Filtered by vendor Ysoft Subscriptions
Total 6 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-35833 1 Ysoft 1 Safeq Server 2024-11-21 6.5 Medium
An issue was discovered in YSoft SAFEQ 6 Server before 6.0.82. When modifying the URL of the LDAP server configuration from LDAPS to LDAP, the system does not require the password to be (re)entered. This results in exposing cleartext credentials when connecting to a rogue LDAP server. NOTE: the vendor originally reported this as a security issue but then reconsidered because of the requirement for Admin access in order to change the configuration.
CVE-2022-38176 1 Ysoft 1 Safeq 2024-11-21 7.8 High
An issue was discovered in YSoft SAFEQ 6 before 6.0.72. Incorrect privileges were configured as part of the installer package for the Client V3 services, allowing for local user privilege escalation by overwriting the executable file via an alternative data stream. NOTE: this is not the same as CVE-2021-31859.
CVE-2021-31859 1 Ysoft 1 Safeq 2024-11-21 7.8 High
Incorrect privileges in the MU55 FlexiSpooler service in YSoft SafeQ 6 6.0.55 allows local user privilege escalation by overwriting the executable file via an alternative data stream.
CVE-2018-15498 1 Ysoft 2 Safeq Server, Safeq Server Client 2024-11-21 N/A
YSoft SafeQ Server 6 allows a replay attack.
CVE-2022-23861 1 Ysoft 1 Safeq 2024-11-01 6.1 Medium
Multiple Stored Cross-Site Scripting vulnerabilities were discovered in Y Soft SAFEQ 6 Build 53. Multiple fields in the YSoft SafeQ web application can be used to inject malicious inputs that, due to a lack of output sanitization, result in the execution of arbitrary JS code. These fields can be leveraged to perform XSS attacks on legitimate users accessing the SafeQ web interface.
CVE-2022-23862 1 Ysoft 1 Safeq 2024-10-31 8.4 High
A Local Privilege Escalation issue was discovered in Y Soft SAFEQ 6 Build 53. The SafeQ JMX service running on port 9696 is vulnerable to JMX MLet attacks. Because the service did not enforce authentication and was running under the "NT Authority\System" user, an attacker is able to use the vulnerability to execute arbitrary code and elevate to the system user.