2 results (0.003 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in YSoft SAFEQ 6 Server before 6.0.82. When modifying the URL of the LDAP server configuration from LDAPS to LDAP, the system does not require the password to be (re)entered. This results in exposing cleartext credentials when connecting to a rogue LDAP server. NOTE: the vendor originally reported this as a security issue but then reconsidered because of the requirement for Admin access in order to change the configuration. ** EN DISPUTA ** Se descubrió un problema en YSoft SAFEQ 6 Server antes de la versión 6.0.82. Al modificar la URL de la configuración del servidor LDAP de LDAPS a LDAP, el sistema no requiere que se (re)ingrese la contraseña. • https://www.ysoft.com/en/legal/ldaps-encryption-downgrade-attack-vulnerability https://ysoft.com • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 1

YSoft SafeQ Server 6 allows a replay attack. YSoft SafeQ Server 6 permite un ataque de reproducción. • https://herolab.usd.de/wp-content/uploads/sites/4/usd20180021.txt • CWE-294: Authentication Bypass by Capture-replay •