Known Vulnerabilities for Stealth by Unisys
Listed below are 7 of the newest known vulnerabilities associated with "Stealth" by "Unisys".
These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.
Data on known vulnerable versions is also displayed based on information from known CPEs
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2025-22655 json | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Caio Web Dev CWD – St... | Not Provided | 2025-04-17 | 2026-04-01 |
| CVE-2021-35056 json | Unisys Stealth 5.1 before 5.1.025.0 and 6.0 before 6.0.055.0 has an unquoted Windows search path for a scheduled task. An uni... | 6.7 - MEDIUM | 2021-07-15 | 2021-07-27 |
| CVE-2021-28492 json | Unisys Stealth (core) 5.x before 5.0.048.0, 5.1.x before 5.1.017.0, and 6.x before 6.0.037.0 stores passwords in a recoverabl... | 4.9 - MEDIUM | 2021-04-20 | 2021-05-04 |
| CVE-2021-3141 json | In Unisys Stealth (core) before 6.0.025.0, the Keycloak password is stored in a recoverable format that might be accessible b... | 7.8 - HIGH | 2021-03-18 | 2021-03-25 |
| CVE-2020-24620 json | Unisys Stealth(core) before 4.0.134 stores passwords in a recoverable format. Therefore, a search of Enterprise Manager can p... | 7.8 - HIGH | 2020-10-01 | 2021-02-12 |
| CVE-2020-12053 json | In Unisys Stealth 3.4.x, 4.x and 5.x before 5.0.026, if certificate-based authorization is used without HTTPS, an endpoint co... | 9.8 - CRITICAL | 2020-06-22 | 2020-06-29 |
| CVE-2019-18193 json | In Unisys Stealth (core) 3.4.108.0, 3.4.209.x, 4.0.027.x and 4.0.114, key material inadvertently logged under certain conditi... | 7.5 - HIGH | 2020-02-03 | 2020-04-09 |
| CVE-2018-6592 json | Unisys Stealth 3.3 Windows endpoints before 3.3.016.1 allow local users to gain access to Stealth-enabled devices by leveragi... | 7.8 - HIGH | 2018-02-19 | 2019-10-03 |
Known Affected Configurations (CPE V2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Unisys | Stealth | 5.0.026 | |||
| Application | Unisys | Stealth | 5.0.024 | |||
| Application | Unisys | Stealth | 5.0 | |||
| Application | Unisys | Stealth | 4.0.134 | |||
| Application | Unisys | Stealth | 4.0.131 | |||
| Application | Unisys | Stealth | 4.0.114 | |||
| Application | Unisys | Stealth | 4.0.027.0 | |||
| Application | Unisys | Stealth | 4.0 | |||
| Application | Unisys | Stealth | 3.4.209.0 | |||
| Application | Unisys | Stealth | 3.4.108.0 | |||
| Application | Unisys | Stealth | 3.4 | |||
| Application | Unisys | Stealth | 2.5 |