Description
Velneo vClient on its 28.1.3 version, could allow an attacker with knowledge of the victims's username and hashed password to spoof the victim's id against the server.
No analysis available yet.
Remediation
Vendor Solution
This vulnerability has been fixed by Velneo team in version 32, released on 11/08/2022.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-31833 | Velneo vClient on its 28.1.3 version, could allow an attacker with knowledge of the victims's username and hashed password to spoof the victim's id against the server. |
References
History
Fri, 25 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Sep 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Velneo vClient on its 28.1.3 version, could allow an attacker with knowledge of the victims's username and hashed password to spoof the victim's id against the server. | Velneo vClient on its 28.1.3 version, could allow an attacker with knowledge of the victims's username and hashed password to spoof the victim's id against the server. |
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-04-25T14:59:40.409Z
Reserved: 2021-12-13T00:00:00.000Z
Link: CVE-2021-45036
Updated: 2024-08-04T04:32:13.641Z
Status : Modified
Published: 2022-11-28T16:15:09.090
Modified: 2024-11-21T06:31:50.397
Link: CVE-2021-45036
No data.
OpenCVE Enrichment
No data.
EUVD