CVE-2015-8753
- EPSS 0.47%
- Veröffentlicht 08.01.2016 19:59:19
- Zuletzt bearbeitet 12.04.2025 10:46:40
SAP Afaria 7.0.6001.5 allows remote attackers to bypass authorization checks and wipe or lock mobile devices via a crafted request, related to "Insecure signature," aka SAP Security Note 2134905.
CVE-2015-6663
- EPSS 0.29%
- Veröffentlicht 24.08.2015 14:59:20
- Zuletzt bearbeitet 12.04.2025 10:46:40
Cross-site scripting (XSS) vulnerability in the Client form in the Device Inspector page in SAP Afaria 7 allows remote attackers to inject arbitrary web script or HTML via crafted client name data, aka SAP Security Note 2152669.
CVE-2015-3449
- EPSS 0.04%
- Veröffentlicht 16.07.2015 14:59:02
- Zuletzt bearbeitet 12.04.2025 10:46:40
The Windows client in SAP Afaria 7.0.6398.0 uses weak permissions (Everyone: read and Everyone: write) for the install folder, which allows local users to gain privileges via a Trojan horse XeService.exe file.
CVE-2015-4161
- EPSS 0.47%
- Veröffentlicht 02.06.2015 14:59:21
- Zuletzt bearbeitet 12.04.2025 10:46:40
SAP Afaria does not properly restrict access to unspecified functionality, which allows remote attackers to obtain sensitive information, gain privileges, or have other unspecified impact via unknown vectors, SAP Security Note 2155690.
CVE-2015-4092
- EPSS 2.11%
- Veröffentlicht 26.05.2015 14:59:01
- Zuletzt bearbeitet 12.04.2025 10:46:40
Buffer overflow in the XComms process in SAP Afaria 7.00.6620.2 SP5 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request, aka SAP Security Note 2153690.
- EPSS 3.87%
- Veröffentlicht 01.04.2015 14:59:18
- Zuletzt bearbeitet 12.04.2025 10:46:40
Buffer overflow in XcListener in SAP Afaria 7.0.6001.5 allows remote attackers to cause a denial of service (process termination) via a crafted request, aka SAP Security Note 2132584.
CVE-2015-2816
- EPSS 0.76%
- Veröffentlicht 01.04.2015 14:59:14
- Zuletzt bearbeitet 12.04.2025 10:46:40
The XcListener in SAP Afaria 7.0.6001.5 does not properly restrict access, which allows remote attackers to have unspecified impact via a crafted request, aka SAP Security Note 2134905.