentially reveal credentials.
CVE-2020-12053 1 Unisys 1 Stealth 2023-12-10 7.5 HIGH 9.8 CRITICAL
In Unisys Stealth 3.4.x, 4.x and 5.x before 5.0.026, if certificate-based authorization is used without HTTPS, an endpoint could be authorized without a private key.
CVE-2019-18193 1 Unisys 1 Stealth 2023-12-10 6.9 MEDIUM 7.5 HIGH
In Unisys Stealth (core) 3.4.108.0, 3.4.209.x, 4.0.027.x and 4.0.114, key material inadvertently logged under certain conditions. Fixed included in 3.4.109, 4.0.027.13, 4.0.125 and 5.0.013.0.
CVE-2018-6592 1 Unisys 1 Stealth 2023-12-10 4.6 MEDIUM 7.8 HIGH
Unisys Stealth 3.3 Windows endpoints before 3.3.016.1 allow local users to gain access to Stealth-enabled devices by leveraging improper cleanup of memory used for negotiation key storage.