Show filters
61 Total Results
Displaying 11-20 of 61
Sort by:
Attacker Value
Unknown

CVE-2021-44139

Disclosure Date: March 23, 2022 (last updated February 23, 2025)
Sentinel 1.8.2 is vulnerable to Server-side request forgery (SSRF).
Attacker Value
Unknown

CVE-2021-42809

Disclosure Date: December 20, 2021 (last updated February 23, 2025)
Improper Access Control of Dynamically-Managed Code Resources (DLL) in Thales Sentinel Protection Installer could allow the execution of arbitrary code.
Attacker Value
Unknown

CVE-2021-42808

Disclosure Date: December 20, 2021 (last updated February 23, 2025)
Improper Access Control in Thales Sentinel Protection Installer could allow a local user to escalate privileges.
Attacker Value
Unknown

CVE-2021-38649

Disclosure Date: September 15, 2021 (last updated November 28, 2024)
Open Management Infrastructure Elevation of Privilege Vulnerability
0
Attacker Value
Unknown

CVE-2021-38645

Disclosure Date: September 15, 2021 (last updated November 28, 2024)
Open Management Infrastructure Elevation of Privilege Vulnerability
0
Attacker Value
Unknown

CVE-2021-32928

Disclosure Date: June 16, 2021 (last updated February 22, 2025)
The Sentinel LDK Run-Time Environment installer (Versions 7.6 and prior) adds a firewall rule named “Sentinel License Manager” that allows incoming connections from private networks using TCP Port 1947. While uninstalling, the uninstaller fails to close Port 1947.
Attacker Value
Unknown

CVE-2019-19879

Disclosure Date: February 14, 2020 (last updated November 27, 2024)
HashiCorp Sentinel up to 0.10.1 incorrectly parsed negation in certain policy expressions. Fixed in 0.10.2.
Attacker Value
Unknown

CVE-2019-18232

Disclosure Date: December 11, 2019 (last updated November 27, 2024)
SafeNet Sentinel LDK License Manager, all versions prior to 7.101(only Microsoft Windows versions are affected) is vulnerable when configured as a service. This vulnerability may allow an attacker with local access to create, write, and/or delete files in system folder using symbolic links, leading to a privilege escalation. This vulnerability could also be used by an attacker to execute a malicious DLL, which could impact the integrity and availability of the system.
Attacker Value
Unknown

CVE-2019-8283

Disclosure Date: June 07, 2019 (last updated November 27, 2024)
Hasplm cookie in Gemalto Admin Control Center, all versions prior to 7.92, does not have 'HttpOnly' flag. This allows malicious javascript to steal it.
Attacker Value
Unknown

CVE-2019-8282

Disclosure Date: June 07, 2019 (last updated November 27, 2024)
Gemalto Admin Control Center, all versions prior to 7.92, uses cleartext HTTP to communicate with www3.safenet-inc.com to obtain language packs. This allows attacker to do man-in-the-middle (MITM) attack and replace original language pack by malicious one.