Show filters
25 Total Results
Displaying 1-10 of 25
Sort by:
Attacker Value
Unknown

CVE-2022-32555

Disclosure Date: September 13, 2022 (last updated October 08, 2023)
Unisys Data Exchange Management Studio before 6.0.IC2 and 7.x before 7.0.IC1 doesn't have an Anti-CSRF token to authenticate the POST request. Thus, a cross-site request forgery attack could occur.
Attacker Value
Unknown

CVE-2021-43394

Disclosure Date: January 24, 2022 (last updated February 23, 2025)
Unisys OS 2200 Messaging Integration Services (NTSI) 7R3B IC3 and IC4, 7R3C, and 7R3D has an Incorrect Implementation of an Authentication Algorithm. An LDAP password is not properly validated.
Attacker Value
Unknown

CVE-2021-45445

Disclosure Date: January 12, 2022 (last updated February 23, 2025)
Unisys ClearPath MCP TCP/IP Networking Services 59.1, 60.0, and 62.0 has an Infinite Loop.
Attacker Value
Unknown

CVE-2021-43388

Disclosure Date: December 14, 2021 (last updated February 23, 2025)
Unisys Cargo Mobile Application before 1.2.29 uses cleartext to store sensitive information, which might be revealed in a backup. The issue is addressed by ensuring that the allowBackup flag (in the manifest) is False.
Attacker Value
Unknown

CVE-2021-35056

Disclosure Date: July 15, 2021 (last updated February 23, 2025)
Unisys Stealth 5.1 before 5.1.025.0 and 6.0 before 6.0.055.0 has an unquoted Windows search path for a scheduled task. An unintended executable might run.
Attacker Value
Unknown

CVE-2020-35542

Disclosure Date: April 27, 2021 (last updated February 22, 2025)
Unisys Data Exchange Management Studio through 5.0.34 doesn't sanitize the input to a HTML document field. This could be used for an XSS attack.
Attacker Value
Unknown

CVE-2021-28492

Disclosure Date: April 20, 2021 (last updated February 22, 2025)
Unisys Stealth (core) 5.x before 5.0.048.0, 5.1.x before 5.1.017.0, and 6.x before 6.0.037.0 stores passwords in a recoverable format.
Attacker Value
Unknown

CVE-2021-3141

Disclosure Date: March 18, 2021 (last updated February 22, 2025)
In Unisys Stealth (core) before 6.0.025.0, the Keycloak password is stored in a recoverable format that might be accessible by a local attacker, who could gain access to the Management Server and change the Stealth configuration.
Attacker Value
Unknown

CVE-2020-24620

Disclosure Date: October 01, 2020 (last updated February 22, 2025)
Unisys Stealth(core) before 4.0.134 stores passwords in a recoverable format. Therefore, a search of Enterprise Manager can potentially reveal credentials.
Attacker Value
Unknown

CVE-2020-12053

Disclosure Date: June 22, 2020 (last updated February 21, 2025)
In Unisys Stealth 3.4.x, 4.x and 5.x before 5.0.026, if certificate-based authorization is used without HTTPS, an endpoint could be authorized without a private key.