CVE-2021-46354
- EPSS 34.66%
- Veröffentlicht 09.02.2022 14:15:07
- Zuletzt bearbeitet 21.11.2024 06:33:57
Thinfinity VirtualUI 2.1.28.0, 2.1.32.1 and 2.5.26.2, fixed in version 3.0 is affected by an information disclosure vulnerability in the parameter "Addr" in cmd site. The ability to send requests to other systems can allow the vulnerable server to fi...
CVE-2021-44554
- EPSS 0.4%
- Veröffentlicht 20.12.2021 09:15:06
- Zuletzt bearbeitet 21.11.2024 06:31:12
Thinfinity VirtualUI before 3.0 allows a malicious actor to enumerate users registered in the OS (Windows) through the /changePassword URI. By accessing the vector, an attacker can determine if a username exists thanks to the message returned; it can...
CVE-2021-45092
- EPSS 78.91%
- Veröffentlicht 16.12.2021 04:15:06
- Zuletzt bearbeitet 21.11.2024 06:31:56
Thinfinity VirtualUI before 3.0 has functionality in /lab.html reachable by default that could allow IFRAME injection via the vpath parameter.
CVE-2021-44848
- EPSS 24.59%
- Veröffentlicht 13.12.2021 02:15:06
- Zuletzt bearbeitet 21.11.2024 06:31:36
In Cibele Thinfinity VirtualUI before 3.0, /changePassword returns different responses for invalid authentication requests depending on whether the username exists.
CVE-2019-16384
- EPSS 0.32%
- Veröffentlicht 04.06.2020 16:15:11
- Zuletzt bearbeitet 21.11.2024 04:30:36
Cybele Thinfinity VirtualUI 2.5.17.2 allows ../ path traversal that can be used for data exfiltration. This enables files outside of the web directory to be retrieved if the exact location is known and the user has permissions.
CVE-2019-16385
- EPSS 0.29%
- Veröffentlicht 04.06.2020 16:15:11
- Zuletzt bearbeitet 21.11.2024 04:30:36
Cybele Thinfinity VirtualUI 2.5.17.2 allows HTTP response splitting via the mimetype parameter within a PDF viewer request, as demonstrated by an example.pdf?mimetype= substring. The victim user must load an application request to view a PDF, contain...