Vulnerabilities (CVE)

Filtered by vendor Gemalto Subscribe
Total 26 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-8900 1 Gemalto 1 Sentinel Ldk Rte 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
The License Manager service of HASP SRM, Sentinel HASP and Sentinel LDK products prior to Sentinel LDK RTE 7.80 allows remote attackers to inject malicious web script in the logs page of Admin Control Center (ACC) for cross-site scripting (XSS) vulnerability.
CVE-2018-6305 1 Gemalto 1 Sentinel Ldk Rte 2024-11-21 5.0 MEDIUM 7.5 HIGH
Denial of service in Gemalto's Sentinel LDK RTE version before 7.65
CVE-2018-6304 1 Gemalto 1 Sentinel Ldk Rte 2024-11-21 5.0 MEDIUM 7.5 HIGH
Stack overflow in custom XML-parser in Gemalto's Sentinel LDK RTE version before 7.65 leads to remote denial of service
CVE-2018-15492 1 Gemalto 1 Sentinel License Manager 2024-11-21 5.0 MEDIUM 7.5 HIGH
A vulnerability in the lservnt.exe component of Sentinel License Manager version 8.5.3.35 (fixed in 8.5.3.2403) causes UDP amplification.
CVE-2017-6953 1 Gemalto 1 Smartdiag Diagnosis Tool 2024-11-21 4.6 MEDIUM 7.8 HIGH
Gemalto SmartDiag Diagnosis Tool v2.5 has a stack-based Buffer Overflow with SEH Overwrite via long "Register a new card" input fields. There may be a risk of local code execution with untrusted input to SmartDiag.exe or SymDiag.exe.
CVE-2017-11498 1 Gemalto 1 Sentinel Ldk Rte 2024-11-21 5.0 MEDIUM 7.5 HIGH
Buffer overflow in hasplms in Gemalto ACC (Admin Control Center), all versions ranging from HASP SRM 2.10 to Sentinel LDK 7.50, allows remote attackers to shut down the remote process (a denial of service) via a language pack (ZIP file) with invalid HTML files.
CVE-2017-11497 1 Gemalto 1 Sentinel Ldk Rte 2024-11-21 7.5 HIGH 9.8 CRITICAL
Stack buffer overflow in hasplms in Gemalto ACC (Admin Control Center), all versions ranging from HASP SRM 2.10 to Sentinel LDK 7.50, allows remote attackers to execute arbitrary code via language packs containing filenames longer than 1024 characters.
CVE-2017-11496 1 Gemalto 1 Sentinel Ldk Rte 2024-11-21 7.5 HIGH 9.8 CRITICAL
Stack buffer overflow in hasplms in Gemalto ACC (Admin Control Center), all versions ranging from HASP SRM 2.10 to Sentinel LDK 7.50, allows remote attackers to execute arbitrary code via malformed ASN.1 streams in V2C and similar input files.
CVE-2015-7967 1 Gemalto 1 Safenet Authentication Service For Citrix Web Interface Agent 2024-11-21 4.6 MEDIUM 7.8 HIGH
SafeNet Authentication Service for Citrix Web Interface Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.
CVE-2015-7966 1 Gemalto 1 Safenet Authentication Service Windows Logon Agent 2024-11-21 4.6 MEDIUM 7.8 HIGH
SafeNet Authentication Service Windows Logon Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module, a different vulnerability than CVE-2015-7965.
CVE-2015-7965 1 Gemalto 1 Safenet Authentication Service Windows Logon Agent 2024-11-21 4.6 MEDIUM 7.8 HIGH
SafeNet Authentication Service Windows Logon Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module, a different vulnerability than CVE-2015-7966.
CVE-2015-7964 1 Gemalto 1 Safenet Authentication Service For Nps Agent 2024-11-21 4.6 MEDIUM 7.8 HIGH
SafeNet Authentication Service for NPS Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.
CVE-2015-7963 1 Gemalto 1 Safenet Authentication Service For Ad Fs Agent 2024-11-21 4.6 MEDIUM 7.8 HIGH
SafeNet Authentication Service for AD FS Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.
CVE-2015-7962 1 Gemalto 1 Safenet Authentication Service For Outlook Web App Agent 2024-11-21 4.6 MEDIUM 7.8 HIGH
SafeNet Authentication Service for Outlook Web App Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.
CVE-2015-7961 1 Gemalto 1 Safenet Authentication Service Remote Web Workplace Agent 2024-11-21 4.6 MEDIUM 7.8 HIGH
SafeNet Authentication Service Remote Web Workplace Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.
CVE-2015-7598 1 Gemalto 1 Safenet Authentication Service Tokenvalidator Proxy Agent 2024-11-21 4.6 MEDIUM 7.8 HIGH
SafeNet Authentication Service TokenValidator Proxy Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.
CVE-2015-7597 1 Gemalto 1 Safenet Authentication Service Iis Agent 2024-11-21 4.6 MEDIUM 7.8 HIGH
SafeNet Authentication Service IIS Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.
CVE-2015-7596 1 Gemalto 1 Safenet Authentication Service End User Software Tools For Windows 2024-11-21 4.6 MEDIUM 7.8 HIGH
SafeNet Authentication Service End User Software Tools for Windows uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.
CVE-2015-5464 1 Gemalto 3 Safenet Luna G5, Safenet Luna Pci-e, Safenet Luna Sa 2024-11-21 1.3 LOW N/A
The Gemalto SafeNet Luna HSM allows remote authenticated users to bypass intended key-export restrictions by leveraging (1) crypto-user or (2) crypto-officer access to an HSM partition.
CVE-2019-18232 2 Gemalto, Microsoft 2 Sentinel Ldk License Manager, Windows 2024-02-28 4.6 MEDIUM 7.8 HIGH
SafeNet Sentinel LDK License Manager, all versions prior to 7.101(only Microsoft Windows versions are affected) is vulnerable when configured as a service. This vulnerability may allow an attacker with local access to create, write, and/or delete files in system folder using symbolic links, leading to a privilege escalation. This vulnerability could also be used by an attacker to execute a malicious DLL, which could impact the integrity and availability of the system.