Filtered by vendor Cybelesoft
Subscriptions
Total
13 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-40410 | 1 Cybelesoft | 1 Thinfinity Workspace | 2024-11-25 | 4.8 Medium |
Cybele Software Thinfinity Workspace before v7.0.2.113 was discovered to contain a hardcoded cryptographic key used for encryption. | ||||
CVE-2024-40408 | 1 Cybelesoft | 1 Thinfinity Workspace | 2024-11-25 | 7.3 High |
Cybele Software Thinfinity Workspace before v7.0.2.113 was discovered to contain an access control issue in the Create Profile section. This vulnerability allows attackers to create arbitrary user profiles with elevated privileges. | ||||
CVE-2024-40407 | 1 Cybelesoft | 1 Thinfinity Workspace | 2024-11-25 | 7.5 High |
A full path disclosure in Cybele Software Thinfinity Workspace before v7.0.2.113 allows attackers to obtain the root path of the application via unspecified vectors. | ||||
CVE-2024-40405 | 1 Cybelesoft | 1 Thinfinity Workspace | 2024-11-25 | 8.1 High |
Incorrect access control in Cybele Software Thinfinity Workspace before v7.0.3.109 allows attackers to gain access to a secondary broker via a crafted request. | ||||
CVE-2024-40404 | 1 Cybelesoft | 1 Thinfinity Workspace | 2024-11-25 | 9.8 Critical |
Cybele Software Thinfinity Workspace before v7.0.2.113 was discovered to contain an access control issue in the API endpoint where Web Sockets connections are established. | ||||
CVE-2022-25227 | 1 Cybelesoft | 1 Thinfinity Vnc | 2024-11-21 | 8.8 High |
Thinfinity VNC v4.0.0.1 contains a Cross-Origin Resource Sharing (CORS) vulnerability which can allow an unprivileged remote attacker, if they can trick a user into browse malicious site, to obtain an 'ID' that can be used to send websocket requests and achieve RCE. | ||||
CVE-2021-46354 | 1 Cybelesoft | 1 Thinfinity Virtualui | 2024-11-21 | 7.5 High |
Thinfinity VirtualUI 2.1.28.0, 2.1.32.1 and 2.5.26.2, fixed in version 3.0 is affected by an information disclosure vulnerability in the parameter "Addr" in cmd site. The ability to send requests to other systems can allow the vulnerable server to filtrate the real IP of the web server or increase the attack surface. | ||||
CVE-2021-45092 | 1 Cybelesoft | 1 Thinfinity Virtualui | 2024-11-21 | 9.8 Critical |
Thinfinity VirtualUI before 3.0 has functionality in /lab.html reachable by default that could allow IFRAME injection via the vpath parameter. | ||||
CVE-2021-44848 | 1 Cybelesoft | 1 Thinfinity Virtualui | 2024-11-21 | 5.3 Medium |
In Cibele Thinfinity VirtualUI before 3.0, /changePassword returns different responses for invalid authentication requests depending on whether the username exists. | ||||
CVE-2021-44554 | 1 Cybelesoft | 1 Thinfinity Virtualui | 2024-11-21 | 5.3 Medium |
Thinfinity VirtualUI before 3.0 allows a malicious actor to enumerate users registered in the OS (Windows) through the /changePassword URI. By accessing the vector, an attacker can determine if a username exists thanks to the message returned; it can be presented in different languages according to the configuration of VirtualUI. Common users are administrator, admin, guest and krgtbt. | ||||
CVE-2019-16385 | 1 Cybelesoft | 1 Thinfinity Virtualui | 2024-11-21 | 6.1 Medium |
Cybele Thinfinity VirtualUI 2.5.17.2 allows HTTP response splitting via the mimetype parameter within a PDF viewer request, as demonstrated by an example.pdf?mimetype= substring. The victim user must load an application request to view a PDF, containing the malicious payload. This results in a reflected XSS payload being executed. | ||||
CVE-2019-16384 | 1 Cybelesoft | 1 Thinfinity Virtualui | 2024-11-21 | 6.5 Medium |
Cybele Thinfinity VirtualUI 2.5.17.2 allows ../ path traversal that can be used for data exfiltration. This enables files outside of the web directory to be retrieved if the exact location is known and the user has permissions. | ||||
CVE-2015-1429 | 1 Cybelesoft | 1 Thinfinity Remote Desktop Workstation | 2024-11-21 | 7.5 High |
Directory traversal vulnerability in Cybele Software Thinfinity Remote Desktop Workstation 3.0.0.3 32-bit and 64-bit allows remote attackers to download arbitrary files via a .. (dot dot) in an unspecified parameter. |
Page 1 of 1.