Show filters
61 Total Results
Displaying 11-20 of 61
Sort by:
Attacker Value
Unknown
CVE-2021-44139
Disclosure Date: March 23, 2022 (last updated February 23, 2025)
Sentinel 1.8.2 is vulnerable to Server-side request forgery (SSRF).
0
Attacker Value
Unknown
CVE-2021-42809
Disclosure Date: December 20, 2021 (last updated February 23, 2025)
Improper Access Control of Dynamically-Managed Code Resources (DLL) in Thales Sentinel Protection Installer could allow the execution of arbitrary code.
0
Attacker Value
Unknown
CVE-2021-42808
Disclosure Date: December 20, 2021 (last updated February 23, 2025)
Improper Access Control in Thales Sentinel Protection Installer could allow a local user to escalate privileges.
0
Attacker Value
Unknown
CVE-2021-38649
Disclosure Date: September 15, 2021 (last updated November 28, 2024)
Open Management Infrastructure Elevation of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2021-38645
Disclosure Date: September 15, 2021 (last updated November 28, 2024)
Open Management Infrastructure Elevation of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2021-32928
Disclosure Date: June 16, 2021 (last updated February 22, 2025)
The Sentinel LDK Run-Time Environment installer (Versions 7.6 and prior) adds a firewall rule named “Sentinel License Manager” that allows incoming connections from private networks using TCP Port 1947. While uninstalling, the uninstaller fails to close Port 1947.
0
Attacker Value
Unknown
CVE-2019-19879
Disclosure Date: February 14, 2020 (last updated November 27, 2024)
HashiCorp Sentinel up to 0.10.1 incorrectly parsed negation in certain policy expressions. Fixed in 0.10.2.
0
Attacker Value
Unknown
CVE-2019-18232
Disclosure Date: December 11, 2019 (last updated November 27, 2024)
SafeNet Sentinel LDK License Manager, all versions prior to 7.101(only Microsoft Windows versions are affected) is vulnerable when configured as a service. This vulnerability may allow an attacker with local access to create, write, and/or delete files in system folder using symbolic links, leading to a privilege escalation. This vulnerability could also be used by an attacker to execute a malicious DLL, which could impact the integrity and availability of the system.
0
Attacker Value
Unknown
CVE-2019-8283
Disclosure Date: June 07, 2019 (last updated November 27, 2024)
Hasplm cookie in Gemalto Admin Control Center, all versions prior to 7.92, does not have 'HttpOnly' flag. This allows malicious javascript to steal it.
0
Attacker Value
Unknown
CVE-2019-8282
Disclosure Date: June 07, 2019 (last updated November 27, 2024)
Gemalto Admin Control Center, all versions prior to 7.92, uses cleartext HTTP to communicate with www3.safenet-inc.com to obtain language packs. This allows attacker to do man-in-the-middle (MITM) attack and replace original language pack by malicious one.
0